1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of...

56
1 Internet Security Threat Report X nternet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers

Transcript of 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of...

Page 1: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

1Internet Security Threat Report X

Internet Security Threat Report VI

Figure 1.Distribution Of Attacks Targeting Web Browsers

Page 2: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

2Internet Security Threat Report X

Internet Security Threat Report VI

Figure 2. Window Of Exposure, Enterprise Vendors

Page 3: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

3Internet Security Threat Report X

Internet Security Threat Report VI

Figure 3. Operating System Window Of Exposure

Page 4: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

4Internet Security Threat Report X

Internet Security Threat Report VI

Figure 4. Web Browsers Window Of Exposure

Page 5: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

5Internet Security Threat Report X

Internet Security Threat Report VI

Figure 5. Web Browser Vulnerabilities

Page 6: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

6Internet Security Threat Report X

Internet Security Threat Report VI

Figure 6. Active Bot Network Computers Per Day

Page 7: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

7Internet Security Threat Report X

Internet Security Threat Report VI

Figure 7. Number Of Unique Phishing Messages

Page 8: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

8Internet Security Threat Report X

Internet Security Threat Report VI

Figure 8. Phishing Activity By Sector

Page 9: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

9Internet Security Threat Report X

Internet Security Threat Report VI

Figure 9. Distribution of Attacks Targeting Web Browsers

Page 10: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

10Internet Security Threat Report X

Internet Security Threat Report VI

Figure 10. Denial Of Service Attacks Per Day

Page 11: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

11Internet Security Threat Report X

Internet Security Threat Report VI

Figure 11. Top Countries Targeted By Denial Of Service Attacks

Page 12: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

12Internet Security Threat Report X

Internet Security Threat Report VI

Figure 12. Active Bot Network Computers Per Day

Page 13: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

13Internet Security Threat Report X

Internet Security Threat Report VI

Figure 13. Top Countries By Bot-Infected Computers

Page 14: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

14Internet Security Threat Report X

Internet Security Threat Report VI

Figure 14. Distribution Of Command-And-Control Servers

Page 15: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

15Internet Security Threat Report X

Internet Security Threat Report VI

Figure 15. Top Originating Countries

Page 16: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

16Internet Security Threat Report X

Internet Security Threat Report VI

Figure 16. Total Volume Of Vulnerabilities

Page 17: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

17Internet Security Threat Report X

Internet Security Threat Report VI

Figure 17. Web Application Vulnerabilities

Page 18: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

18Internet Security Threat Report X

Internet Security Threat Report VI

Figure 18. Easily Exploitable Vulnerabilities

Page 19: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

19Internet Security Threat Report X

Internet Security Threat Report VI

Figure 19. Easily Exploitable Vulnerabilities By Type

Page 20: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

20Internet Security Threat Report X

Internet Security Threat Report VI

Figure 20. Window Of Exposure, Enterprise Vendors

Page 21: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

21Internet Security Threat Report X

Internet Security Threat Report VI

Figure 21. Operating System Exploit Development Time

Page 22: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

22Internet Security Threat Report X

Internet Security Threat Report VI

Figure 22. Operating System Patch Development Time

Page 23: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

23Internet Security Threat Report X

Internet Security Threat Report VI

Figure 23. Operating System Window Of Exposure

Page 24: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

24Internet Security Threat Report X

Internet Security Threat Report VI

Figure 24. Patch Development Time, Web Browsers

Page 25: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

25Internet Security Threat Report X

Internet Security Threat Report VI

Figure 25. Window Of Exposure, Web Browsers

Page 26: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

26Internet Security Threat Report X

Internet Security Threat Report VI

Figure 26. Web Browser Vulnerabilities

Page 27: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

27Internet Security Threat Report X

Internet Security Threat Report VI

Figure 27. Exploit Code Release Period

Page 28: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

28Internet Security Threat Report X

Internet Security Threat Report VI

Figure 28. Previously Unseen Threats As A Proportion Of All Threats

Page 29: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

29Internet Security Threat Report X

Internet Security Threat Report VI

Figure 29. Malicious Code Types By Volume

Page 30: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

30Internet Security Threat Report X

Internet Security Threat Report VI

Figure 30. New Win32 Virus And Worm Variants

Page 31: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

31Internet Security Threat Report X

Internet Security Threat Report VI

Figure 31. Volume Of Bots Reported

Page 32: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

32Internet Security Threat Report X

Internet Security Threat Report VI

Figure 32. Exposure Of Confidential Information

Page 33: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

33Internet Security Threat Report X

Internet Security Threat Report VI

Figure 33. Percentage Of Instant Messaging Threat Propagation By Protocol

Page 34: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

34Internet Security Threat Report X

Internet Security Threat Report VI

Figure 34. Volume Of Modular Malicious Code

Page 35: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

35Internet Security Threat Report X

Internet Security Threat Report VI

Figure 35. Modular Malicious Code Samples

Page 36: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

36Internet Security Threat Report X

Internet Security Threat Report VI

Figure 36. Malicious Code Propagation Vectors

Page 37: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

37Internet Security Threat Report X

Internet Security Threat Report VI

Figure 37. Number Of Unique Phishing Messages

Page 38: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

38Internet Security Threat Report X

Internet Security Threat Report VI

Figure 38. Blocked Phishing Attempts

Page 39: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

39Internet Security Threat Report X

Internet Security Threat Report VI

Figure 39. Phishing Activity By Sector

Page 40: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

40Internet Security Threat Report X

Internet Security Threat Report VI

Figure 40. Spam Categories

Page 41: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

41Internet Security Threat Report X

Internet Security Threat Report VI

Figure 41. Top Ten Countries Of Spam Origin

Page 42: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

42Internet Security Threat Report X

Internet Security Threat Report VI

Figure 42. Spam Containing Malicious Code

Page 43: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

43Internet Security Threat Report X

Internet Security Threat Report VI

Figure 43. Industry Representational Breakdown

Page 44: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

44Internet Security Threat Report X

Internet Security Threat Report VI

Table 1. TopTargetedSector

Page 45: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

45Internet Security Threat Report X

Internet Security Threat Report VI

Table 2. TopSectDoSAtks

Page 46: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

46Internet Security Threat Report X

Internet Security Threat Report VI

Table 3. TopWebBrwsrAttacks

Page 47: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

47Internet Security Threat Report X

Internet Security Threat Report VI

Table 4. TopAttacksWireless

Page 48: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

48Internet Security Threat Report X

Internet Security Threat Report VI

Table 5. TopSectDoSAtks

Page 49: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

49Internet Security Threat Report X

Internet Security Threat Report VI

Table 6. TopBotNetworkCities

Page 50: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

50Internet Security Threat Report X

Internet Security Threat Report VI

Table 7. TopTargetedSector

Page 51: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

51Internet Security Threat Report X

Internet Security Threat Report VI

Table 8. TopNewMalCodeFam

Page 52: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

52Internet Security Threat Report X

Internet Security Threat Report VI

Table 10. Top10CountSpamOrg

Page 53: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

53Internet Security Threat Report X

Internet Security Threat Report VI

Table 11. TopNewSecurRisks

Page 54: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

54Internet Security Threat Report X

Internet Security Threat Report VI

Table 12. Anti-removalTechs

Page 55: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

55Internet Security Threat Report X

Internet Security Threat Report VI

Table 13. Self-updatSecur

Page 56: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

56Internet Security Threat Report X

Internet Security Threat Report VI

Table 14. TopSecurityRisks