{"id":2283,"date":"2013-05-23T00:00:00","date_gmt":"2013-05-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/23\/malware-fight-goes-public-on-the-web\/"},"modified":"2021-12-30T11:40:59","modified_gmt":"2021-12-30T11:40:59","slug":"malware-fight-goes-public-on-the-web","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/23\/malware-fight-goes-public-on-the-web\/","title":{"rendered":"Malware fight goes public on the web"},"content":{"rendered":"<p>That&#8217;s according to the Australian Communications and Media Authority, which has released a web page of statistics it sends to internet service providers (ISPs) about the infections. The authority released the data in the hope it would help reduce malicious software, or malware, infections in Australia and raise awareness about how many devices are known to be infected. The web page, published on Tuesday as part of National Cyber Security Awareness Week, contains detailed statistics of malware infections reported daily to about 130 ISPs and other network operators through the Australian Internet Security Initiative (AISI).<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Formed in 2005 to help address the problem of compromised computers \u2013 sometimes referred to as bots, or drones \u2013 connected to the internet, AISI collects data from various sources on devices exhibiting odd bot-like behaviour on Australian IP addresses.<\/p>\n<p style=\"margin: 0px;\">The detailed statistics on malware infections show that on average during this financial year about 16,500 malware reports have been provided to AISI participants each day \u2013 representing what the authority says is a &#8220;significant level of malware&#8221; affecting Australians.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">&#8220;Once infected with malware, a user&#8217;s personal identity information can be stolen and their infected computing device used to harm and infect other internet users,&#8221; said Richard Bean, the authority&#8217;s deputy chairman. &#8220;Just as the internet increasingly provides rapid access to information about news, events and the activities of friends and family, it should also enable Australians to quickly get information about online risks and threats such as malware infections.&#8221;<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">The authority said the most prevalent infection type currently being reported are numerous variants of Zeus, which is primarily used for banking fraud, and, among other things, can intercept and modify an infected user&#8217;s online banking transactions.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.smh.com.au\/it-pro\/security-it\/malware-fight-goes-public-on-the-web-20130522-2k036.html\">http:\/\/www.smh.com.au\/it-pro\/security-it\/malware-fight-goes-public-on-the-web-20130522-2k036.html<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2283","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2283"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2283\/revisions"}],"predecessor-version":[{"id":4770,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2283\/revisions\/4770"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}