SlideShare uma empresa Scribd logo
1 de 54
Baixar para ler offline
1
Agenda
2
2013: The Year of Mega Breach1
Targeted Attack Campaigns on the Rise2
The Evolution of Malware3
Mobile = Danger4
Vulnerabilities Continue to Facilitate Attacks5
Future Trend: Internet of Things6
Threat Landscape in 2013
3
Cyberespionage
Privacy
Malicious Insider
Ransomware
Data Breaches
Mobile
Internet of Things
Mega Breaches
4
2013 was the Year of the Mega Breach
Breaches
Identities Exposed
Breaches >10M
2011
208
232M
5
2013
253
552M
8
2012
165
93M
1
Timeline of Mega Breaches
5
Timeline of Data Breaches, 2013
Source: Symantec
43
12
3
53
23
6 8
0.3 0.8
159
113
130
24
17
19
15 15 15
37
17
22
26
20
26
0
20
40
60
80
100
120
140
160
0
5
10
15
20
25
30
35
40
J F M A M J J A S O N D
IDENTITIESEXPOSED(Millions)
NUMBEROFINCIDNETS
INCIDENTS IDENTITIES EXPOSED (Millions)
8 of the top 10
breaches were of
more than 10 million identities
Number of identities exposed
were 4 times greater
than 2012
Causes of Breaches
6
Top Causes of Data Breach, 2013
Source: Symantec
Hackers
Accidentally
Made Public
Theft or Loss
of Computer
or Drive
Insider Theft
Unknown
Fraud
34%
29%
27%
6%
2%
2%
87
72
69
15
6
4
253TOTAL
Number
of Incidents
Average number of
identities exposed per data
breach for hacking incidents
was approximately
4.7 million
Theft or loss + accidental
breaches accounted for
56% of data breach
incidents
Breaches by Sector
7
Data Breaches by Sector, 2013
Source: Symantec
Data Breaches by Sector,
Percent of Identities Exposed, 2013
Source: Symantec
Healthcare, education and the public sectors accounted for 58%
of all data breaches
But, the retail, computer software and financial sectors accounted for 77%
of all identities exposed in 2013
12% Government
7% Accounting
5% Retail
4% Computer
Software
Other
12%Healthcare
44%
Education
16%
3% Financial
3%
3%
3%
Transportation
Insurance
Hospitality
Retail
30%
Computer
Software
16%
Information
Technology
Financial
19%
Hospitality
Telecom
Accounting
Healthcare
Other
4%
4%
1%
1%
2%
2%
Social
Networking
9%
Breaches: What Was Lost?
8
Real Names
Birth Dates
Government ID Numbers (Social Security)
Home Address
Medical Records
Phone Numbers
Financial Information
Email Addresses
User Names & Passwords
Insurance
01
02
03
04
05
06
07
08
09
10
Targeted Attacks
9
Increase in Targeted Attacks
10
+91%
Increase in targeted attack campaigns
2012
2013
Defining an Attack Campaign
• Show clear evidence that subject and target were deliberately selected
• Contain at least 3 or 4 strong correlations to other emails – topic, sender
address, source IP address, etc.
• Sent on the same day or across multiple days
11
A series of emails that:
Targeted Attack Campaigns
12
2011 2012 2013
Email per Campaign
Recipient/Campaign
78
122
29
61
111
23
Campaigns
Duration of Campaign
165
408
779
4 days 3 days 8.3 days
Targeted Industries
13
Top 10 Industries Targeted
in Spear-Phishing Attacks, 2013
Source: Symantec
Public Administration (Gov.)
Services – Professional
Services – Non-Traditional
Manufacturing
Finance, Insurance
& Real Estate
Transportation, Gas,
Communications, Electric
Wholesale
Retail
Mining
Construction
16%
15
14
13
13
6
5
2
1
1
Targeted Organization by Size
14
Spear Phishing Attacks by Size of Targeted Organization, 2011 - 2013
Source: Symantec
50% 50%
39%
18%
31% 30%
100%
0
2011 2012 2013
1,501 to 2,500
1,001 to 1,500
501 to 1,000
251 to 500
1 to 250
2,501+
Employees
50% 50%
61%
Most Likely to be Targeted
15
Executive Assistant at a
large mining company
JohnDoe@drillanddig.com
Attacker
Re: Order Payment
Please click on this executable to see your order
information.
Risk of Being Targeted by Job Role
16
Personal Assistant (Executive Assistant)
High
Medium
Low
Media
Senior Management
Sales
C-Level
Recruitment
R&D
Risk
Risk of Job Role Impact by Targeted Attack
Sent by Spear-Phishing Email
Source: Symantec
Risk of Being Targeted by Industry
17
Ratio of Organization in an Industry
Impacted by Target Attack
Sent by Spear-Phishing Email
Source: Symantec
High
Medium
Low
Risk
Mining
Public Administration (Government)
Manufacturing
Wholesale
Transportation, Communications,
Electric, Gas & Sanitary Services
Finance, Insurance & Real Estate
Services – Non-Traditional
Construction
Agriculture, Forestry & Fishing
2.7
3.1
3.2
3.4
3.9
4.8
6.6
11.3
12.0
1 in
Risk of Being Targeted by Industry Size
18
Ratio of Organization Targeted by Industry Size
Sent by Spear-Phishing Email
Source: Symantec
High
Medium
Risk
2,500+
1,501-2,500
1,001-1,500
501-1,000
251-500
1-250
2.3
2.9
2.9
3.8
4.3
5.2
1 in
Word Cloud: Spear Phishing Attacks
19
Most frequently occurring words used in targeted
spear phishing email attacks throughout 2013
22
Vulnerabilities
23
Zero-Day Vulnerabilities
24
13
15
9
12
14
8
14
23
0
5
10
15
20
25
30
2006 2007 2008 2009 2010 2011 2012 2013
Zero-Day Vulnerabilities, Annual Total,
2006 - 2013
Source: Symantec
23 zero-day vulnerabilities
discovered in 2013
Increase from 14 in 2012
More zero-day vulnerabilities
discovered in 2013 than in any
year since we started tracking
More zero-days in 2013 than
in past two years combined
Website Vulnerabilities
25
Scanned Websites With Vulnerabilities
53% 78%
+25%
pts
2012 2013
1 IN 8 sites had critical unpatched vulnerabilities
Malicious Websites
With so many vulnerable websites, cybercriminals don’t
need to set up own websites to host malware
26
New Unique Malicious Web Domains
56,158
74,001
74,001
-24%2013
2012
2011
Web-based Attacks
Web-based attacks continue to grow
27
Web Attacks Blocked Per Day
568,700
464,100
190,000
+23%
2013
2012
2011
Ransomware
28
FakeAV depended on
fear to work
When everyone
knows it’s fake, there
is no fear and the
scam fails.
29
Precursor to Ransomware
30
Cybercriminals
moved to
ransomware
Fear of arrest
Simple and (for bad
guys) safe method of
receiving “fine”
At $100-$400
a victim, it’s very
profitable
From FakeAV to Ransomware
31
Ransomware
Ransomware exploded globally in 2013
With only online payment options
limiting its reach
With only 1.5 million Internet-connected
computers, even the Palestine Territories
is a big enough target for criminals
Ransomware’s Growth
32
in Ransomware
attacks in 2013
112 107 138 141
178 189
286
421
625
419
861
660
0
100
200
300
400
500
600
700
800
900
1000
J F M A M J J A S O N D
Ransomeware Over Time, 2013
Source: Symantec
500%
increase
Ransomware Turns Vicious
When people stop
fearing ransomware?
Cryptolocker happens!
Cryptolocker most
prevalent in threat
category called
ransomcrypt
No pretense of a fine
Must pay to get your
files back
33
Ransomcrypt
Cybercriminals use
cryptocurrencies
when doing business
with each other
They’d like to make
victims use them, too
34
Ransomcrypt: Some Perspective
35
Number of Attacks Still Small
In December, just 0.2 percent of all ransomware
was CryptoLocker
Threat is Not New
Trojan.Gpcoder (May 2005)
Trojan.Ransomcrypt (June 2009)
What is New?
Online payment methods
Good encryption
Cryptolocker uses RSA 2048 Encryption
Poised for Growth
Mobile = Danger
36
Mobile Threats
Android remains the platform of choice for malware authors
37
Android
Symbian
Windows
Number
of Threats
57
1
1
Percent
of Threats
97%
2%
2%
0 0%
Platform
iOS
Mobile Threats: Malicious Code by Platform, 2013
Source: Symantec
Mobile Malware
Creation of new mobile
malware slowed as
malware authors focused
on improving existing
malware
Average number of
variants per family in
2012 was 1:38
Increased to 1:57 in 2013
38
Android Mobile
Malware Families
Average Number of
Variant Per Family
57 57
103 38
2013 2013
-45% +50%
2013 2013
Mobile Users at Risk
39
50%
38%
Source: 2013 Norton Report
Don’t use basic precautions such as
passwords, security software or back
up files for their mobile device
Of smartphone users have experienced
mobile cybercrime in past 12 months
72%90% 78%
56% 48%33%
DELETE SUSPICIOUS
EMAILS FROM PEOPLE
THEY DON’T KNOW
HAVE AT LEAST A BASIC
FREE ANTIVIRUS
SOLUTION
AVOID STORING
SENSITIVE FILES
ONLINE
Mobile Security IQ
40
Source: 2013 Norton Report
Mobile: A Dangerous Mix
1. Prevalence of mobile devices
2. Maturing of mobile malware
3. Mixing of work and personal information on devices
4. User’s lack of smart smartphone risk awareness
41
Future Trend: Internet of Things
42
Future Trend: Internet of Things
43
Confirmed:
Real world attacks against
security cameras and baby
monitors
Demonstrated:
Hacking attacks against
televisions, cars and medical
equipment
Exaggerated:
Reports of refrigerators sending
spam messages
44
With NAT router all devices
appear to have a single IP
address
A Refrigerator and a PC look
like the same IP address
But spam was sent by
W32.Waledac (Kelihos)
• W32 means a Windows OS
NAT Router
Internet of Things: Busting Refrigerator Myth
Internet of Things: Real Risks
45
Biggest Risk? Routers
• Linux.Darlloz infects Linux PCs and
IoT devices running Linux
• Linux.Aidra targets cable and DSL
modems
Uses for Infected Routers?
• DDoS attacks
• Browser re-direction
• Even cryptocurriences mining
Reason for Attacks?
• Unpatched vulnerabilities
• Unchanged default passwords
Internet of Things: What’s Next?
Wearable Devices
They will be measuring and transmitting:
• Pulse
• Weight
• Time slept
• Glucose levels
• Blood pressure
• Exposure to sunlight
• Teeth brushing habits
• And more…
As more of our personal information travels the
Internet what will become of it?
47
Download: symantec.com/threatreport
Follow: @threatintel
Stay Informed
Solutions
48
Avoiding Data Breaches
49
Data Classification
• Determine what sensitive information exists in your organization
• Categorize it appropriately and protect it according to its classification level
Data Loss Prevention
• Detect and prevent exfiltration of sensitive information that is targeted by
attackers
• Enforce rules prohibiting access of confidential data using applications
Host-based Intrusion
Detection and Prevention
• Locks down key systems that contain confidential information
• Prevents any unauthorized code to run — independent of AV signatures
Email & Web Gateway Security
• Scan & block email with potentially malicious URLs, attachments or content.
• Monitor inbound/outbound web traffic and block accordingly
Encryption • Create and enforce security policy so all confidential information is encrypted
Strong Authentication • Use two-factor authentication to protect against credential theft
Protection Against Targeted Attacks
50
Reputational & Behavioral
Protection
• Detect and block new and unknown threats based on global reputation and
behavior of files
Host-based Intrusion
Detection and Prevention
• Locks down key systems that contain confidential information
• Prevents any unauthorized code to run — independent of AV signatures
Removable Media Device
Control
• Restrict removable devices and functions to prevent malware infection
Email & Web Gateway Security
• Scan & block email with potentially malicious URLs, attachments or content.
• Monitor inbound/outbound web traffic and block accordingly
Encryption
• Discover data spills of confidential information that are targeted by attackers
• Detect and prevent exfiltration of confidential information that are targeted by
attackers
Endpoint & Network Data
Correlation
• Create and enforce security policies so all confidential information is encrypted
Network Threat and
Vulnerability Monitoring
• Prioritize threat information detected at the network through security
intelligence and information coming from endpoint security devices.
Defending Against Malware
51
Reputational & Behavioral
Protection
• Detect and block new and unknown threats based on global reputation and
behavior of files
Host-based Intrusion
Detection and Prevention
• Locks down key systems that contain confidential information
• Prevents any unauthorized code to run — independent of AV signatures
Removable Media Device
Control
• Restrict removable devices and functions to prevent malware infection
Email & Web Gateway Security
• Scan & block email with potentially malicious URLs, attachments or content.
• Monitor inbound/outbound web traffic and block accordingly
Endpoint & Network Data
Correlation
• Prioritize threat information detected at the network through security
intelligence and information coming from endpoint security devices.
Security Awareness Program
• Ensure employees become the first line of defense against socially engineered
attacks, such as phishing, spear phishing, and other types of attacks
Mitigating Mobile Attacks
52
Application Management • Secure data in corporate applications regardless of device ownership
Device Management
• Remotely wipe devices in case of theft or loss, control password policies
• Update devices with applications as needed without physical access
Device Security
• Guard mobile device against malware
• Prevent the device from becoming a vulnerability
Identity & Access Control
• Provide strong authentication and authorization for access to enterprise
applications and resources
• Ensure safe access to enterprise resources from right devices with right postures
Secure File Sharing • Enable encrypted file sharing to ensure security as users share information
Vulnerability Security
53
Vulnerability
Management Program
• Routine, frequent vulnerability assessments and penetrations tests to identify
vulnerabilities in applications, systems, and mobile devices
• Formal process for addressing identified vulnerabilities
Configuration & Patch
Management Program
• Ensure all operating system and application patches are evaluated and deployed
in a timely manner
• Ensure adherence to formal, secure configuration standards
Application Virtualization
• Leverage application virtualization technologies to reduce risk when legacy web
browsers and older versions of 3rd party applications like JAVA or Adobe Reader
must be used for compatibility reasons
Reputational & Behavioral
Protection
• Detect and block new and unknown threats based on global reputation and
behavior of files
Removable Media Device
Control
• Restrict removable devices and functions to prevent malware infection
Thank you!
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
54

Mais conteúdo relacionado

Mais procurados

Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021 Roen Branham
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSPaul Walsh
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexAndreanne Clarke
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence ReportSymantec
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint
 

Mais procurados (20)

Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence Index
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 

Destaque

ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
Threat horizon 2017 by isf forum
Threat horizon 2017 by isf forumThreat horizon 2017 by isf forum
Threat horizon 2017 by isf forumfloora_jj
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicInApp
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceValery Yelanin
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Global Business Impact of COBIT 5
Global Business Impact of COBIT 5 Global Business Impact of COBIT 5
Global Business Impact of COBIT 5 ISACA
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!Dr David Probert
 

Destaque (13)

ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Threat horizon 2017 by isf forum
Threat horizon 2017 by isf forumThreat horizon 2017 by isf forum
Threat horizon 2017 by isf forum
 
Symantec Endpoint Protection 12.1
Symantec Endpoint Protection 12.1Symantec Endpoint Protection 12.1
Symantec Endpoint Protection 12.1
 
FireEye
FireEyeFireEye
FireEye
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Global Business Impact of COBIT 5
Global Business Impact of COBIT 5 Global Business Impact of COBIT 5
Global Business Impact of COBIT 5
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
DISPLAY LUMAscape
DISPLAY LUMAscapeDISPLAY LUMAscape
DISPLAY LUMAscape
 

Semelhante a Symantec Internet Security Threat Report 2014 - Volume 19

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013Karim Shaikh
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldInfinigate Group
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Waqas Amir
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat ReportRapidSSLOnline.com
 
HCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportHCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportMatthew J McMahon
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
 
INFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats EvolveINFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats EvolveSymantec
 

Semelhante a Symantec Internet Security Threat Report 2014 - Volume 19 (20)

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
 
CyberDen 2020
CyberDen 2020CyberDen 2020
CyberDen 2020
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Symantec Intelligence Report 2013
Symantec Intelligence Report 2013Symantec Intelligence Report 2013
Symantec Intelligence Report 2013
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
 
Istr 21-2016-en
Istr 21-2016-enIstr 21-2016-en
Istr 21-2016-en
 
HCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportHCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat report
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
INFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats EvolveINFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats Evolve
 

Mais de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Mais de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 

Último (20)

Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 

Symantec Internet Security Threat Report 2014 - Volume 19

  • 1. 1
  • 2. Agenda 2 2013: The Year of Mega Breach1 Targeted Attack Campaigns on the Rise2 The Evolution of Malware3 Mobile = Danger4 Vulnerabilities Continue to Facilitate Attacks5 Future Trend: Internet of Things6
  • 3. Threat Landscape in 2013 3 Cyberespionage Privacy Malicious Insider Ransomware Data Breaches Mobile Internet of Things
  • 4. Mega Breaches 4 2013 was the Year of the Mega Breach Breaches Identities Exposed Breaches >10M 2011 208 232M 5 2013 253 552M 8 2012 165 93M 1
  • 5. Timeline of Mega Breaches 5 Timeline of Data Breaches, 2013 Source: Symantec 43 12 3 53 23 6 8 0.3 0.8 159 113 130 24 17 19 15 15 15 37 17 22 26 20 26 0 20 40 60 80 100 120 140 160 0 5 10 15 20 25 30 35 40 J F M A M J J A S O N D IDENTITIESEXPOSED(Millions) NUMBEROFINCIDNETS INCIDENTS IDENTITIES EXPOSED (Millions) 8 of the top 10 breaches were of more than 10 million identities Number of identities exposed were 4 times greater than 2012
  • 6. Causes of Breaches 6 Top Causes of Data Breach, 2013 Source: Symantec Hackers Accidentally Made Public Theft or Loss of Computer or Drive Insider Theft Unknown Fraud 34% 29% 27% 6% 2% 2% 87 72 69 15 6 4 253TOTAL Number of Incidents Average number of identities exposed per data breach for hacking incidents was approximately 4.7 million Theft or loss + accidental breaches accounted for 56% of data breach incidents
  • 7. Breaches by Sector 7 Data Breaches by Sector, 2013 Source: Symantec Data Breaches by Sector, Percent of Identities Exposed, 2013 Source: Symantec Healthcare, education and the public sectors accounted for 58% of all data breaches But, the retail, computer software and financial sectors accounted for 77% of all identities exposed in 2013 12% Government 7% Accounting 5% Retail 4% Computer Software Other 12%Healthcare 44% Education 16% 3% Financial 3% 3% 3% Transportation Insurance Hospitality Retail 30% Computer Software 16% Information Technology Financial 19% Hospitality Telecom Accounting Healthcare Other 4% 4% 1% 1% 2% 2% Social Networking 9%
  • 8. Breaches: What Was Lost? 8 Real Names Birth Dates Government ID Numbers (Social Security) Home Address Medical Records Phone Numbers Financial Information Email Addresses User Names & Passwords Insurance 01 02 03 04 05 06 07 08 09 10
  • 10. Increase in Targeted Attacks 10 +91% Increase in targeted attack campaigns 2012 2013
  • 11. Defining an Attack Campaign • Show clear evidence that subject and target were deliberately selected • Contain at least 3 or 4 strong correlations to other emails – topic, sender address, source IP address, etc. • Sent on the same day or across multiple days 11 A series of emails that:
  • 12. Targeted Attack Campaigns 12 2011 2012 2013 Email per Campaign Recipient/Campaign 78 122 29 61 111 23 Campaigns Duration of Campaign 165 408 779 4 days 3 days 8.3 days
  • 13. Targeted Industries 13 Top 10 Industries Targeted in Spear-Phishing Attacks, 2013 Source: Symantec Public Administration (Gov.) Services – Professional Services – Non-Traditional Manufacturing Finance, Insurance & Real Estate Transportation, Gas, Communications, Electric Wholesale Retail Mining Construction 16% 15 14 13 13 6 5 2 1 1
  • 14. Targeted Organization by Size 14 Spear Phishing Attacks by Size of Targeted Organization, 2011 - 2013 Source: Symantec 50% 50% 39% 18% 31% 30% 100% 0 2011 2012 2013 1,501 to 2,500 1,001 to 1,500 501 to 1,000 251 to 500 1 to 250 2,501+ Employees 50% 50% 61%
  • 15. Most Likely to be Targeted 15 Executive Assistant at a large mining company JohnDoe@drillanddig.com Attacker Re: Order Payment Please click on this executable to see your order information.
  • 16. Risk of Being Targeted by Job Role 16 Personal Assistant (Executive Assistant) High Medium Low Media Senior Management Sales C-Level Recruitment R&D Risk Risk of Job Role Impact by Targeted Attack Sent by Spear-Phishing Email Source: Symantec
  • 17. Risk of Being Targeted by Industry 17 Ratio of Organization in an Industry Impacted by Target Attack Sent by Spear-Phishing Email Source: Symantec High Medium Low Risk Mining Public Administration (Government) Manufacturing Wholesale Transportation, Communications, Electric, Gas & Sanitary Services Finance, Insurance & Real Estate Services – Non-Traditional Construction Agriculture, Forestry & Fishing 2.7 3.1 3.2 3.4 3.9 4.8 6.6 11.3 12.0 1 in
  • 18. Risk of Being Targeted by Industry Size 18 Ratio of Organization Targeted by Industry Size Sent by Spear-Phishing Email Source: Symantec High Medium Risk 2,500+ 1,501-2,500 1,001-1,500 501-1,000 251-500 1-250 2.3 2.9 2.9 3.8 4.3 5.2 1 in
  • 19. Word Cloud: Spear Phishing Attacks 19 Most frequently occurring words used in targeted spear phishing email attacks throughout 2013
  • 20.
  • 21.
  • 22. 22
  • 24. Zero-Day Vulnerabilities 24 13 15 9 12 14 8 14 23 0 5 10 15 20 25 30 2006 2007 2008 2009 2010 2011 2012 2013 Zero-Day Vulnerabilities, Annual Total, 2006 - 2013 Source: Symantec 23 zero-day vulnerabilities discovered in 2013 Increase from 14 in 2012 More zero-day vulnerabilities discovered in 2013 than in any year since we started tracking More zero-days in 2013 than in past two years combined
  • 25. Website Vulnerabilities 25 Scanned Websites With Vulnerabilities 53% 78% +25% pts 2012 2013 1 IN 8 sites had critical unpatched vulnerabilities
  • 26. Malicious Websites With so many vulnerable websites, cybercriminals don’t need to set up own websites to host malware 26 New Unique Malicious Web Domains 56,158 74,001 74,001 -24%2013 2012 2011
  • 27. Web-based Attacks Web-based attacks continue to grow 27 Web Attacks Blocked Per Day 568,700 464,100 190,000 +23% 2013 2012 2011
  • 29. FakeAV depended on fear to work When everyone knows it’s fake, there is no fear and the scam fails. 29 Precursor to Ransomware
  • 30. 30 Cybercriminals moved to ransomware Fear of arrest Simple and (for bad guys) safe method of receiving “fine” At $100-$400 a victim, it’s very profitable From FakeAV to Ransomware
  • 31. 31 Ransomware Ransomware exploded globally in 2013 With only online payment options limiting its reach With only 1.5 million Internet-connected computers, even the Palestine Territories is a big enough target for criminals
  • 32. Ransomware’s Growth 32 in Ransomware attacks in 2013 112 107 138 141 178 189 286 421 625 419 861 660 0 100 200 300 400 500 600 700 800 900 1000 J F M A M J J A S O N D Ransomeware Over Time, 2013 Source: Symantec 500% increase
  • 33. Ransomware Turns Vicious When people stop fearing ransomware? Cryptolocker happens! Cryptolocker most prevalent in threat category called ransomcrypt No pretense of a fine Must pay to get your files back 33
  • 34. Ransomcrypt Cybercriminals use cryptocurrencies when doing business with each other They’d like to make victims use them, too 34
  • 35. Ransomcrypt: Some Perspective 35 Number of Attacks Still Small In December, just 0.2 percent of all ransomware was CryptoLocker Threat is Not New Trojan.Gpcoder (May 2005) Trojan.Ransomcrypt (June 2009) What is New? Online payment methods Good encryption Cryptolocker uses RSA 2048 Encryption Poised for Growth
  • 37. Mobile Threats Android remains the platform of choice for malware authors 37 Android Symbian Windows Number of Threats 57 1 1 Percent of Threats 97% 2% 2% 0 0% Platform iOS Mobile Threats: Malicious Code by Platform, 2013 Source: Symantec
  • 38. Mobile Malware Creation of new mobile malware slowed as malware authors focused on improving existing malware Average number of variants per family in 2012 was 1:38 Increased to 1:57 in 2013 38 Android Mobile Malware Families Average Number of Variant Per Family 57 57 103 38 2013 2013 -45% +50% 2013 2013
  • 39. Mobile Users at Risk 39 50% 38% Source: 2013 Norton Report Don’t use basic precautions such as passwords, security software or back up files for their mobile device Of smartphone users have experienced mobile cybercrime in past 12 months
  • 40. 72%90% 78% 56% 48%33% DELETE SUSPICIOUS EMAILS FROM PEOPLE THEY DON’T KNOW HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION AVOID STORING SENSITIVE FILES ONLINE Mobile Security IQ 40 Source: 2013 Norton Report
  • 41. Mobile: A Dangerous Mix 1. Prevalence of mobile devices 2. Maturing of mobile malware 3. Mixing of work and personal information on devices 4. User’s lack of smart smartphone risk awareness 41
  • 42. Future Trend: Internet of Things 42
  • 43. Future Trend: Internet of Things 43 Confirmed: Real world attacks against security cameras and baby monitors Demonstrated: Hacking attacks against televisions, cars and medical equipment Exaggerated: Reports of refrigerators sending spam messages
  • 44. 44 With NAT router all devices appear to have a single IP address A Refrigerator and a PC look like the same IP address But spam was sent by W32.Waledac (Kelihos) • W32 means a Windows OS NAT Router Internet of Things: Busting Refrigerator Myth
  • 45. Internet of Things: Real Risks 45 Biggest Risk? Routers • Linux.Darlloz infects Linux PCs and IoT devices running Linux • Linux.Aidra targets cable and DSL modems Uses for Infected Routers? • DDoS attacks • Browser re-direction • Even cryptocurriences mining Reason for Attacks? • Unpatched vulnerabilities • Unchanged default passwords
  • 46. Internet of Things: What’s Next? Wearable Devices They will be measuring and transmitting: • Pulse • Weight • Time slept • Glucose levels • Blood pressure • Exposure to sunlight • Teeth brushing habits • And more… As more of our personal information travels the Internet what will become of it?
  • 49. Avoiding Data Breaches 49 Data Classification • Determine what sensitive information exists in your organization • Categorize it appropriately and protect it according to its classification level Data Loss Prevention • Detect and prevent exfiltration of sensitive information that is targeted by attackers • Enforce rules prohibiting access of confidential data using applications Host-based Intrusion Detection and Prevention • Locks down key systems that contain confidential information • Prevents any unauthorized code to run — independent of AV signatures Email & Web Gateway Security • Scan & block email with potentially malicious URLs, attachments or content. • Monitor inbound/outbound web traffic and block accordingly Encryption • Create and enforce security policy so all confidential information is encrypted Strong Authentication • Use two-factor authentication to protect against credential theft
  • 50. Protection Against Targeted Attacks 50 Reputational & Behavioral Protection • Detect and block new and unknown threats based on global reputation and behavior of files Host-based Intrusion Detection and Prevention • Locks down key systems that contain confidential information • Prevents any unauthorized code to run — independent of AV signatures Removable Media Device Control • Restrict removable devices and functions to prevent malware infection Email & Web Gateway Security • Scan & block email with potentially malicious URLs, attachments or content. • Monitor inbound/outbound web traffic and block accordingly Encryption • Discover data spills of confidential information that are targeted by attackers • Detect and prevent exfiltration of confidential information that are targeted by attackers Endpoint & Network Data Correlation • Create and enforce security policies so all confidential information is encrypted Network Threat and Vulnerability Monitoring • Prioritize threat information detected at the network through security intelligence and information coming from endpoint security devices.
  • 51. Defending Against Malware 51 Reputational & Behavioral Protection • Detect and block new and unknown threats based on global reputation and behavior of files Host-based Intrusion Detection and Prevention • Locks down key systems that contain confidential information • Prevents any unauthorized code to run — independent of AV signatures Removable Media Device Control • Restrict removable devices and functions to prevent malware infection Email & Web Gateway Security • Scan & block email with potentially malicious URLs, attachments or content. • Monitor inbound/outbound web traffic and block accordingly Endpoint & Network Data Correlation • Prioritize threat information detected at the network through security intelligence and information coming from endpoint security devices. Security Awareness Program • Ensure employees become the first line of defense against socially engineered attacks, such as phishing, spear phishing, and other types of attacks
  • 52. Mitigating Mobile Attacks 52 Application Management • Secure data in corporate applications regardless of device ownership Device Management • Remotely wipe devices in case of theft or loss, control password policies • Update devices with applications as needed without physical access Device Security • Guard mobile device against malware • Prevent the device from becoming a vulnerability Identity & Access Control • Provide strong authentication and authorization for access to enterprise applications and resources • Ensure safe access to enterprise resources from right devices with right postures Secure File Sharing • Enable encrypted file sharing to ensure security as users share information
  • 53. Vulnerability Security 53 Vulnerability Management Program • Routine, frequent vulnerability assessments and penetrations tests to identify vulnerabilities in applications, systems, and mobile devices • Formal process for addressing identified vulnerabilities Configuration & Patch Management Program • Ensure all operating system and application patches are evaluated and deployed in a timely manner • Ensure adherence to formal, secure configuration standards Application Virtualization • Leverage application virtualization technologies to reduce risk when legacy web browsers and older versions of 3rd party applications like JAVA or Adobe Reader must be used for compatibility reasons Reputational & Behavioral Protection • Detect and block new and unknown threats based on global reputation and behavior of files Removable Media Device Control • Restrict removable devices and functions to prevent malware infection
  • 54. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 54