1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of...

Post on 26-Dec-2015

218 views 0 download

Tags:

transcript

1Internet Security Threat Report X

Internet Security Threat Report VI

Figure 1.Distribution Of Attacks Targeting Web Browsers

2Internet Security Threat Report X

Internet Security Threat Report VI

Figure 2. Window Of Exposure, Enterprise Vendors

3Internet Security Threat Report X

Internet Security Threat Report VI

Figure 3. Operating System Window Of Exposure

4Internet Security Threat Report X

Internet Security Threat Report VI

Figure 4. Web Browsers Window Of Exposure

5Internet Security Threat Report X

Internet Security Threat Report VI

Figure 5. Web Browser Vulnerabilities

6Internet Security Threat Report X

Internet Security Threat Report VI

Figure 6. Active Bot Network Computers Per Day

7Internet Security Threat Report X

Internet Security Threat Report VI

Figure 7. Number Of Unique Phishing Messages

8Internet Security Threat Report X

Internet Security Threat Report VI

Figure 8. Phishing Activity By Sector

9Internet Security Threat Report X

Internet Security Threat Report VI

Figure 9. Distribution of Attacks Targeting Web Browsers

10Internet Security Threat Report X

Internet Security Threat Report VI

Figure 10. Denial Of Service Attacks Per Day

11Internet Security Threat Report X

Internet Security Threat Report VI

Figure 11. Top Countries Targeted By Denial Of Service Attacks

12Internet Security Threat Report X

Internet Security Threat Report VI

Figure 12. Active Bot Network Computers Per Day

13Internet Security Threat Report X

Internet Security Threat Report VI

Figure 13. Top Countries By Bot-Infected Computers

14Internet Security Threat Report X

Internet Security Threat Report VI

Figure 14. Distribution Of Command-And-Control Servers

15Internet Security Threat Report X

Internet Security Threat Report VI

Figure 15. Top Originating Countries

16Internet Security Threat Report X

Internet Security Threat Report VI

Figure 16. Total Volume Of Vulnerabilities

17Internet Security Threat Report X

Internet Security Threat Report VI

Figure 17. Web Application Vulnerabilities

18Internet Security Threat Report X

Internet Security Threat Report VI

Figure 18. Easily Exploitable Vulnerabilities

19Internet Security Threat Report X

Internet Security Threat Report VI

Figure 19. Easily Exploitable Vulnerabilities By Type

20Internet Security Threat Report X

Internet Security Threat Report VI

Figure 20. Window Of Exposure, Enterprise Vendors

21Internet Security Threat Report X

Internet Security Threat Report VI

Figure 21. Operating System Exploit Development Time

22Internet Security Threat Report X

Internet Security Threat Report VI

Figure 22. Operating System Patch Development Time

23Internet Security Threat Report X

Internet Security Threat Report VI

Figure 23. Operating System Window Of Exposure

24Internet Security Threat Report X

Internet Security Threat Report VI

Figure 24. Patch Development Time, Web Browsers

25Internet Security Threat Report X

Internet Security Threat Report VI

Figure 25. Window Of Exposure, Web Browsers

26Internet Security Threat Report X

Internet Security Threat Report VI

Figure 26. Web Browser Vulnerabilities

27Internet Security Threat Report X

Internet Security Threat Report VI

Figure 27. Exploit Code Release Period

28Internet Security Threat Report X

Internet Security Threat Report VI

Figure 28. Previously Unseen Threats As A Proportion Of All Threats

29Internet Security Threat Report X

Internet Security Threat Report VI

Figure 29. Malicious Code Types By Volume

30Internet Security Threat Report X

Internet Security Threat Report VI

Figure 30. New Win32 Virus And Worm Variants

31Internet Security Threat Report X

Internet Security Threat Report VI

Figure 31. Volume Of Bots Reported

32Internet Security Threat Report X

Internet Security Threat Report VI

Figure 32. Exposure Of Confidential Information

33Internet Security Threat Report X

Internet Security Threat Report VI

Figure 33. Percentage Of Instant Messaging Threat Propagation By Protocol

34Internet Security Threat Report X

Internet Security Threat Report VI

Figure 34. Volume Of Modular Malicious Code

35Internet Security Threat Report X

Internet Security Threat Report VI

Figure 35. Modular Malicious Code Samples

36Internet Security Threat Report X

Internet Security Threat Report VI

Figure 36. Malicious Code Propagation Vectors

37Internet Security Threat Report X

Internet Security Threat Report VI

Figure 37. Number Of Unique Phishing Messages

38Internet Security Threat Report X

Internet Security Threat Report VI

Figure 38. Blocked Phishing Attempts

39Internet Security Threat Report X

Internet Security Threat Report VI

Figure 39. Phishing Activity By Sector

40Internet Security Threat Report X

Internet Security Threat Report VI

Figure 40. Spam Categories

41Internet Security Threat Report X

Internet Security Threat Report VI

Figure 41. Top Ten Countries Of Spam Origin

42Internet Security Threat Report X

Internet Security Threat Report VI

Figure 42. Spam Containing Malicious Code

43Internet Security Threat Report X

Internet Security Threat Report VI

Figure 43. Industry Representational Breakdown

44Internet Security Threat Report X

Internet Security Threat Report VI

Table 1. TopTargetedSector

45Internet Security Threat Report X

Internet Security Threat Report VI

Table 2. TopSectDoSAtks

46Internet Security Threat Report X

Internet Security Threat Report VI

Table 3. TopWebBrwsrAttacks

47Internet Security Threat Report X

Internet Security Threat Report VI

Table 4. TopAttacksWireless

48Internet Security Threat Report X

Internet Security Threat Report VI

Table 5. TopSectDoSAtks

49Internet Security Threat Report X

Internet Security Threat Report VI

Table 6. TopBotNetworkCities

50Internet Security Threat Report X

Internet Security Threat Report VI

Table 7. TopTargetedSector

51Internet Security Threat Report X

Internet Security Threat Report VI

Table 8. TopNewMalCodeFam

52Internet Security Threat Report X

Internet Security Threat Report VI

Table 10. Top10CountSpamOrg

53Internet Security Threat Report X

Internet Security Threat Report VI

Table 11. TopNewSecurRisks

54Internet Security Threat Report X

Internet Security Threat Report VI

Table 12. Anti-removalTechs

55Internet Security Threat Report X

Internet Security Threat Report VI

Table 13. Self-updatSecur

56Internet Security Threat Report X

Internet Security Threat Report VI

Table 14. TopSecurityRisks