Figure 1.Distribution Of Attacks Targeting Web Browsers

Preview:

DESCRIPTION

Figure 1.Distribution Of Attacks Targeting Web Browsers. Figure 2. Window Of Exposure, Enterprise Vendors. Figure 3. Operating System Window Of Exposure. Figure 4. Web Browsers Window Of Exposure. Figure 5. Web Browser Vulnerabilities. Figure 6. Active Bot Network Computers Per Day. - PowerPoint PPT Presentation

Citation preview

1Internet Security Threat Report X

Internet Security Threat Report VI

Figure 1.Distribution Of Attacks Targeting Web Browsers

2Internet Security Threat Report X

Internet Security Threat Report VI

Figure 2. Window Of Exposure, Enterprise Vendors

3Internet Security Threat Report X

Internet Security Threat Report VI

Figure 3. Operating System Window Of Exposure

4Internet Security Threat Report X

Internet Security Threat Report VI

Figure 4. Web Browsers Window Of Exposure

5Internet Security Threat Report X

Internet Security Threat Report VI

Figure 5. Web Browser Vulnerabilities

6Internet Security Threat Report X

Internet Security Threat Report VI

Figure 6. Active Bot Network Computers Per Day

7Internet Security Threat Report X

Internet Security Threat Report VI

Figure 7. Number Of Unique Phishing Messages

8Internet Security Threat Report X

Internet Security Threat Report VI

Figure 8. Phishing Activity By Sector

9Internet Security Threat Report X

Internet Security Threat Report VI

Figure 9. Distribution of Attacks Targeting Web Browsers

10Internet Security Threat Report X

Internet Security Threat Report VI

Figure 10. Denial Of Service Attacks Per Day

11Internet Security Threat Report X

Internet Security Threat Report VI

Figure 11. Top Countries Targeted By Denial Of Service Attacks

12Internet Security Threat Report X

Internet Security Threat Report VI

Figure 12. Active Bot Network Computers Per Day

13Internet Security Threat Report X

Internet Security Threat Report VI

Figure 13. Top Countries By Bot-Infected Computers

14Internet Security Threat Report X

Internet Security Threat Report VI

Figure 14. Distribution Of Command-And-Control Servers

15Internet Security Threat Report X

Internet Security Threat Report VI

Figure 15. Top Originating Countries

16Internet Security Threat Report X

Internet Security Threat Report VI

Figure 16. Total Volume Of Vulnerabilities

17Internet Security Threat Report X

Internet Security Threat Report VI

Figure 17. Web Application Vulnerabilities

18Internet Security Threat Report X

Internet Security Threat Report VI

Figure 18. Easily Exploitable Vulnerabilities

19Internet Security Threat Report X

Internet Security Threat Report VI

Figure 19. Easily Exploitable Vulnerabilities By Type

20Internet Security Threat Report X

Internet Security Threat Report VI

Figure 20. Window Of Exposure, Enterprise Vendors

21Internet Security Threat Report X

Internet Security Threat Report VI

Figure 21. Operating System Exploit Development Time

22Internet Security Threat Report X

Internet Security Threat Report VI

Figure 22. Operating System Patch Development Time

23Internet Security Threat Report X

Internet Security Threat Report VI

Figure 23. Operating System Window Of Exposure

24Internet Security Threat Report X

Internet Security Threat Report VI

Figure 24. Patch Development Time, Web Browsers

25Internet Security Threat Report X

Internet Security Threat Report VI

Figure 25. Window Of Exposure, Web Browsers

26Internet Security Threat Report X

Internet Security Threat Report VI

Figure 26. Web Browser Vulnerabilities

27Internet Security Threat Report X

Internet Security Threat Report VI

Figure 27. Exploit Code Release Period

28Internet Security Threat Report X

Internet Security Threat Report VI

Figure 28. Previously Unseen Threats As A Proportion Of All Threats

29Internet Security Threat Report X

Internet Security Threat Report VI

Figure 29. Malicious Code Types By Volume

30Internet Security Threat Report X

Internet Security Threat Report VI

Figure 30. New Win32 Virus And Worm Variants

31Internet Security Threat Report X

Internet Security Threat Report VI

Figure 31. Volume Of Bots Reported

32Internet Security Threat Report X

Internet Security Threat Report VI

Figure 32. Exposure Of Confidential Information

33Internet Security Threat Report X

Internet Security Threat Report VI

Figure 33. Percentage Of Instant Messaging Threat Propagation By Protocol

34Internet Security Threat Report X

Internet Security Threat Report VI

Figure 34. Volume Of Modular Malicious Code

35Internet Security Threat Report X

Internet Security Threat Report VI

Figure 35. Modular Malicious Code Samples

36Internet Security Threat Report X

Internet Security Threat Report VI

Figure 36. Malicious Code Propagation Vectors

37Internet Security Threat Report X

Internet Security Threat Report VI

Figure 37. Number Of Unique Phishing Messages

38Internet Security Threat Report X

Internet Security Threat Report VI

Figure 38. Blocked Phishing Attempts

39Internet Security Threat Report X

Internet Security Threat Report VI

Figure 39. Phishing Activity By Sector

40Internet Security Threat Report X

Internet Security Threat Report VI

Figure 40. Spam Categories

41Internet Security Threat Report X

Internet Security Threat Report VI

Figure 41. Top Ten Countries Of Spam Origin

42Internet Security Threat Report X

Internet Security Threat Report VI

Figure 42. Spam Containing Malicious Code

43Internet Security Threat Report X

Internet Security Threat Report VI

Figure 43. Industry Representational Breakdown

44Internet Security Threat Report X

Internet Security Threat Report VI

Table 1. TopTargetedSector

45Internet Security Threat Report X

Internet Security Threat Report VI

Table 2. TopSectDoSAtks

46Internet Security Threat Report X

Internet Security Threat Report VI

Table 3. TopWebBrwsrAttacks

47Internet Security Threat Report X

Internet Security Threat Report VI

Table 4. TopAttacksWireless

48Internet Security Threat Report X

Internet Security Threat Report VI

Table 5. TopSectDoSAtks

49Internet Security Threat Report X

Internet Security Threat Report VI

Table 6. TopBotNetworkCities

50Internet Security Threat Report X

Internet Security Threat Report VI

Table 7. TopTargetedSector

51Internet Security Threat Report X

Internet Security Threat Report VI

Table 8. TopNewMalCodeFam

52Internet Security Threat Report X

Internet Security Threat Report VI

Table 10. Top10CountSpamOrg

53Internet Security Threat Report X

Internet Security Threat Report VI

Table 11. TopNewSecurRisks

54Internet Security Threat Report X

Internet Security Threat Report VI

Table 12. Anti-removalTechs

55Internet Security Threat Report X

Internet Security Threat Report VI

Table 13. Self-updatSecur

56Internet Security Threat Report X

Internet Security Threat Report VI

Table 14. TopSecurityRisks

Recommended