{"id":2213,"date":"2008-09-23T00:00:00","date_gmt":"2008-09-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/09\/23\/cybercriminals-utilize-the-latest-web-2-0-techniques-to-inject-their-obfuscated-malware-in-pdf-and-f\/"},"modified":"2021-12-30T11:40:53","modified_gmt":"2021-12-30T11:40:53","slug":"cybercriminals-utilize-the-latest-web-2-0-techniques-to-inject-their-obfuscated-malware-in-pdf-and-f","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/09\/23\/cybercriminals-utilize-the-latest-web-2-0-techniques-to-inject-their-obfuscated-malware-in-pdf-and-f\/","title":{"rendered":"Cybercriminals Utilize the Latest Web 2.0 Techniques to Inject Their Obfuscated Malware in PDF and F"},"content":{"rendered":"<p>Finjan Inc., a leader in secure web gateway products, today announced that its Malicious Code Research Center (MCRC) discovered examples of obfuscated code embedded in rich-content files, and not only in HTML-webpages on legitimate websites.  Finjan&#8217;s H1\/2008 Web Security Survey Report indicates that 46% of respondents stated that their organization didn&#8217;t have a Web 2.0 security policy in place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Finjan, code obfuscation remains the preferred technique for cybercriminals for their attacks.<\/p>\n<p>Real-time content inspection is the optimal way to detect and block dynamically obfuscated code and similar types of advanced cybercrime techniques, since it analyzes and understands the code embedded within web content or files in real time &#8211; before it reaches the end-users.<\/p>\n<p>http:\/\/newsblaze.com\/story\/2008092303030900016.pnw\/topstory.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2213","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2213"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2213\/revisions"}],"predecessor-version":[{"id":4700,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2213\/revisions\/4700"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}