{"id":2232,"date":"2009-11-03T00:00:00","date_gmt":"2009-11-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/11\/03\/phishing-worms-spike-this-year-say-microsoft-and-mcafee\/"},"modified":"2021-12-30T11:40:54","modified_gmt":"2021-12-30T11:40:54","slug":"phishing-worms-spike-this-year-say-microsoft-and-mcafee","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/11\/03\/phishing-worms-spike-this-year-say-microsoft-and-mcafee\/","title":{"rendered":"Phishing, worms spike this year, say Microsoft and McAfee"},"content":{"rendered":"<p>Scammers are targeting social networks with phishing scams and relying more heavily on worms and Trojans to attack computers, according to security trend reports to be released Monday by Microsoft and McAfee.  Phishing attacks saw a big spike in May and June, primarily because of campaigns targeting social-networking sites, according to Microsoft&#8217;s report covering the first half of 2009.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While browser vulnerabilities increased slightly, application vulnerabilities dropped and operating system holes were flat, Microsoft said.  Microsoft software accounted for 6 of the top 10 browser-based holes attacked on Windows XP computers, compared with only one on Vista computers.  Of the top 10 browser-based holes exploited on computers running Vista, 2 targeted Adobe Reader and the most significant one targeted Adobe Flash Player.<\/p>\n<p>In the third spot was an exploit aimed at Internet Explorer.<\/p>\n<p>Infection rates for Windows Vista were significantly lower than Windows XP, while the rate for Windows Server 2008 was less than Server 2003.<\/p>\n<p>Microsoft released 27 security bulletins in the first half of the year, addressing 85 individual vulnerabilities.<\/p>\n<p>McAfee&#8217;s report showed the U.S. as the top country when it comes to the number of compromised computers that are zombies used in botnets to do things like send spam, followed by China and Brazil.<\/p>\n<p>http:\/\/news.cnet.com\/8301-27080_3-10387768-245.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2232","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2232"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2232\/revisions"}],"predecessor-version":[{"id":4719,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2232\/revisions\/4719"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}