X hits on this document

PDF document

Symantec enterpriSe Security - page 4 / 97

310 views

0 shares

0 downloads

0 comments

4 / 97

4

Malicious activity by country . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

Data breaches that could lead to identity theft

by cause and identities exposed . . . . . . . . .9

Top attacked vulnerabilities, 2009. . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Top Web-based attacks . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Threats to confidential information, by type . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Unique brands phished, by sector . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Top spam categories. . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Goods and services advertised on underground

economy servers . . . . . . . . . . . . . . . . . . . . 15

Malicious activity by country . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Top Web-based attacks . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

Top countries of origin for Web-based attacks .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Data breaches that could lead to identity theft identities exposed by sector . . . . . . . . . . . . . . . . .

by sector and . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Data breaches that could lead to identity theft

by cause and identities exposed . . . . . . . 29

Active bot-infected computers, by day . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Web browser vulnerabilities . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Window of exposure for Web browsers. . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Web browser plug-in vulnerabilities . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Top attacked vulnerabilities, 2009. . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Symantec Global internet Security threat report

Contents for Tables and Figures

Table 1.

Figure 1

Table 2.

Table 3.

Figure 2.

Table 4.

Figure 3.

Table 5.

Table 6.

Table 7.

Table 8.

Figure 4.

Figure 5.

Figure 6.

Figure 11. Prevalence of malicious code types by potentia

l infections . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Table 12. Top staged downloaders . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Figure 7.

Figure 8.

Figure 9.

Table 9.

Table 10

. Top attacked vulnerabilities, 2008. . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Figure 10. New malicious code signatures . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Table 11. Top new malicious code families . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Document info
Document views310
Page views310
Page last viewedSun Dec 11 10:13:03 UTC 2016
Pages97
Paragraphs2532
Words45916

Comments