Results 1 to 1 of 1

Thread: Internet Security Threat Report - 2nd half 2006

  1. #1
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Internet Security Threat Report - 2nd half 2006

    Excerpts from the Symantec Enterprise report:

    - http://www.symantec.com/about/news/r...id=20070319_01
    "March 19, 2007 – The latest Internet Security Threat Report released today by Symantec Corp. reveals that the current Internet threat environment is characterized by an increase in data theft, data leakage, and the creation of targeted, malicious code for the purpose of stealing confidential information that can be used for financial gain. Cyber criminals continue to refine their attack methods in an attempt to remain undetected and to create global, cooperative networks to support the ongoing growth of criminal activity... Symantec Internet Security Threat Report (ISTR) Volume XI covers the six-month period from July 1, 2006, through December 31, 2006. It is based on Symantec data collected from more than 40,000 sensors deployed in more than 180 countries in addition to a database that covers more than 20,000 vulnerabilities affecting more than 30,000 technologies from more than 4,000 vendors..."
    - http://preview.tinyurl.com/2pky26 (pdf file)
    "...Attack Trends Highlights...
    • Microsoft Internet Explorer was targeted by 77 percent of all attacks specifically targeting Web browsers.
    Home users were the most highly targeted sector, accounting for 93 percent of all targeted attacks..."

    - http://blog.washingtonpost.com/secur...o_dollars.html
    March 19, 2007 ~ "...Buried in the report was this little gem: Only 23 percent of all malicious software created in 2006 exploited a software security vulnerability. This is a very important stat to consider: By far the most common way that people infect their own computers with malicious software is by opening a virus-laden e-mail attachment or by clicking on a Web link included in an instant message."

    Last edited by AplusWebMaster; 2007-03-19 at 16:36.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •