56
1 Internet Security Threat Report X nternet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers

Figure 1.Distribution Of Attacks Targeting Web Browsers

  • Upload
    suki

  • View
    22

  • Download
    2

Embed Size (px)

DESCRIPTION

Figure 1.Distribution Of Attacks Targeting Web Browsers. Figure 2. Window Of Exposure, Enterprise Vendors. Figure 3. Operating System Window Of Exposure. Figure 4. Web Browsers Window Of Exposure. Figure 5. Web Browser Vulnerabilities. Figure 6. Active Bot Network Computers Per Day. - PowerPoint PPT Presentation

Citation preview

Page 1: Figure 1.Distribution Of Attacks Targeting Web Browsers

1Internet Security Threat Report X

Internet Security Threat Report VI

Figure 1.Distribution Of Attacks Targeting Web Browsers

Page 2: Figure 1.Distribution Of Attacks Targeting Web Browsers

2Internet Security Threat Report X

Internet Security Threat Report VI

Figure 2. Window Of Exposure, Enterprise Vendors

Page 3: Figure 1.Distribution Of Attacks Targeting Web Browsers

3Internet Security Threat Report X

Internet Security Threat Report VI

Figure 3. Operating System Window Of Exposure

Page 4: Figure 1.Distribution Of Attacks Targeting Web Browsers

4Internet Security Threat Report X

Internet Security Threat Report VI

Figure 4. Web Browsers Window Of Exposure

Page 5: Figure 1.Distribution Of Attacks Targeting Web Browsers

5Internet Security Threat Report X

Internet Security Threat Report VI

Figure 5. Web Browser Vulnerabilities

Page 6: Figure 1.Distribution Of Attacks Targeting Web Browsers

6Internet Security Threat Report X

Internet Security Threat Report VI

Figure 6. Active Bot Network Computers Per Day

Page 7: Figure 1.Distribution Of Attacks Targeting Web Browsers

7Internet Security Threat Report X

Internet Security Threat Report VI

Figure 7. Number Of Unique Phishing Messages

Page 8: Figure 1.Distribution Of Attacks Targeting Web Browsers

8Internet Security Threat Report X

Internet Security Threat Report VI

Figure 8. Phishing Activity By Sector

Page 9: Figure 1.Distribution Of Attacks Targeting Web Browsers

9Internet Security Threat Report X

Internet Security Threat Report VI

Figure 9. Distribution of Attacks Targeting Web Browsers

Page 10: Figure 1.Distribution Of Attacks Targeting Web Browsers

10Internet Security Threat Report X

Internet Security Threat Report VI

Figure 10. Denial Of Service Attacks Per Day

Page 11: Figure 1.Distribution Of Attacks Targeting Web Browsers

11Internet Security Threat Report X

Internet Security Threat Report VI

Figure 11. Top Countries Targeted By Denial Of Service Attacks

Page 12: Figure 1.Distribution Of Attacks Targeting Web Browsers

12Internet Security Threat Report X

Internet Security Threat Report VI

Figure 12. Active Bot Network Computers Per Day

Page 13: Figure 1.Distribution Of Attacks Targeting Web Browsers

13Internet Security Threat Report X

Internet Security Threat Report VI

Figure 13. Top Countries By Bot-Infected Computers

Page 14: Figure 1.Distribution Of Attacks Targeting Web Browsers

14Internet Security Threat Report X

Internet Security Threat Report VI

Figure 14. Distribution Of Command-And-Control Servers

Page 15: Figure 1.Distribution Of Attacks Targeting Web Browsers

15Internet Security Threat Report X

Internet Security Threat Report VI

Figure 15. Top Originating Countries

Page 16: Figure 1.Distribution Of Attacks Targeting Web Browsers

16Internet Security Threat Report X

Internet Security Threat Report VI

Figure 16. Total Volume Of Vulnerabilities

Page 17: Figure 1.Distribution Of Attacks Targeting Web Browsers

17Internet Security Threat Report X

Internet Security Threat Report VI

Figure 17. Web Application Vulnerabilities

Page 18: Figure 1.Distribution Of Attacks Targeting Web Browsers

18Internet Security Threat Report X

Internet Security Threat Report VI

Figure 18. Easily Exploitable Vulnerabilities

Page 19: Figure 1.Distribution Of Attacks Targeting Web Browsers

19Internet Security Threat Report X

Internet Security Threat Report VI

Figure 19. Easily Exploitable Vulnerabilities By Type

Page 20: Figure 1.Distribution Of Attacks Targeting Web Browsers

20Internet Security Threat Report X

Internet Security Threat Report VI

Figure 20. Window Of Exposure, Enterprise Vendors

Page 21: Figure 1.Distribution Of Attacks Targeting Web Browsers

21Internet Security Threat Report X

Internet Security Threat Report VI

Figure 21. Operating System Exploit Development Time

Page 22: Figure 1.Distribution Of Attacks Targeting Web Browsers

22Internet Security Threat Report X

Internet Security Threat Report VI

Figure 22. Operating System Patch Development Time

Page 23: Figure 1.Distribution Of Attacks Targeting Web Browsers

23Internet Security Threat Report X

Internet Security Threat Report VI

Figure 23. Operating System Window Of Exposure

Page 24: Figure 1.Distribution Of Attacks Targeting Web Browsers

24Internet Security Threat Report X

Internet Security Threat Report VI

Figure 24. Patch Development Time, Web Browsers

Page 25: Figure 1.Distribution Of Attacks Targeting Web Browsers

25Internet Security Threat Report X

Internet Security Threat Report VI

Figure 25. Window Of Exposure, Web Browsers

Page 26: Figure 1.Distribution Of Attacks Targeting Web Browsers

26Internet Security Threat Report X

Internet Security Threat Report VI

Figure 26. Web Browser Vulnerabilities

Page 27: Figure 1.Distribution Of Attacks Targeting Web Browsers

27Internet Security Threat Report X

Internet Security Threat Report VI

Figure 27. Exploit Code Release Period

Page 28: Figure 1.Distribution Of Attacks Targeting Web Browsers

28Internet Security Threat Report X

Internet Security Threat Report VI

Figure 28. Previously Unseen Threats As A Proportion Of All Threats

Page 29: Figure 1.Distribution Of Attacks Targeting Web Browsers

29Internet Security Threat Report X

Internet Security Threat Report VI

Figure 29. Malicious Code Types By Volume

Page 30: Figure 1.Distribution Of Attacks Targeting Web Browsers

30Internet Security Threat Report X

Internet Security Threat Report VI

Figure 30. New Win32 Virus And Worm Variants

Page 31: Figure 1.Distribution Of Attacks Targeting Web Browsers

31Internet Security Threat Report X

Internet Security Threat Report VI

Figure 31. Volume Of Bots Reported

Page 32: Figure 1.Distribution Of Attacks Targeting Web Browsers

32Internet Security Threat Report X

Internet Security Threat Report VI

Figure 32. Exposure Of Confidential Information

Page 33: Figure 1.Distribution Of Attacks Targeting Web Browsers

33Internet Security Threat Report X

Internet Security Threat Report VI

Figure 33. Percentage Of Instant Messaging Threat Propagation By Protocol

Page 34: Figure 1.Distribution Of Attacks Targeting Web Browsers

34Internet Security Threat Report X

Internet Security Threat Report VI

Figure 34. Volume Of Modular Malicious Code

Page 35: Figure 1.Distribution Of Attacks Targeting Web Browsers

35Internet Security Threat Report X

Internet Security Threat Report VI

Figure 35. Modular Malicious Code Samples

Page 36: Figure 1.Distribution Of Attacks Targeting Web Browsers

36Internet Security Threat Report X

Internet Security Threat Report VI

Figure 36. Malicious Code Propagation Vectors

Page 37: Figure 1.Distribution Of Attacks Targeting Web Browsers

37Internet Security Threat Report X

Internet Security Threat Report VI

Figure 37. Number Of Unique Phishing Messages

Page 38: Figure 1.Distribution Of Attacks Targeting Web Browsers

38Internet Security Threat Report X

Internet Security Threat Report VI

Figure 38. Blocked Phishing Attempts

Page 39: Figure 1.Distribution Of Attacks Targeting Web Browsers

39Internet Security Threat Report X

Internet Security Threat Report VI

Figure 39. Phishing Activity By Sector

Page 40: Figure 1.Distribution Of Attacks Targeting Web Browsers

40Internet Security Threat Report X

Internet Security Threat Report VI

Figure 40. Spam Categories

Page 41: Figure 1.Distribution Of Attacks Targeting Web Browsers

41Internet Security Threat Report X

Internet Security Threat Report VI

Figure 41. Top Ten Countries Of Spam Origin

Page 42: Figure 1.Distribution Of Attacks Targeting Web Browsers

42Internet Security Threat Report X

Internet Security Threat Report VI

Figure 42. Spam Containing Malicious Code

Page 43: Figure 1.Distribution Of Attacks Targeting Web Browsers

43Internet Security Threat Report X

Internet Security Threat Report VI

Figure 43. Industry Representational Breakdown

Page 44: Figure 1.Distribution Of Attacks Targeting Web Browsers

44Internet Security Threat Report X

Internet Security Threat Report VI

Table 1. TopTargetedSector

Page 45: Figure 1.Distribution Of Attacks Targeting Web Browsers

45Internet Security Threat Report X

Internet Security Threat Report VI

Table 2. TopSectDoSAtks

Page 46: Figure 1.Distribution Of Attacks Targeting Web Browsers

46Internet Security Threat Report X

Internet Security Threat Report VI

Table 3. TopWebBrwsrAttacks

Page 47: Figure 1.Distribution Of Attacks Targeting Web Browsers

47Internet Security Threat Report X

Internet Security Threat Report VI

Table 4. TopAttacksWireless

Page 48: Figure 1.Distribution Of Attacks Targeting Web Browsers

48Internet Security Threat Report X

Internet Security Threat Report VI

Table 5. TopSectDoSAtks

Page 49: Figure 1.Distribution Of Attacks Targeting Web Browsers

49Internet Security Threat Report X

Internet Security Threat Report VI

Table 6. TopBotNetworkCities

Page 50: Figure 1.Distribution Of Attacks Targeting Web Browsers

50Internet Security Threat Report X

Internet Security Threat Report VI

Table 7. TopTargetedSector

Page 51: Figure 1.Distribution Of Attacks Targeting Web Browsers

51Internet Security Threat Report X

Internet Security Threat Report VI

Table 8. TopNewMalCodeFam

Page 52: Figure 1.Distribution Of Attacks Targeting Web Browsers

52Internet Security Threat Report X

Internet Security Threat Report VI

Table 10. Top10CountSpamOrg

Page 53: Figure 1.Distribution Of Attacks Targeting Web Browsers

53Internet Security Threat Report X

Internet Security Threat Report VI

Table 11. TopNewSecurRisks

Page 54: Figure 1.Distribution Of Attacks Targeting Web Browsers

54Internet Security Threat Report X

Internet Security Threat Report VI

Table 12. Anti-removalTechs

Page 55: Figure 1.Distribution Of Attacks Targeting Web Browsers

55Internet Security Threat Report X

Internet Security Threat Report VI

Table 13. Self-updatSecur

Page 56: Figure 1.Distribution Of Attacks Targeting Web Browsers

56Internet Security Threat Report X

Internet Security Threat Report VI

Table 14. TopSecurityRisks