Top 10 Global Threat Rank by Source

Similar documents
Israel Internet Security Threat Profile

LinkedIn Economic Graph Project

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

SYMANTEC INTELLIGENCE REPORT NOVEMBER 2015

MessageLabs Intelligence: August 2007 Storm botnet serves-up a diet of fast-flux spam

Template for data breach notifications I

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Be certain. MessageLabs Intelligence: May 2006

IC B01: Internet Security Threat Report: How to Stay Protected

Power Analyzer Firmware Update Utility Version Software Release Notes

Integrating CaliberRM with Mercury TestDirector

Special Conditions and Service Description UNLIMITED 1.5GB

Partner Guidelines to sign Agreement. May, 2017

Purchasing. Operations 3% Marketing 3% HR. Production 1%

DATA APPENDIX. Real Exchange Rate Movements and the Relative Price of Nontraded Goods Caroline M. Betts and Timothy J. Kehoe

U85026A Detector 40 to 60 GHz

Safety. Introduction

McAfee Labs Threat Report

Digital Opportunity Index. Michael Minges Telecommunications Management Group, Inc.

Internet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008

Programming Note. Agilent Technologies Quick Reference Guide For the 8757D/E Scalar Network Analyzer

Supplier Responding to New Products RFP Event

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

CYBERTECH MIDWEST Indianapolis, Indiana

Phishing Activity Trends Report January, 2005

CUSTOMER GUIDE Interoute One Bridge Outlook Plugin Meeting Invite Example Guide

Phishing Activity Trends Report. 4 th Quarter Unifying the. Global Response To Cybercrime. October December 2012

MARKET NEWSLETTER No 69 February 2013

Robert Potter Vice President Americas Symantec. Copyright 2016, Symantec Corporation

Automating Security Response based on Internet Reputation

Phishing Activity Trends Report. 3 rd Quarter Unifying the. Global Response To Cybercrime. July September 2012

Security & Phishing

Introduction to the Export Services Branch Programmes and Services Ministry of International Trade

MOBILE FORENSICS AND SECURITY

Customers want to transform their datacenter 80% 28% global IT budgets spent on maintenance. time spent on administrative tasks

May 2011 Intelligence Report

MessageLabs Intelligence: October 2006 Do you want spam with that spam?

Is the world ready for mobile payments?

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

An Extensive Evaluation of the Internet s Open Proxies

Cyber Threat Intelligence Report

GadgitKids IS. Reverse Mentoring. Customized to Your: o Mobile Device o Learning Objectives o Learning Needs

How the world pays, now and in the future: The Global Payments Report. Ieuan Owen, SVP Strategy Worldpay ecom

StarTeamMPX Server. Publish/Subscribe Technology for StarTeam. By the Development Resources Platform Team. March, A Borland White Paper

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO MEDIA CONVERGENCE SERVER 7845H-2400

Data Loss Prevention - Global Market Outlook ( )

Wick Hill Group, River Court, Albert Drive, Woking, Surrey, GU21 5RP

Allianz SE Reinsurance Branch Asia Pacific Systems Requirements & Developments. Dr. Lutz Füllgraf

International Roaming Critical Information Summaries JULY 2017

Phishing Activity Trends Report August, 2006

EventBuilder.com. International Audio Conferencing Access Guide. This guide contains: :: International Toll-Free Access Dialing Instructions

AN POST SCHEDULE OF CHARGES

Rates. Local Call Rates. Overseas Call Rates (v019) Monday to Friday 8:00pm to 7:59am 8 per min Saturday and Sunday All Day

Keysight Technologies Configuring Boundary Scan Chains on Keysight x1149 Boundary Scan Analyzer. Application Note

PRODUCT DATA. Reporting Module Type 7832

Demo Guide. Keysight Multi-Operator with M937xA PXIe Vector Network Analyzers

Cyber Attack: Is Your Business at Risk?

Korea Phishing Activity Trends Report

Phishing Activity Trends Report November, 2004

UAE and the NRI A brief introduction. December 2016

Global entertainment and media outlook Explore the content and tools

Step 1: New Portal User User ID Created Using IdentityIQ (IIQ)

PEOPLE CENTRIC SECURITY THE NEW

Configuring DHCP for ShoreTel IP Phones

The Application Usage and Risk Report End User Application Trends in the Enterprise - Country Specific Findings

ITU Digital Access Index

MANUAL VOICE/DATA SIMCARD CANADA

Phishing Activity Trends Report August, 2005

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Investing in Japan Speech by Shuichi Hirano Managing Director, JETRO Sydney. Copyright (C) 2015 JETRO. All rights reserved.

Troubleshooting Ethernet Problems with Your Oscilloscope APPLICATION NOTE

Items exceeding one or more of the maximum weight and dimensions of a flat. For maximum dimensions please see the service user guide.

Carrier Services. Intelligent telephony. for over COUNTRIES DID NUMBERS. All IP

Holiday Hotspots. Wi-Fi Intelligence. A Wi-Fi Roaming Case Study

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA

International Packets

Accreditation Schedule

Welcome to Baker McKenzie Stockholm Fifth Annual Trade Day. 7 November 2017

Cisco Aironet In-Building Wireless Solutions International Power Compliance Chart

USB On The Go AppNote October 5, 2014

Insights for Clubs

2018 Cyber Security Predictions

AN2667 Application note

Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications

Patent Portfolio Overview May The data in this presentation is current as of this date.

Keysight Technologies N8825A/B Infiniium 10BASE-T / 100BASE-TX Ethernet Decoder. Data Sheet

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

InterCall Mobile Assistant iphone Installation and User Guide

ISO in the world today

International Business Mail Rate Card

Quintiles vdesk Welcome Guide

Ponemon Institute s 2018 Cost of a Data Breach Study

Improving digital infrastructure for a better connected Thailand

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR JAPAN

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

N2753A and N2754A Windows XP to Windows 7 Upgrade Kits. For Infiniium 9000, 90000, and X-Series Oscilloscopes

Innovative Fastening Technologies

Phishing Activity Trends

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Transcription:

Symantec Internet Security Threat Report, Volume 21 1 Top 10 Threat by Source WORLD RANK PERCENTAGE OF GLOBAL DETECTIONS China 1 2 10.6% 23.7% United States 2 1 18.9% 20.7% India Netherlands Taiwan Turkey United Kingdom Germany France Brazil 3 3 4 4 5 6 6 19 7 7 8 5 9 13 10 10 1.2% 3.4% 4.0% 2.8% 3.6% 2.4% 2.6% 2.6% 2.2% 3.3% 2.1% 1.9% 2.0% 2 4 6 8 10 12 14 16 18 20 22 24 26%

Symantec Internet Security Threat Report, Volume 21 2 Threats by Source Malicious Code 19 1.4% 12 2.1% Spam 10 1.7% 42 0.4% Phishing Hosts 8 2.2% 7 2.5% Bots 11 1.6% 9 3.0% Network Attacking Countries 13 1.7% 12 1.7% Web Attacking Countries 23 0.4% 19 0.4%

Symantec Internet Security Threat Report, Volume 21 3 Email by Destination Malware 1 in 547 Phishing 1 in 2,761 Spam 51.9% Top Malware Industries Ratio Malware by Company Size Ratio 1 250 1 in 373 251 500 1 in 223 501 1000 1 in 406 1001 1500 1 in 550 1501 2500 1 in 770 2501+ 1 in 591 Construction 1 in 182 Wholesale Trade 1 in 202 Public Administration 1 in 250 Agriculture, Forestry, & Fishing 1 in 276 Manufacturing 1 in 294 Top Phishing Industries Ratio Wholesale Trade 1 in 1,131 Agriculture, Forestry, & Fishing 1 in 1,154 Public Administration 1 in 1,307 Construction 1 in 1,506 Retail Trade 1 in 1,794 Phishing by Company Size Ratio 1 250 1 in 1,927 251 500 1 in 1,104 501 1000 1 in 2,561 1001 1500 1 in 3,768 1501 2500 1 in 5,854 2501+ 1 in 3,315 Spam by Company Size 1 250 50.6% 251 500 54.4% 501 1000 55.9% 1001 1500 51.0% 1501 2500 5 2501+ 56.0% Top Spam Industries Mining 58.1% Public Administration 53.9% Construction 52.9% Wholesale Trade 52.6% Transportation & Public Utilities 52.4%

Symantec Internet Security Threat Report, Volume 21 4 Top 5 : Spear-Phishing/Targeted by Destination of per 1 United Kingdom 26.6% 3.1 3.0% 2 United States 17.2% 2.1 2.2% 3 Singapore 10.8% 3.6 32.7% 4 Australia 8.9% 2.5 6.7% 5 Hong Kong 6.1% 2.4 25.9% Top 5 Industries: Spear-Phishing/Targeted by Destination Industry of per 1 Finance, Insurance, & Real Estate 46.7% 3.8 7.6% 2 Services 22.5% 1.3 2.4% 3 Wholesale Trade 9.5% 1.1 5.1% 4 Manufacturing 8.3% 1.6 2.9% 5 Mining 6.5% 1.0 16.7% Distribution of Spear-Phishing by Size Size of Per 1 250 54.6% 1.2 2.1% 251 500 2.8% 1.0 3.9% 501 1000 1.9% 1.0 4.8% 1001 1500 25.9% 4.7 23.1% 1501 2500 1.9% 1.0 10.5% 2501+ 13.0% 1.2 21.4% *The Risk in Group figure is a measure of the likelihood of an organization in that industry being attacked at least once during the year. E.g. if there are 100 customers in a group and 10 of them were targeted, that would indicate a risk of 10%.

Symantec Internet Security Threat Report, Volume 21 5 Ransomware by Destination Total Number of per Day of All Detections 4 Canada 1,641 3.8% Ransomware by Destination Top 5 1 United States 24,082 56.2% 2 Germany 5,980 14.0% 3 United Kingdom 2,215 5.2% 4 Canada 1,641 3.8% 5 France 1,073 2.5% Social Media Scams by Destination of All Scams Comment App Redirect of Total Offers Plugins Like Manual Sharing 5 4.4% 0.1% 2.4% 9.2% 0.4% 3.4% 84.5% Social Media Scams by Destination Top 5 of All Scams Comment App Redirect Offers Plugins Like Manual Sharing 1 United States 25.68% <0.0% 3.1% 12.4% 0.7% 5.7% 78.2% 2 India 16.00% <0.0% 0.3% 3.6% 0.8% 1.7% 93.6% 3 United Kingdom 5.59% 0.1% 3.6% 13.3% 1.0% 5.1% 76.9% 4 France 5.22% 0.1% 1.1% 13.2% 0.1% 2.4% 83.0% 5 Canada 4.44% 0.1% 2.4% 9.2% 0.4% 3.4% 84.5%