Top Banner
1 Internet Security Threat Report X nternet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers
56

1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

Dec 26, 2015

Download

Documents

Alban Randall
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

1Internet Security Threat Report X

Internet Security Threat Report VI

Figure 1.Distribution Of Attacks Targeting Web Browsers

Page 2: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

2Internet Security Threat Report X

Internet Security Threat Report VI

Figure 2. Window Of Exposure, Enterprise Vendors

Page 3: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

3Internet Security Threat Report X

Internet Security Threat Report VI

Figure 3. Operating System Window Of Exposure

Page 4: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

4Internet Security Threat Report X

Internet Security Threat Report VI

Figure 4. Web Browsers Window Of Exposure

Page 5: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

5Internet Security Threat Report X

Internet Security Threat Report VI

Figure 5. Web Browser Vulnerabilities

Page 6: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

6Internet Security Threat Report X

Internet Security Threat Report VI

Figure 6. Active Bot Network Computers Per Day

Page 7: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

7Internet Security Threat Report X

Internet Security Threat Report VI

Figure 7. Number Of Unique Phishing Messages

Page 8: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

8Internet Security Threat Report X

Internet Security Threat Report VI

Figure 8. Phishing Activity By Sector

Page 9: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

9Internet Security Threat Report X

Internet Security Threat Report VI

Figure 9. Distribution of Attacks Targeting Web Browsers

Page 10: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

10Internet Security Threat Report X

Internet Security Threat Report VI

Figure 10. Denial Of Service Attacks Per Day

Page 11: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

11Internet Security Threat Report X

Internet Security Threat Report VI

Figure 11. Top Countries Targeted By Denial Of Service Attacks

Page 12: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

12Internet Security Threat Report X

Internet Security Threat Report VI

Figure 12. Active Bot Network Computers Per Day

Page 13: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

13Internet Security Threat Report X

Internet Security Threat Report VI

Figure 13. Top Countries By Bot-Infected Computers

Page 14: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

14Internet Security Threat Report X

Internet Security Threat Report VI

Figure 14. Distribution Of Command-And-Control Servers

Page 15: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

15Internet Security Threat Report X

Internet Security Threat Report VI

Figure 15. Top Originating Countries

Page 16: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

16Internet Security Threat Report X

Internet Security Threat Report VI

Figure 16. Total Volume Of Vulnerabilities

Page 17: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

17Internet Security Threat Report X

Internet Security Threat Report VI

Figure 17. Web Application Vulnerabilities

Page 18: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

18Internet Security Threat Report X

Internet Security Threat Report VI

Figure 18. Easily Exploitable Vulnerabilities

Page 19: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

19Internet Security Threat Report X

Internet Security Threat Report VI

Figure 19. Easily Exploitable Vulnerabilities By Type

Page 20: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

20Internet Security Threat Report X

Internet Security Threat Report VI

Figure 20. Window Of Exposure, Enterprise Vendors

Page 21: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

21Internet Security Threat Report X

Internet Security Threat Report VI

Figure 21. Operating System Exploit Development Time

Page 22: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

22Internet Security Threat Report X

Internet Security Threat Report VI

Figure 22. Operating System Patch Development Time

Page 23: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

23Internet Security Threat Report X

Internet Security Threat Report VI

Figure 23. Operating System Window Of Exposure

Page 24: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

24Internet Security Threat Report X

Internet Security Threat Report VI

Figure 24. Patch Development Time, Web Browsers

Page 25: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

25Internet Security Threat Report X

Internet Security Threat Report VI

Figure 25. Window Of Exposure, Web Browsers

Page 26: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

26Internet Security Threat Report X

Internet Security Threat Report VI

Figure 26. Web Browser Vulnerabilities

Page 27: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

27Internet Security Threat Report X

Internet Security Threat Report VI

Figure 27. Exploit Code Release Period

Page 28: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

28Internet Security Threat Report X

Internet Security Threat Report VI

Figure 28. Previously Unseen Threats As A Proportion Of All Threats

Page 29: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

29Internet Security Threat Report X

Internet Security Threat Report VI

Figure 29. Malicious Code Types By Volume

Page 30: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

30Internet Security Threat Report X

Internet Security Threat Report VI

Figure 30. New Win32 Virus And Worm Variants

Page 31: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

31Internet Security Threat Report X

Internet Security Threat Report VI

Figure 31. Volume Of Bots Reported

Page 32: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

32Internet Security Threat Report X

Internet Security Threat Report VI

Figure 32. Exposure Of Confidential Information

Page 33: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

33Internet Security Threat Report X

Internet Security Threat Report VI

Figure 33. Percentage Of Instant Messaging Threat Propagation By Protocol

Page 34: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

34Internet Security Threat Report X

Internet Security Threat Report VI

Figure 34. Volume Of Modular Malicious Code

Page 35: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

35Internet Security Threat Report X

Internet Security Threat Report VI

Figure 35. Modular Malicious Code Samples

Page 36: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

36Internet Security Threat Report X

Internet Security Threat Report VI

Figure 36. Malicious Code Propagation Vectors

Page 37: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

37Internet Security Threat Report X

Internet Security Threat Report VI

Figure 37. Number Of Unique Phishing Messages

Page 38: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

38Internet Security Threat Report X

Internet Security Threat Report VI

Figure 38. Blocked Phishing Attempts

Page 39: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

39Internet Security Threat Report X

Internet Security Threat Report VI

Figure 39. Phishing Activity By Sector

Page 40: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

40Internet Security Threat Report X

Internet Security Threat Report VI

Figure 40. Spam Categories

Page 41: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

41Internet Security Threat Report X

Internet Security Threat Report VI

Figure 41. Top Ten Countries Of Spam Origin

Page 42: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

42Internet Security Threat Report X

Internet Security Threat Report VI

Figure 42. Spam Containing Malicious Code

Page 43: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

43Internet Security Threat Report X

Internet Security Threat Report VI

Figure 43. Industry Representational Breakdown

Page 44: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

44Internet Security Threat Report X

Internet Security Threat Report VI

Table 1. TopTargetedSector

Page 45: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

45Internet Security Threat Report X

Internet Security Threat Report VI

Table 2. TopSectDoSAtks

Page 46: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

46Internet Security Threat Report X

Internet Security Threat Report VI

Table 3. TopWebBrwsrAttacks

Page 47: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

47Internet Security Threat Report X

Internet Security Threat Report VI

Table 4. TopAttacksWireless

Page 48: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

48Internet Security Threat Report X

Internet Security Threat Report VI

Table 5. TopSectDoSAtks

Page 49: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

49Internet Security Threat Report X

Internet Security Threat Report VI

Table 6. TopBotNetworkCities

Page 50: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

50Internet Security Threat Report X

Internet Security Threat Report VI

Table 7. TopTargetedSector

Page 51: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

51Internet Security Threat Report X

Internet Security Threat Report VI

Table 8. TopNewMalCodeFam

Page 52: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

52Internet Security Threat Report X

Internet Security Threat Report VI

Table 10. Top10CountSpamOrg

Page 53: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

53Internet Security Threat Report X

Internet Security Threat Report VI

Table 11. TopNewSecurRisks

Page 54: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

54Internet Security Threat Report X

Internet Security Threat Report VI

Table 12. Anti-removalTechs

Page 55: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

55Internet Security Threat Report X

Internet Security Threat Report VI

Table 13. Self-updatSecur

Page 56: 1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.

56Internet Security Threat Report X

Internet Security Threat Report VI

Table 14. TopSecurityRisks