{"id":2184,"date":"2007-04-25T00:00:00","date_gmt":"2007-04-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/04\/25\/malware-spikes-in-1q-as-hackers-increasingly-infect-websites\/"},"modified":"2021-12-30T11:40:50","modified_gmt":"2021-12-30T11:40:50","slug":"malware-spikes-in-1q-as-hackers-increasingly-infect-websites","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/04\/25\/malware-spikes-in-1q-as-hackers-increasingly-infect-websites\/","title":{"rendered":"Malware Spikes in 1Q As Hackers Increasingly Infect Websites"},"content":{"rendered":"<p>The number of new pieces of malware spiked in the first quarter of this year, and the majority of the new threats are being embedded in malicious Web sites.  According to a study from Sophos, an antivirus and anti-spam company, researchers discovered 23,864 new threats in the first three months of 2007.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With computer users becoming more aware of how to protect against e-mail-based malware, hackers have turned to the Web as their preferred vector of attack.  The trojan is typically found in html or ASP files, and can download and execute files from malicious Web sites to infected computers.<\/p>\n<p>The company&#8217;s researchers found that 70%, were legitimate Web sites that were vulnerable to attack because they were unpatched, poorly coded, or had not been maintained by their owners.  They also found that 12.8% were hosting malicious script, while Windows malware was responsible for infecting 10.7%.<\/p>\n<p>&#8220;What&#8217;s most worrying is that so many Web sites are falling victim because the owners are failing to properly maintain them and keep up to date with their patches,&#8221; said Carole Theriault, a senior security consultant at Sophos, in a written statement.<\/p>\n<p>&#8220;The average Internet user assumes sites like the Miami Dolphins homepage are safe to access, but by targeting a whole range of Internet pages, hackers are successfully infecting a larger number of unwary surfers.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=122469&#038;f_src=darkreading_section_318<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2184","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2184"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2184\/revisions"}],"predecessor-version":[{"id":4671,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2184\/revisions\/4671"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}