SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
SYMANTEC INTELLIGENCE REPORT 
OCTOBER 2014
p. 2 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
CONTENTS 
3 Summary 
4 TARGETED ATTACKS + DATA BREACHES 
5 Targeted Attacks 
5 Attachments Used in Spear-Phishing 
Emails 
5 Spear-Phishing Attacks by Size of 
Targeted Organization 
5 Average Number of Spear-Phishing 
Attacks Per Day 
6 Top-Ten Industries Targeted 
in Spear-Phishing Attacks 
7 Data Breaches 
7 Timeline of Data Breaches 
8 Total Identities Exposed 
8 Top Causes of Data Breaches 
8 Total Data Breaches 
9 Top-Ten Types of Information Breached 
10 MALWARE TACTICS 
11 Malware Tactics 
11 Top-Ten Malware 
11 Top-Ten Mac OSX Malware Blocked on OSX Endpoints 
12 Ransomware Over Time 
12 Malicious Activity by Source: Bots 
13 Vulnerabilities 
13 Number of Vulnerabilities 
13 Zero-Day Vulnerabilities 
14 Browser Vulnerabilities 
14 Plug-in Vulnerabilities 
15 SOCIAL MEDIA 
+ MOBILE THREATS 
16 Mobile 
16 Mobile Malware Families by Month, 
Android 
17 Mobile Threat Classifications 
18 Social Media 
18 Social Media 
19 PHISHING, SPAM + EMAIL THREATS 
20 Phishing and Spam 
20 Phishing Rate 
20 Global Spam Rate 
21 Email Threats 
21 Proportion of Email Traffic 
Containing URL Malware 
21 Proportion of Email Traffic 
in Which Virus Was Detected 
22 About Symantec 
22 More Information
p. 3 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Summary 
Welcome to the October edition of the 
Symantec Intelligence report. Symantec 
Intelligence aims to provide the latest 
analysis of cyber security threats, trends, 
and insights concerning malware, spam, and 
other potentially harmful business risks. 
Symantec has established the most 
comprehensive source of Internet threat 
data in the world through the Symantec™ 
Global Intelligence Network, which is made 
up of more than 41.5 million attack sensors 
and records thousands of events per second. 
This network monitors threat activity in 
over 157 countries and territories through 
a combination of Symantec products and 
services such as Symantec DeepSight™ 
Threat Management System, Symantec™ 
Managed Security Services, Norton™ 
consumer products, and other third-party 
data sources. 
The number of spear phishing attacks per day continues to 
trend downward over the last twelve months, coming in at 45 
per day in October. Of the attachments used in such email-based 
attacks, the .doc attachment type comprised 62.5 percent 
and .exe attachments made up 14.4 percent. Of the industries 
attacked, the category of Finance, Insurance, and Real Estate 
received 28 percent of all spear phishing attempts in the month 
of October, followed by Manufacturing at 17 percent. 
The largest data breach that was disclosed in October took place 
back in July. This breach had previously been reported; however, 
we learned this month that the breach resulted in the exposure 
of identities within 76 million households, plus information on 
an additional seven million small businesses. 
In the Mac threat landscape, OSX.Okaz was the most frequently 
encountered OSX risk seen on OSX endpoints, making up 28.8 
percent of OSX risks. OSX.Okaz is an adware program that may 
modify browser homepage and search settings. 
Finally, Ransomware as a whole continues to decline as the year 
progresses. However, the amount of crypto-style ransomware 
seen continues to increase. This particularly aggressive form of 
ransomware made up 55 percent of all ransomware in the month 
of October. 
We hope that you enjoy this month’s report and feel free to 
contact us with any comments or feedback. 
Ben Nahorney, Cyber Security Threat Analyst 
symantec_intelligence@symantec.com
p. 4 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
TARGETED ATTACKS 
+ DATA BREACHES
p. 5 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
At a Glance 
• The average number of 
spear-phishing attacks 
dropped to 45 per day in 
October, down from 53 in 
September. 
• The .doc file type was the 
most common attachment 
type used in spear-phishing 
attacks. The .exe file type 
came in second. 
• Organizations with 2500+ 
employees were the most 
likely to be targeted in 
October. 
• Finance, Insurance, & 
Real Estate lead the Top- 
Ten Industries targeted, 
followed by Manufacturing. 
Targeted Attacks 
Average Number of Spear-Phishing 
Attacks Per Day 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
250 
225 
200 
175 
150 
125 
100 
75 
50 
25 
J F M A M J J A S O 
2014 
N D 
54 53 45 
20 
116 
54 
141 
84 84 
54 
88 
165 
Attachments Used in Spear-Phishing 
Emails 
Source: Symantec :: OCTOBER 2014 
Executable type October September 
.doc 62.5% 52.9% 
.exe 14.4% 4.8% 
.txt 11.2% 9.1% 
.pdf 4.4% 1.0% 
.ace 0.7% – 
.jpeg 0.2% – 
.htm 0.1% – 
.dmp 0.1% 9.1% 
.scr 0.1% 15.4% 
.rtf 0.1% – 
Spear-Phishing Attacks by Size 
of Targeted Organization 
Source: Symantec :: OCTOBER 2014 
Organization Size October September 
1-250 27.1% 32.5% 
251-500 6.6% 8.7% 
501-1000 8.9% 8.6% 
1001-1500 2.9% 3.7% 
1501-2500 11.2% 3.9% 
2500+ 43.3% 42.6%
p. 6 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Top-Ten Industries Targeted in 
Spear-Phishing Attacks 
Source: Symantec :: OCTOBER 2014 
& Real Estate 28% 
Finance, Insurance 
Manufacturing 
Services - Non Traditional 
Services - Professional 
Transportation, 
Communications, 
Electric, Gas 
Wholesale 
Retail 
Energy/Utilities 
Public Administration 
Mining 
17 
14 
10 
9 
9 
4 
3 
2 
1
p. 7 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Data Breaches 
Timeline of Data Breaches 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
40 
35 
30 
25 
20 
15 
10 
At a Glance 
147 
59 
2.6 1.7 1 8.1 
• The largest data breach disclosed in October actually took 
place in July, and resulted in the exposure of at least 76 
million identities. 
• Hackers have been responsible for 57 percent of data breach-es 
in the last 12 months. 
• Real names, government ID numbers, such as Social Security 
numbers, and home addresses were the top three types of 
data exposed in data breaches. 
160 
140 
120 
100 
80 
60 
40 
20 
1 
78 
31.5 
10 
J F M A M J J A S O 
2014 
N D 
NUMBER OF INCIDENTS 
IDENTITIES EXPOSED (MILLIONS) 
INCIDENTS IDENTITIES EXPOSED (Millions) 
130 
113 
23 
5 
22 
29 
27 
25 
27 
21 20 
19 
11 11 
21
p. 8 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Top Causes of Data Breaches 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
Hackers 57% 
Accidentally 
Made Public 
Theft or Loss 
of Computer 
or Drive 
Insider Theft 
18% 
18% 
7% 
Number 
of Incidents 
147 
46 
46 
18 
TOTAL 257 
Total Data 
Breaches 
NOVEMBER 2013 — OCTOBER 2014 
257 
Total Identities 
Exposed 
NOVEMBER 2013 — OCTOBER 2014 
583Million
p. 9 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Top-Ten Types of Information Breached 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
Real Names 
Gov ID numbers (Soc Sec) 
Home Address 
Birth Dates 
Financial Information 
Medical Records 
Phone Numbers 
Email Addresses 
Usernames & Passwords 
Insurance 
01 
02 
03 
04 
05 
06 
07 
08 
09 
10 
69% 
44% 
43% 
40% 
33% 
28% 
20% 
21% 
16% 
8% 
Methodology 
This data is procured from the Norton Cybercrime Index (CCI). The Norton CCI is a statistical model 
that measures the levels of threats, including malicious software, fraud, identity theft, spam, 
phishing, and social engineering daily. The data breach section of the Norton CCI is derived from 
data breaches that have been reported by legitimate media sources and have exposed personal 
information. 
In some cases a data breach is not publicly reported during the same month the incident occurred, 
or an adjustment is made in the number of identities reportedly exposed. In these cases, the data in 
the Norton CCI is updated. This causes fluctuations in the numbers reported for previous months 
when a new report is released.
p. 10 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
MALWARE TACTICS
p. 11 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Malware Tactics 
At a Glance 
• W32.Sality and W32. 
Ramnit variants continue 
to dominate the top-ten 
malware list. 
• The most common 
OSX threat seen on OSX 
was OSX.Okaz, making up 
28.8 percent of all OSX 
malware found on OSX 
Endpoints. 
• Overall ransomware 
activity has remained low 
since March of this year. 
However, crypto-style 
ransomware continues to 
increase, making up 55 
percent of ransomware in 
October. 
• China and the US where 
first and second, respec-tively, 
in October in terms 
of overall botnet source 
activity. 
Top-Ten Malware 
Source: Symantec :: OCTOBER 2014 
Rank Name October September 
1 W32.Sality.AE 4.1% 4.4% 
2 W32.Ramnit!html 4.0% 4.3% 
3 W32.Almanahe.B!inf 3.7% 3.7% 
4 W32.Ramnit.B 2.7% 2.7% 
5 W32.Downadup.B 2.5% 2.3% 
6 W32.Ramnit.B!inf 2.1% 2.0% 
7 W32.SillyFDC.BDP!lnk 1.4% 2.2% 
8 Trojan.Zbot 1.3% 1.2% 
9 W32.Virut.CF 1.3% 1.4% 
10 W32.Chir.B@mm(html) 1.2% 1.4% 
Top-Ten Mac OSX Malware Blocked 
on OSX Endpoints 
Source: Symantec :: OCTOBER 2014 
Rank Malware Name October September 
1 OSX.Okaz 28.8% 7.6% 
2 OSX.RSPlug.A 14.0% 26.3% 
3 OSX.Keylogger 9.3% 3.6% 
4 OSX.Flashback.K 5.4% 8.7% 
5 OSX.Klog.A 5.2% 2.9% 
6 OSX.Crisis 4.8% 8.7% 
7 OSX.Stealbit.B 4.7% 5.3% 
8 OSX.Flashback 3.9% 4.0% 
9 OSX.Netweird 3.7% 5.2% 
10 OSX.Sabpab 2.3% 2.7%
p. 12 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Ransomware Over Time 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
THOUSANDS 
1000 
800 
600 
400 
200 
465 
342 
425 
J F M A M J J A S O 
2014 
861 
660 
N D 
Malicious Activity by Source: Bots 
Source: Symantec :: SEPTEMBER 2014 
Rank Country/Region Percent 
1 United States 26.4% 
2 China 11.9% 
3 Taiwan 8.2% 
4 Hungary 4.8% 
5 Italy 4.2% 
6 Canada 3.4% 
7 Japan 3.0% 
8 Brazil 2.8% 
9 Poland 2.3% 
10 Germany 2.2% 
156 143 
230 183 149 
95 80
p. 13 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Number of Vulnerabilities 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
800 
700 
600 
500 
400 
300 
200 
100 
J F M A M J J A S O 
2014 
N D 
438 
575 600 596 
399 
438 
471 
542 562 579 
473 
555 
Zero-Day Vulnerabilities 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
8 
7 
6 
5 
4 
3 
2 
1 
2 2 2 
J F M A M J J A S O 
2014 
N D 
0 0 0 0 
0 
5 
0 
1 
4 
Vulnerabilities 
At a Glance 
• There were 596 vulner-abilities 
disclosed during 
the month of October. 
• There were two zero-day 
vulnerabilities discovered 
in October. 
• Internet Explorer has 
reported the most brows-er 
vulnerabilities in the 
last 12 months. 
• Oracle’s Java reported 
the most plug-in vulner-abilities 
over the same 
time period.
p. 14 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Browser Vulnerabilities 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
100 
80 
60 
40 
20 
J F M A M J J A S O 
2014 
N D 
Opera 
Mozilla Firefox 
Microsoft Internet Explorer 
Google Chrome 
Apple Safari 
Plug-in Vulnerabilities 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
80 
70 
60 
50 
40 
30 
20 
10 
Java 
Apple 
Adobe 
ActiveX 
J F M A M J J A S O 
2014 
N D
p. 15 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
SOCIAL MEDIA 
+ MOBILE THREATS
p. 16 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Mobile 
Mobile Malware Families by Month, 
Android 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
2 
4 
2 
4 
2 2 
3 
5 
3 
4 4 
3 
10 
9 
8 
7 
6 
5 
4 
3 
2 
1 
J F M A M J J A S O 
2014 
N D 
At a Glance 
• There were five Android 
malware families discov-ered 
in July. 
• Of the threats discovered 
in the last 12 months, 
26 percent are tradi-tional 
threats, such as 
back door Trojans and 
downloaders. 
• In terms of social 
networking scams, 38 
percent were fake offer-ings, 
while 49 percent 
were manually shared 
scams.
p. 17 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Mobile Threat Classifications 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
30% 
25 
20 
15 
10 
5 
Adware 
Annoyance 
Reconfigure 
Device 
Send 
Content 
Traditional 
Threats 
Track 
User 
Steal 
Information 
Track User Risks that spy on the individual using the device, collecting SMS 
messages or phone call logs, tracking GPS coordinates, recording phone calls, 
or gathering pictures and video taken with the device. 
Steal Information This includes the collection of both device- and user-specific 
data, such as device information, configuration data, or banking details. 
Traditional Threats Threats that carry out traditional malware functions, 
such as back doors and downloaders. 
Recongure Device These types of risks attempt to elevate privileges 
or simply modify various settings within the operating system. 
Adware/Annoyance Mobile risks that display advertising or generally perform 
actions to disrupt the user. 
Send Content These risks will send text messages to premium SMS numbers, 
ultimately appearing on the bill of the device’s owner. Other risks can be used to 
send spam messages. 
6% 
13% 
26% 
22% 
13% 
19%
p. 18 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Social Media 
Social Media 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
100% 
90 
80 
70 
60 
50 
40 
30 
20 
10 
2% .6% 
Comment 
Jacking 
Fake 
Apps 
49% 
10% 
Manual Likejacking 
Sharing 
38% 
Fake 
Offering 
Fake Offers These scams invite social network users to join a fake event or group 
with incentives such as free gift cards. Joining often requires the user to share 
credentials with the attacker or send a text to a premium rate number. 
Manual Sharing Scams These rely on victims to actually do the work of sharing 
the scam by presenting them with intriguing videos, fake offers or messages that they 
share with their friends. 
Likejacking Using fake “Like” buttons, attackers trick users into clicking website 
buttons that install malware and may post updates on a user’s newsfeed, spreading the 
attack. 
Comment Jacking Similar to likejacking, this type of scam relies on users clicking 
links that are added to comments by attackers. The links may lead to malware or survey 
scams. 
Fake App Users are invited to subscribe to an application that appears to be 
integrated for use with a social network, but is not as described and may be used to 
steal credentials or harvest other personal data.
p. 19 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
PHISHING, SPAM + EMAIL THREATS
p. 20 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Phishing and Spam 
Phishing Rate 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
1 in 500 
1 in 1000 
1 in 1500 
1 in 2000 
1 in 2500 
J F M A M J J A S O 
2014 
N D 
2041 
1610 
236 
306 
401 478 
370 
731 
395 
496 
1290 
1587 
At a Glance 
• The phishing rate rose 
in October, at one in 
1,610 emails, up from 
one in 2,041 emails in 
September. 
• The global spam rate 
was 55.3 percent for the 
month of October. 
• One out of every 329 
emails contained a virus. 
• Of the email traffic in the 
month of October, 6.9 
percent contained a mali-cious 
URL. 
Global Spam Rate 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
100% 
90 
80 
70 
60 
50 
40 
30 
20 
10 
J F M A M J J A S O 
2014 
69 71 
N D 
62 62 
66 
59 
61 60 
64 63 
58 55
p. 21 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
Email Threats 
Proportion of Email Traffic 
in Which Virus Was Detected 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
Proportion of Email Traffic 
Containing URL Malware 
Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 
100% 
90 
80 
70 
60 
50 
40 
30 
20 
10 
14 16 14 
6 7 10 
J F M A M J J A S O 
2014 
N D 
6 3 
14 
7 8 
3 
1 in 50 
1 in 100 
1 in 150 
1 in 200 
1 in 250 
1 in 300 
1 in 350 
1 in 400 
1 in 450 
1 in 500 
J F M A M J J A S O 
2014 
N D 
351 
329 
129 
112 
207 
188 
141 
234 
183 
232 
351 
270
p. 22 
Symantec Corporation 
Symantec Intelligence Report :: OCTOBER 2014 
About Symantec 
Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps 
people, businesses and governments seeking the freedom to unlock the opportunities 
technology brings – anytime, anywhere. Founded in April 1982, Symantec, a Fortune 
500 company, operating one of the largest global data-intelligence networks, has 
provided leading security, backup and availability solutions for where vital information 
is stored, accessed and shared. The company’s more than 20,000 employees reside in 
more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec 
customers. In fiscal 2013, it recorded revenues of $6.9 billion. To learn more go to 
www.symantec.com or connect with Symantec at: go.symantec.com/socialmedia. 
More Information 
• Symantec Worldwide: http://www.symantec.com/ 
• ISTR and Symantec Intelligence Resources: http://www.symantec.com/threatreport/ 
• Symantec Security Response: http://www.symantec.com/security_response/ 
• Norton Threat Explorer: http://us.norton.com/security_response/threatexplorer/ 
• Norton Cybercrime Index: http://us.norton.com/cybercrimeindex/
For specific country offices and contact numbers, 
please visit our website. 
For product information in the U.S., 
call toll-free 1 (800) 745 6054. 
Symantec Corporation World Headquarters 
350 Ellis Street 
Mountain View, CA 94043 USA 
+1 (650) 527 8000 
1 (800) 721 3934 
www.symantec.com 
Copyright © 2014 Symantec Corporation. 
All rights reserved. Symantec, the Symantec Logo, 
and the Checkmark Logo are trademarks or registered 
trademarks of Symantec Corporation or its affiliates in 
the U.S. and other countries. Other names may 
be trademarks of their respective owners

Weitere ähnliche Inhalte

Was ist angesagt?

Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew RosenquistMatthew Rosenquist
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistDiversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistMatthew Rosenquist
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexKanishka Ramyar
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 

Was ist angesagt? (20)

Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistDiversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 

Ähnlich wie Symantec Intelligence Report - October 2014

Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014Symantec
 
Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec
 
Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014Symantec
 
Symantec Intelligence Report November 2014
Symantec Intelligence Report November 2014Symantec Intelligence Report November 2014
Symantec Intelligence Report November 2014Symantec
 
Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014Symantec
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence ReportSymantec
 
Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]Sergey Ulankin
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015CheapSSLUSA
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Waqas Amir
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security ReportBAKOTECH
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecSoluciona Facil
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityOnline Business
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017Dryden Geary
 

Ähnlich wie Symantec Intelligence Report - October 2014 (20)

Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014
 
Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014
 
Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014
 
Symantec Intelligence Report November 2014
Symantec Intelligence Report November 2014Symantec Intelligence Report November 2014
Symantec Intelligence Report November 2014
 
Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence Report
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence Report
 
Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Symantec Intelligence Report 2013
Symantec Intelligence Report 2013Symantec Intelligence Report 2013
Symantec Intelligence Report 2013
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security Report
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 

Mehr von Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Mehr von Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Kürzlich hochgeladen

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Kürzlich hochgeladen (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Symantec Intelligence Report - October 2014

  • 2. p. 2 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 CONTENTS 3 Summary 4 TARGETED ATTACKS + DATA BREACHES 5 Targeted Attacks 5 Attachments Used in Spear-Phishing Emails 5 Spear-Phishing Attacks by Size of Targeted Organization 5 Average Number of Spear-Phishing Attacks Per Day 6 Top-Ten Industries Targeted in Spear-Phishing Attacks 7 Data Breaches 7 Timeline of Data Breaches 8 Total Identities Exposed 8 Top Causes of Data Breaches 8 Total Data Breaches 9 Top-Ten Types of Information Breached 10 MALWARE TACTICS 11 Malware Tactics 11 Top-Ten Malware 11 Top-Ten Mac OSX Malware Blocked on OSX Endpoints 12 Ransomware Over Time 12 Malicious Activity by Source: Bots 13 Vulnerabilities 13 Number of Vulnerabilities 13 Zero-Day Vulnerabilities 14 Browser Vulnerabilities 14 Plug-in Vulnerabilities 15 SOCIAL MEDIA + MOBILE THREATS 16 Mobile 16 Mobile Malware Families by Month, Android 17 Mobile Threat Classifications 18 Social Media 18 Social Media 19 PHISHING, SPAM + EMAIL THREATS 20 Phishing and Spam 20 Phishing Rate 20 Global Spam Rate 21 Email Threats 21 Proportion of Email Traffic Containing URL Malware 21 Proportion of Email Traffic in Which Virus Was Detected 22 About Symantec 22 More Information
  • 3. p. 3 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Summary Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks. Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources. The number of spear phishing attacks per day continues to trend downward over the last twelve months, coming in at 45 per day in October. Of the attachments used in such email-based attacks, the .doc attachment type comprised 62.5 percent and .exe attachments made up 14.4 percent. Of the industries attacked, the category of Finance, Insurance, and Real Estate received 28 percent of all spear phishing attempts in the month of October, followed by Manufacturing at 17 percent. The largest data breach that was disclosed in October took place back in July. This breach had previously been reported; however, we learned this month that the breach resulted in the exposure of identities within 76 million households, plus information on an additional seven million small businesses. In the Mac threat landscape, OSX.Okaz was the most frequently encountered OSX risk seen on OSX endpoints, making up 28.8 percent of OSX risks. OSX.Okaz is an adware program that may modify browser homepage and search settings. Finally, Ransomware as a whole continues to decline as the year progresses. However, the amount of crypto-style ransomware seen continues to increase. This particularly aggressive form of ransomware made up 55 percent of all ransomware in the month of October. We hope that you enjoy this month’s report and feel free to contact us with any comments or feedback. Ben Nahorney, Cyber Security Threat Analyst symantec_intelligence@symantec.com
  • 4. p. 4 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 TARGETED ATTACKS + DATA BREACHES
  • 5. p. 5 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 At a Glance • The average number of spear-phishing attacks dropped to 45 per day in October, down from 53 in September. • The .doc file type was the most common attachment type used in spear-phishing attacks. The .exe file type came in second. • Organizations with 2500+ employees were the most likely to be targeted in October. • Finance, Insurance, & Real Estate lead the Top- Ten Industries targeted, followed by Manufacturing. Targeted Attacks Average Number of Spear-Phishing Attacks Per Day Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 250 225 200 175 150 125 100 75 50 25 J F M A M J J A S O 2014 N D 54 53 45 20 116 54 141 84 84 54 88 165 Attachments Used in Spear-Phishing Emails Source: Symantec :: OCTOBER 2014 Executable type October September .doc 62.5% 52.9% .exe 14.4% 4.8% .txt 11.2% 9.1% .pdf 4.4% 1.0% .ace 0.7% – .jpeg 0.2% – .htm 0.1% – .dmp 0.1% 9.1% .scr 0.1% 15.4% .rtf 0.1% – Spear-Phishing Attacks by Size of Targeted Organization Source: Symantec :: OCTOBER 2014 Organization Size October September 1-250 27.1% 32.5% 251-500 6.6% 8.7% 501-1000 8.9% 8.6% 1001-1500 2.9% 3.7% 1501-2500 11.2% 3.9% 2500+ 43.3% 42.6%
  • 6. p. 6 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Top-Ten Industries Targeted in Spear-Phishing Attacks Source: Symantec :: OCTOBER 2014 & Real Estate 28% Finance, Insurance Manufacturing Services - Non Traditional Services - Professional Transportation, Communications, Electric, Gas Wholesale Retail Energy/Utilities Public Administration Mining 17 14 10 9 9 4 3 2 1
  • 7. p. 7 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Data Breaches Timeline of Data Breaches Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 40 35 30 25 20 15 10 At a Glance 147 59 2.6 1.7 1 8.1 • The largest data breach disclosed in October actually took place in July, and resulted in the exposure of at least 76 million identities. • Hackers have been responsible for 57 percent of data breach-es in the last 12 months. • Real names, government ID numbers, such as Social Security numbers, and home addresses were the top three types of data exposed in data breaches. 160 140 120 100 80 60 40 20 1 78 31.5 10 J F M A M J J A S O 2014 N D NUMBER OF INCIDENTS IDENTITIES EXPOSED (MILLIONS) INCIDENTS IDENTITIES EXPOSED (Millions) 130 113 23 5 22 29 27 25 27 21 20 19 11 11 21
  • 8. p. 8 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Top Causes of Data Breaches Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 Hackers 57% Accidentally Made Public Theft or Loss of Computer or Drive Insider Theft 18% 18% 7% Number of Incidents 147 46 46 18 TOTAL 257 Total Data Breaches NOVEMBER 2013 — OCTOBER 2014 257 Total Identities Exposed NOVEMBER 2013 — OCTOBER 2014 583Million
  • 9. p. 9 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Top-Ten Types of Information Breached Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 Real Names Gov ID numbers (Soc Sec) Home Address Birth Dates Financial Information Medical Records Phone Numbers Email Addresses Usernames & Passwords Insurance 01 02 03 04 05 06 07 08 09 10 69% 44% 43% 40% 33% 28% 20% 21% 16% 8% Methodology This data is procured from the Norton Cybercrime Index (CCI). The Norton CCI is a statistical model that measures the levels of threats, including malicious software, fraud, identity theft, spam, phishing, and social engineering daily. The data breach section of the Norton CCI is derived from data breaches that have been reported by legitimate media sources and have exposed personal information. In some cases a data breach is not publicly reported during the same month the incident occurred, or an adjustment is made in the number of identities reportedly exposed. In these cases, the data in the Norton CCI is updated. This causes fluctuations in the numbers reported for previous months when a new report is released.
  • 10. p. 10 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 MALWARE TACTICS
  • 11. p. 11 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Malware Tactics At a Glance • W32.Sality and W32. Ramnit variants continue to dominate the top-ten malware list. • The most common OSX threat seen on OSX was OSX.Okaz, making up 28.8 percent of all OSX malware found on OSX Endpoints. • Overall ransomware activity has remained low since March of this year. However, crypto-style ransomware continues to increase, making up 55 percent of ransomware in October. • China and the US where first and second, respec-tively, in October in terms of overall botnet source activity. Top-Ten Malware Source: Symantec :: OCTOBER 2014 Rank Name October September 1 W32.Sality.AE 4.1% 4.4% 2 W32.Ramnit!html 4.0% 4.3% 3 W32.Almanahe.B!inf 3.7% 3.7% 4 W32.Ramnit.B 2.7% 2.7% 5 W32.Downadup.B 2.5% 2.3% 6 W32.Ramnit.B!inf 2.1% 2.0% 7 W32.SillyFDC.BDP!lnk 1.4% 2.2% 8 Trojan.Zbot 1.3% 1.2% 9 W32.Virut.CF 1.3% 1.4% 10 W32.Chir.B@mm(html) 1.2% 1.4% Top-Ten Mac OSX Malware Blocked on OSX Endpoints Source: Symantec :: OCTOBER 2014 Rank Malware Name October September 1 OSX.Okaz 28.8% 7.6% 2 OSX.RSPlug.A 14.0% 26.3% 3 OSX.Keylogger 9.3% 3.6% 4 OSX.Flashback.K 5.4% 8.7% 5 OSX.Klog.A 5.2% 2.9% 6 OSX.Crisis 4.8% 8.7% 7 OSX.Stealbit.B 4.7% 5.3% 8 OSX.Flashback 3.9% 4.0% 9 OSX.Netweird 3.7% 5.2% 10 OSX.Sabpab 2.3% 2.7%
  • 12. p. 12 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Ransomware Over Time Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 THOUSANDS 1000 800 600 400 200 465 342 425 J F M A M J J A S O 2014 861 660 N D Malicious Activity by Source: Bots Source: Symantec :: SEPTEMBER 2014 Rank Country/Region Percent 1 United States 26.4% 2 China 11.9% 3 Taiwan 8.2% 4 Hungary 4.8% 5 Italy 4.2% 6 Canada 3.4% 7 Japan 3.0% 8 Brazil 2.8% 9 Poland 2.3% 10 Germany 2.2% 156 143 230 183 149 95 80
  • 13. p. 13 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Number of Vulnerabilities Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 800 700 600 500 400 300 200 100 J F M A M J J A S O 2014 N D 438 575 600 596 399 438 471 542 562 579 473 555 Zero-Day Vulnerabilities Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 8 7 6 5 4 3 2 1 2 2 2 J F M A M J J A S O 2014 N D 0 0 0 0 0 5 0 1 4 Vulnerabilities At a Glance • There were 596 vulner-abilities disclosed during the month of October. • There were two zero-day vulnerabilities discovered in October. • Internet Explorer has reported the most brows-er vulnerabilities in the last 12 months. • Oracle’s Java reported the most plug-in vulner-abilities over the same time period.
  • 14. p. 14 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Browser Vulnerabilities Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 100 80 60 40 20 J F M A M J J A S O 2014 N D Opera Mozilla Firefox Microsoft Internet Explorer Google Chrome Apple Safari Plug-in Vulnerabilities Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 80 70 60 50 40 30 20 10 Java Apple Adobe ActiveX J F M A M J J A S O 2014 N D
  • 15. p. 15 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 SOCIAL MEDIA + MOBILE THREATS
  • 16. p. 16 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Mobile Mobile Malware Families by Month, Android Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 2 4 2 4 2 2 3 5 3 4 4 3 10 9 8 7 6 5 4 3 2 1 J F M A M J J A S O 2014 N D At a Glance • There were five Android malware families discov-ered in July. • Of the threats discovered in the last 12 months, 26 percent are tradi-tional threats, such as back door Trojans and downloaders. • In terms of social networking scams, 38 percent were fake offer-ings, while 49 percent were manually shared scams.
  • 17. p. 17 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Mobile Threat Classifications Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 30% 25 20 15 10 5 Adware Annoyance Reconfigure Device Send Content Traditional Threats Track User Steal Information Track User Risks that spy on the individual using the device, collecting SMS messages or phone call logs, tracking GPS coordinates, recording phone calls, or gathering pictures and video taken with the device. Steal Information This includes the collection of both device- and user-specific data, such as device information, configuration data, or banking details. Traditional Threats Threats that carry out traditional malware functions, such as back doors and downloaders. Recongure Device These types of risks attempt to elevate privileges or simply modify various settings within the operating system. Adware/Annoyance Mobile risks that display advertising or generally perform actions to disrupt the user. Send Content These risks will send text messages to premium SMS numbers, ultimately appearing on the bill of the device’s owner. Other risks can be used to send spam messages. 6% 13% 26% 22% 13% 19%
  • 18. p. 18 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Social Media Social Media Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 100% 90 80 70 60 50 40 30 20 10 2% .6% Comment Jacking Fake Apps 49% 10% Manual Likejacking Sharing 38% Fake Offering Fake Offers These scams invite social network users to join a fake event or group with incentives such as free gift cards. Joining often requires the user to share credentials with the attacker or send a text to a premium rate number. Manual Sharing Scams These rely on victims to actually do the work of sharing the scam by presenting them with intriguing videos, fake offers or messages that they share with their friends. Likejacking Using fake “Like” buttons, attackers trick users into clicking website buttons that install malware and may post updates on a user’s newsfeed, spreading the attack. Comment Jacking Similar to likejacking, this type of scam relies on users clicking links that are added to comments by attackers. The links may lead to malware or survey scams. Fake App Users are invited to subscribe to an application that appears to be integrated for use with a social network, but is not as described and may be used to steal credentials or harvest other personal data.
  • 19. p. 19 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 PHISHING, SPAM + EMAIL THREATS
  • 20. p. 20 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Phishing and Spam Phishing Rate Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 1 in 500 1 in 1000 1 in 1500 1 in 2000 1 in 2500 J F M A M J J A S O 2014 N D 2041 1610 236 306 401 478 370 731 395 496 1290 1587 At a Glance • The phishing rate rose in October, at one in 1,610 emails, up from one in 2,041 emails in September. • The global spam rate was 55.3 percent for the month of October. • One out of every 329 emails contained a virus. • Of the email traffic in the month of October, 6.9 percent contained a mali-cious URL. Global Spam Rate Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 100% 90 80 70 60 50 40 30 20 10 J F M A M J J A S O 2014 69 71 N D 62 62 66 59 61 60 64 63 58 55
  • 21. p. 21 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 Email Threats Proportion of Email Traffic in Which Virus Was Detected Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 Proportion of Email Traffic Containing URL Malware Source: Symantec :: NOVEMBER 2013 — OCTOBER 2014 100% 90 80 70 60 50 40 30 20 10 14 16 14 6 7 10 J F M A M J J A S O 2014 N D 6 3 14 7 8 3 1 in 50 1 in 100 1 in 150 1 in 200 1 in 250 1 in 300 1 in 350 1 in 400 1 in 450 1 in 500 J F M A M J J A S O 2014 N D 351 329 129 112 207 188 141 234 183 232 351 270
  • 22. p. 22 Symantec Corporation Symantec Intelligence Report :: OCTOBER 2014 About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings – anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company’s more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2013, it recorded revenues of $6.9 billion. To learn more go to www.symantec.com or connect with Symantec at: go.symantec.com/socialmedia. More Information • Symantec Worldwide: http://www.symantec.com/ • ISTR and Symantec Intelligence Resources: http://www.symantec.com/threatreport/ • Symantec Security Response: http://www.symantec.com/security_response/ • Norton Threat Explorer: http://us.norton.com/security_response/threatexplorer/ • Norton Cybercrime Index: http://us.norton.com/cybercrimeindex/
  • 23. For specific country offices and contact numbers, please visit our website. For product information in the U.S., call toll-free 1 (800) 745 6054. Symantec Corporation World Headquarters 350 Ellis Street Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners