Top 10 Malware Threats To Microsoft PCs

5. Exploits

The Black Hole automated attack toolkit helped drive exploits into fifth place on Microsoft's list of threats. Attackers typically rent out the toolkit in hacking forums under a subscription model. The toolkit provides the cybercriminal with a number of exploits that attempt to target vulnerabilities in applications such as Oracle Java, Sun Java, Adobe Acrobat and Adobe Reader. Microsoft said it also detected a high number of malicious .PDF files that execute when opened and attempt to exploit Adobe Acrobat and Reader vulnerabilities.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.