The most exploited methods in 2010 were:
Noteworthy pieces of malware:
• Conficker – is a network worm that has the ability to update itself by downloads from
the Internet. This worm can trigger downloads of itself to the remote computer without the user’s knowledge.
• Koobface – spreads itself through social networks like Facebook. Using the information gathered from the cookies, the worm connects to these sites and starts sending messages with malicious links to friends and contacts.
• Fake antivirus programs – malware is spread using social engineering techniques to trick users into downloading malicious software and/or visiting web sites with malicious content.