Views
3 years ago

internet security tHreAt rePOrt 2013 - NIFTeTRUST

internet security tHreAt rePOrt 2013 - NIFTeTRUST

p. 2Symantec

p. 2Symantec CorporationInternet Security Threat Report 2013 :: Volume 18CONTENTS03 Introduction04 Executive Summary06 2012 Security Timeline09 2012 in Numbers13 Targeted Attacks, Hacktivism, and Data Breaches14 Introduction14 Data17 DDoS Used as a Diversion17 Data Breaches19 Analysis19 Cyberwarfare, Cybersabotage, and Industrial Espionage20 Advanced Persistent Threats and Targeted Attacks20 Social Engineering and Indirect Attacks21 Watering Hole Attacks23 Vulnerabilities, Exploits, and Toolkits24 Introduction24 Data26 Analysis26 Web-based Attacks on the Rise27 The Arms Race to Exploit New Vulnerabilities27 Malvertising and Website Hacking28 Web Attack Toolkits29 Website Malware Scanning and WebsiteVulnerability Assessment31 Social Networking, Mobile, and the Cloud32 Introduction32 Data35 Analysis35 Spam and Phishing Move to Social Media37 Mobile Threats38 Cloud Computing Risks40 Malware, Spam, and Phishing41 Introduction42 Data42 Spam45 Phishing46 Malware48 Website Exploits by Type of Website49 Analysis49 Macs Under Attack50 Rise of Ransomware51 Long-term Stealthy Malware51 Email Spam Volume Down51 Advanced Phishing53 Looking ahead56 Endnotes57 About Symantec57 More Information29 The Growth of Secured Connections29 Norton Secured Seal and Trust Marks29 Stolen Key-signing Certificates

p. 3Symantec CorporationInternet Security Threat Report 2013 :: Volume 18IntroductionSymantec has established some of the mostcomprehensive sources of Internet threatdata in the world through the SymantecGlobal Intelligence Network, which is madeup of approximately 69 million attacksensors and records thousands of eventsper second. This network monitors threatactivity in over 157 countries and territoriesthrough a combination of Symantecproducts and services such as SymantecDeepSight Threat Management System,Symantec Managed Security Services andNorton consumer products, and otherthird-party data sources.In addition, Symantec maintains one of the world’s mostcomprehensive vulnerability databases, currently consisting ofmore than 51,644 recorded vulnerabilities (spanning more thantwo decades) from over 16,687 vendors representing over 43,391products.Spam, phishing, and malware data is captured through a varietyof sources, including the Symantec Probe Network, a systemof more than 5 million decoy accounts; Symantec.cloud anda number of other Symantec security technologies. Skeptic,the Symantec.cloud proprietary heuristic technology, is able todetect new and sophisticated targeted threats before reachingcustomers’ networks. Over 3 billion email messages and morethan 1.4 billion Web requests are processed each day across14 data centers. Symantec also gathers phishing informationthrough an extensive antifraud community of enterprises,security vendors, and more than 50 million consumers.Symantec Trust Services provides 100 percent availability andprocesses over 4.5 billion Online Certificate Status Protocol(OCSP) look-ups per day, which are used for obtaining therevocation status of X.509 digital certificates around the world.These resources give Symantec’s analysts unparalleled sourcesof data with which to identify, analyze, and provide informedcommentary on emerging trends in attacks, malicious codeactivity, phishing, and spam. The result is the annual SymantecInternet Security Threat Report, which gives enterprises, smallbusinesses, and consumers the essential information to securetheir systems effectively now and into the future.SHARETHIS

internet security tHreAt rePOrt 2013
internet security tHreAt rePOrt 2013
internet security tHreAt rePOrt 2013 - Symantec
internet security tHreAt rePOrt GOVernMent 2013
INTERNET SECURITY THREAT REPORT
21347932_GA-internet-security-threat-report-volume-20-2015-social_v2
Internet Threats Trend Report July 2013 - Commtouch
Internet Threats Trend Report
Internet Threats Trend Report
Internet Threats Trend Report
fireeye-advanced-threat-report-2013
fireeye-advanced-threat-report-2013
Internet Threats Trend Report
April 2011 Internet Threats Trend Report
b-istr_main_report_v18_2012_21291018.en-us
websense-2013-threat-report
b-istr_main_report_v18_2012_21291018.en-us
Commtouch-Internet-Threats-Trend-Report-2012-July
b-istr_main_report_v19_21291018.en-us
October 2011 Internet Threats Trend Report