File Formats Most Exploited by Cyber Attacks

Sometimes it’s not a nice world out there.

When you get a file from a client or friend, checking for viruses and malware should always be your first step to keep your computer clean. The file may appear very innocent but you could be getting a virus, and chances are the person who sent you the file didn’t even know it was infected. Best practice is to run it through malware detection software before you open it. We use “Virus Total” and have found it to be a simple solution to detect most malware and virus threats. You can unload a test a file at www.virustotal.com/.

Be safe, the little extra effort will be worth it.

We want to thank the folks at Statista Research & Analysis for the “Chart of the Day”

Vulnerabilities Most Exploited by Cyber Attacks, according to an analysis conducted by the Kaspersky Lab Microsoft Office applications, shows the most commonly exploited applications worldwide. A little under half of the complaints Kaspersky received were related to Microsoft Office applications. Browser applications came in second with about a quarter of the complaints of exploited vulnerabilities. Notably, applications interacting with PDFs are prone to cyber-attacks, since PDF files are one of the main file types cybercriminals target for phishing campaigns. Apps working with PDF files made up about 1 percent of the complaints in the report.

If you have any questions or want to contribute to this post or any future blogs just contact one of our experts at API-Marketing.

Published by

Brad Weston

Brad has over 35 years of print and marketing communications experience. In his older years he is still a bit of a “smart-ass” but is working on being less obnoxious. He thrives on being an alchemist, seeing things of value when others do not.