SlideShare a Scribd company logo
1 of 23
Download to read offline
SYMANTEC INTELLIGENCE REPORT
JUNE 2014
p. 2
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
CONTENTS
3		Summary
4	 TARGETED ATTACKS + DATA BREACHES
5		Targeted Attacks
5			Attachments Used in Spear-Phishing
Emails
5			Spear-Phishing Attacks by Size of
Targeted Organization
5			Average Number of Spear-Phishing
Attacks Per Day
6			Top-Ten Industries Targeted
in Spear-Phishing Attacks
7		Data Breaches
7			Timeline of Data Breaches
8			Total Identities Exposed
8			Top Causes of Data Breaches
8			Total Data Breaches
9			Top-Ten Types of Information Breached
10	 MALWARE TACTICS
11		Malware Tactics
11			Top-Ten Malware
11			Malicious Activity by Source: Bots
12			Top-Ten Mac OSX Malware
12			Ransomware Over Time
13		Vulnerabilities
13			Number of Vulnerabilities
13			Zero-Day Vulnerabilities
14			Browser Vulnerabilities
14			Plug-in Vulnerabilities
15	 SOCIAL MEDIA
+ MOBILE THREATS
16		Mobile
16			Mobile Malware Families by Month,
Android
16			Number of Android Variants
Per Family
17			Mobile Threat Classifications
18		Social Media
18			Social Media
19	 PHISHING, SPAM + EMAIL THREATS
20		Phishing and Spam
20			Phishing Rate
20			Global Spam Rate
21		Email Threats
21			Proportion of Email Traffic
Containing URL Malware
21			Proportion of Email Traffic
in Which Virus Was Detected
22		About Symantec
22		More Information
p. 3
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Summary
Welcome to the June edition of the
Symantec Intelligence report. Symantec
Intelligence aims to provide the latest
analysis of cyber security threats, trends,
and insights concerning malware, spam, and
other potentially harmful business risks.
Symantec has established the most
comprehensive source of Internet threat
data in the world through the Symantec™
Global Intelligence Network, which is made
up of more than 41.5 million attack sensors
and records thousands of events per second.
This network monitors threat activity in
over 157 countries and territories through
a combination of Symantec products and
services such as Symantec DeepSight™
Threat Management System, Symantec™
Managed Security Services, Norton™
consumer products, and other third-party
data sources.
The largest data breach reported in June resulted in the exposure
up 1.3 million identities. This seems like a small number when
compared to the 145 million exposed in the largest breach of
May. However, while reported in June, this breach also took
place during the month of May. This brings the total number
of identities exposed in May to over 147 million, which is the
second-worst month for data breaches in the last 12 months.
There was an average of 88 spear-phishing attacks per day in
June. This appears to be a return of spear-phishing levels seen
in the months of March and April, after the average per day
dropped in May.
A relatively new OSX threat by the name of OSX.Stealbit.B
topped our list of OSX malware, responsible for 25.7 percent of
OSX threat found on OSX systems. This threat looks for specific
bitcoin-related software on OSX computers and will attempt to
modify the programs in order to steal bitcoins.
The number of Android variants per family reached the lowest
levels seen in the last twelve months. While there was not a
significant change in the number of families discovered in
June, this may indicate that attackers have had more success
with their current set of threats, reducing their need to create
multiple variants.
June was a quiet month for vulnerabilities, where (only) 438
were reported—tying the lowest number reported in the last 12
months. There were no zero day vulnerabilities disclosed during
the month.
We hope that you enjoy this month’s report and feel free to
contact us with any comments or feedback.
Ben Nahorney, Cyber Security Threat Analyst
symantec_intelligence@symantec.com
p. 4
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014TARGETEDATTACKS
+DATABREACHES
p. 5
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
At a Glance
•	 The average number of
spear-phishing attacks
per day returned to similar
levels seen in March and
April, after dropping in May.
•	 The .doc file type continues
to be the most common
attachment type used in
spear-phishing attacks,
followed by .exe files.
•	 Organizations with 2500+
employees were the most
likely to be targeted in May.
•	 The Top-Ten Industries
targeted remains largely
unchanged from May, with
minor shifts of less than
one percent for various
industries.
Targeted Attacks
Average Number of Spear-Phishing
Attacks Per Day
Source: Symantec :: JULY 2013 — JUNE 2014
25
50
75
100
125
150
175
200
225
250
JMAMFJ
2014
DNOSAJ
171
188
21
116
54
141
84 84
54
88
103
165
Attachments Used in Spear-Phishing
Emails
Source: Symantec :: JUNE 2014
Executable type June May
.doc 19.5% 17.7%
.exe 15.4% 16.1%
.au3 11.5% 11.8%
.jpg 6.2% 7.0%
.scr 5.8% 6.4%
.class 2.1% 1.6%
.pdf 1.7% 1.3%
.bin 1.1% 1.2%
.mso 0.6% —
.dmp 0.6% —
Spear-Phishing Attacks by Size
of Targeted Organization
Source: Symantec :: JUNE 2014
Organization Size June May
1-250 36.3% 37.0%
251-500 8.4% 8.6%
501-1000 9.3% 9.0%
1001-1500 3.0% 3.0%
1501-2500 4.1% 4.1%
2500+ 38.9% 38.3%
p. 6
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Top-Ten Industries Targeted in
Spear-Phishing Attacks
Source: Symantec :: JUNE 2014
Mining
Construction
Retail
Transportation, Gas,
Communications, Electric
Public Administration
Wholesale
Services – Professional
Finance, Insurance
& Real Estate
Manufacturing
Services – Non-Traditional 22%
19
17
11
9
6
6
3
1
1
p. 7
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Data Breaches
At a Glance
•	 The largest data breach reported in June took place during the
month of May.
•	 With 1.3 million identities exposed in this breach, this brings
the total identities exposed in May to 147 million.
•	 Hackers have been responsible for 49 percent of data breach-
es in the last 12 months.
•	 Real names, government ID numbers, such as Social Security
numbers, and home addresses were the top three types of
data exposed in data breaches.
20
40
60
80
100
120
140
160
JMAMFJDNOSAJ
NUMBEROFINCIDENTS
IDENTITIESEXPOSED(MILLIONS)INCIDENTS IDENTITIES EXPOSED (Millions)
Timeline of Data Breaches
Source: Symantec :: JULY 2013 — JUNE 2014
147
2.7 .91.72.6
8
130
113
159
.8.3
8
37
17
27
22
22
28
27
23
18
16
9
20
5
10
15
20
25
30
35
40
p. 8
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Top Causes of Data Breaches
Source: Symantec :: JULY 2013 — JUNE 2014
Unknown
Fraud
Insider Theft
Theft or Loss
of Computer
or Drive
Accidentally
Made Public
Hackers
49%
20%
23%
7%
.4%
.4%
Number
of Incidents
131
62
52
19
1
1
266TOTAL
Total Data
Breaches
JULY 2013 — JUNE 2014
266
Total Identities
Exposed
JULY 2013 — JUNE 2014
574Million
p. 9
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Top-Ten Types of Information Breached
Source: Symantec :: JULY 2013 — JUNE 2014
Real Names
Gov ID numbers (Soc Sec)
Home Address
Birth Dates
Medical Records
Financial Information
Phone Numbers
Email Addresses
Usernames & Passwords
Insurance
01
02
03
04
05
06
07
08
09
10
74%
46%
44%
44%
33%
26%
20%
18%
14%
9%
Methodology
This data is procured from the Norton Cybercrime Index (CCI). The Norton CCI is a statistical model
that measures the levels of threats, including malicious software, fraud, identity theft, spam,
phishing, and social engineering daily. The data breach section of the Norton CCI is derived from
data breaches that have been reported by legitimate media sources and have exposed personal
information.
In some cases a data breach is not publicly reported during the same month the incident occurred,
or an adjustment is made in the number of identities reportedly exposed. In these cases, the data in
the Norton CCI is updated. This causes fluctuations in the numbers reported for previous months
when a new report is released.
Norton Cybercrime Index
http://us.norton.com/protect-yourself
p. 10
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
MALWARETACTICS
p. 11
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Malware Tactics
At a Glance
•	 W32.Sality and
W32.Ramnit variants
continue to dominate the
top-ten malware list.
•	 The United States contin-
ues to be the largest
source of bot activity.
•	 The most common
threat on OSX was
OSX.Stealbit.B, making
up 26 percent of all OSX
malware found on OSX
Endpoints.
Malicious Activity by Source: Bots
Source: Symantec :: JUNE 2014
Rank Country/Region Percent
1 United States 21.9%
2 China 10.6%
3 Taiwan 7.1%
4 Hungary 5.0%
5 Italy 4.4%
6 Brazil 3.0%
7 Japan 2.9%
8 Canada 2.7%
9 France 2.6%
10 Germany 2.2%
Top-Ten Malware
Source: Symantec :: JUNE 2014
Rank Name Percentage
1 W32.Sality.AE 5.3%
2 W32.Ramnit!html 5.1%
3 W32.Ramnit.B 3.8%
4 W32.Almanahe.B!inf 3.7%
5 W32.Downadup.B 2.9%
6 W32.Ramnit.B!inf 2.6%
7 W32.SillyFDC.BDP!lnk 2.1%
8 W32.Virut.CF 1.6%
9 Trojan.Malscript 1.4%
10 Trojan.Zbot 1.4%
p. 12
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Top-Ten Mac OSX Malware Blocked
on OSX Endpoints
Source: Symantec :: JUNE 2014
Malware Name
Percent of Mac Threats
Detected on Macs
OSX.Stealbit.B 25.7%
OSX.RSPlug.A 24.1%
OSX.Flashback.K 14.7%
OSX.HellRTS 6.0%
OSX.Sabpab 4.9%
OSX.SMSSend 4.5%
OSX.Keylogger 2.5%
OSX.Loosemaque 2.2%
OSX.Remoteaccess 2.0%
OSX.Flashback 1.6%
p. 13
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Number of Vulnerabilities
Source: Symantec :: JULY 2013 — JUNE 2014
100
200
300
400
500
600
700
800
JMAMFJ
2014
DNOSAJ
438
561
469
549
438
471
542 562 579
473
663
555
Zero-Day Vulnerabilities
Source: Symantec :: JULY 2013 — JUNE 2014
1
2
3
4
5
6
7
8
JMAMFJ
2014
DNOSAJ
0
1
0 0 0
2 2
0
5
0
1
4
Vulnerabilities
At a Glance
•	 Vulnerabilities are at
their lowest levels seen in
the last 12 months.
•	 There were no zero-day
vulnerabilities discovered
in June.
•	 Internet Explorer has
reported the most brows-
er vulnerabilities in the
last 12 months.
•	 Oracle’s Java reported
the most plug-in vulner-
abilities over the same
time period.
p. 14
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Browser Vulnerabilities
Source: Symantec :: JULY 2013 — JUNE 2014
20
40
60
80
100
JMAMFJ
2014
DNOSAJ
Opera
Mozilla Firefox
Microsoft Internet Explorer
Google Chrome
Apple Safari
Plug-in Vulnerabilities
Source: Symantec :: JULY 2013 — JUNE 2014
10
20
30
40
50
60
70
80
Java
Apple
Adobe
ActiveX
JMAMFJ
2014
DNOSAJ
p. 15
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014SOCIALMEDIA
+MOBILETHREATS
p. 16
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Mobile
Mobile Malware Families by Month,
Android
Source: Symantec :: JULY 2013 — JUNE 2014
8
2
7
2
4
2
4
2
3
44
3
1
2
3
4
5
6
7
8
9
10
JMAMFJ
2014
DNOSAJ
Number of Android Variants Per Family
Source: Symantec :: JULY 2013 — JUNE 2014
20
40
60
80
100
120
JMAMFJ
2014
DNOSAJ
20
107
36
93
33
60
41
80
66
18
48 46
At a Glance
•	 There were four Android
malware families discov-
ered in June.
•	 The number of variants
per family reached its
lowest levels seen in the
last 12 months.
•	 Of the threats discovered
in the last 12 months, 28
percent track the device’s
user and 21 percent steal
information from the
device.
•	 In terms of social
networking scams,
78 percent were fake
offerings.
p. 17
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Mobile Threat Classifications
Source: Symantec :: JULY 2013 — JUNE 2014
Track User Risks that spy on the individual using the device, collecting SMS
messages or phone call logs, tracking GPS coordinates, recording phone calls,
or gathering pictures and video taken with the device.
Steal Information This includes the collection of both device- and user-specific
data, such as device information, configuration data, or banking details.
Traditional Threats Threats that carry out traditional malware functions,
such as back doors and downloaders.
Reconfigure Device These types of risks attempt to elevate privileges
or simply modify various settings within the operating system.
Adware/Annoyance Mobile risks that display advertising or generally perform
actions to disrupt the user.
Send Content These risks will send text messages to premium SMS numbers,
ultimately appearing on the bill of the device’s owner. Other risks can be used to
send spam messages.
5
10
15
20
25
30
Adware
Annoyance
Send
Content
Reconfigure
Device
Traditional
Threats
Steal
Information
Track
User
7%
12%
21%21%
13%
24%
p. 18
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Social Media
Social Media
Source: Symantec :: JULY 2013 — JUNE 2014
70%
Fake Offers These scams invite social network users to join a fake event or group
with incentives such as free gift cards. Joining often requires the user to share
credentials with the attacker or send a text to a premium rate number.
Manual Sharing Scams These rely on victims to actually do the work of sharing
the scam by presenting them with intriguing videos, fake offers or messages that they
share with their friends.
Likejacking Using fake “Like” buttons, attackers trick users into clicking website
buttons that install malware and may post updates on a user’s newsfeed, spreading the
attack.
Comment Jacking Similar to likejacking, this type of scam relies on users clicking
links that are added to comments by attackers. The links may lead to malware or survey
scams.
Fake App Users are invited to subscribe to an application that appears to be
integrated for use with a social network, but is not as described and may be used to
steal credentials or harvest other personal data.
10
20
30
40
50
60
70
80
90%
Comment
Jacking
Fake
Apps
LikejackingManual
Sharing
Fake
Offering
20%
7%
1% .7%
p. 19
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
PHISHING,SPAM+EMAILTHREATS
p. 20
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Phishing and Spam
Phishing Rate
Source: Symantec :: JULY 2013 — JUNE 2014
1 in 100
1 in 200
1 in 300
1 in 400
1 in 500
1 in 600
1 in 700
1 in 800
1 in 900
JMAMFJ
2014
DNOSAJ
At a Glance
•	 The phishing rate for
June was one in 496
emails, down from one in
395 emails in May.
•	 The global spam rate
was 59.9 percent for the
month of June.
•	 One out of every 232
emails contained a virus.
•	 Of the email traffic in
the month of June, 7.4
percent contained a mali-
cious URL.
Global Spam Rate
Source: Symantec :: JULY 2013 — JUNE 2014
10
20
30
40
50
60
70
80%
JMAMFJ
2014
DNOSAJ
p. 21
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
Email Threats
Proportion of Email Traffic
Containing URL Malware
Source: Symantec :: JULY 2013 — JUNE 2014
5
10
15
20
25
30
35
40
45%
JMAMFJ
2014
DNOSAJ
1 in 50
1 in 100
1 in 150
1 in 200
1 in 250
1 in 300
1 in 350
1 in 400
1 in 450
1 in 500
JMAMFJ
2014
DNOSAJ
Proportion of Email Traffic
in Which Virus Was Detected
Source: Symantec :: JULY 2013 — JUNE 2014
p. 22
Symantec Corporation
Symantec Intelligence Report :: JUNE 2014
About Symantec
More Information
•  Symantec Worldwide: http://www.symantec.com/
•  ISTR and Symantec Intelligence Resources: http://www.symantec.com/threatreport/
•  Symantec Security Response: http://www.symantec.com/security_response/
•  Norton Threat Explorer: http://us.norton.com/security_response/threatexplorer/
•  Norton Cybercrime Index: http://us.norton.com/cybercrimeindex/
Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps
people, businesses and governments seeking the freedom to unlock the opportunities
technology brings – anytime, anywhere. Founded in April 1982, Symantec, a Fortune
500 company, operating one of the largest global data-intelligence networks, has
provided leading security, backup and availability solutions for where vital information
is stored, accessed and shared. The company’s more than 20,000 employees reside in
more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec
customers. In fiscal 2013, it recorded revenues of $6.9 billion. To learn more go to
www.symantec.com or connect with Symantec at: go.symantec.com/socialmedia.
For specific country offices and contact numbers,
please visit our website.
For product information in the U.S.,
call toll-free 1 (800) 745 6054.
Symantec Corporation World Headquarters
350 Ellis Street
Mountain View, CA 94043 USA
+1 (650) 527 8000
1 (800) 721 3934
www.symantec.com
Copyright © 2014 Symantec Corporation.
All rights reserved. Symantec, the Symantec Logo,
and the Checkmark Logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may
be trademarks of their respective owners

More Related Content

What's hot

H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportH1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportBitdefender
 
E-threat landscape report H1 2012
E-threat landscape report H1 2012E-threat landscape report H1 2012
E-threat landscape report H1 2012BitDefenderRo
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015CheapSSLUSA
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecSoluciona Facil
 
Microsoft security intelligence_report_regional_threat_assessment_romania
Microsoft security intelligence_report_regional_threat_assessment_romaniaMicrosoft security intelligence_report_regional_threat_assessment_romania
Microsoft security intelligence_report_regional_threat_assessment_romaniaB Eduard
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat ReportRapidSSLOnline.com
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
 

What's hot (19)

H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportH1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
 
E-threat landscape report H1 2012
E-threat landscape report H1 2012E-threat landscape report H1 2012
E-threat landscape report H1 2012
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Iranian Hackers Have Hit Hundreds of Companies in Past Two Years
Iranian Hackers Have Hit Hundreds of Companies in Past Two YearsIranian Hackers Have Hit Hundreds of Companies in Past Two Years
Iranian Hackers Have Hit Hundreds of Companies in Past Two Years
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Microsoft security intelligence_report_regional_threat_assessment_romania
Microsoft security intelligence_report_regional_threat_assessment_romaniaMicrosoft security intelligence_report_regional_threat_assessment_romania
Microsoft security intelligence_report_regional_threat_assessment_romania
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Istr 21-2016-en
Istr 21-2016-enIstr 21-2016-en
Istr 21-2016-en
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 

Viewers also liked

Whitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudyWhitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudySymantec
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec
 
Butterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial GainButterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial GainSymantec
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec
 
Backup Exec Partner Toolkit
Backup Exec Partner ToolkitBackup Exec Partner Toolkit
Backup Exec Partner ToolkitSymantec
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS AttacksSymantec
 
INFOGRAPHIC▶ Enable the Agile Data Center
INFOGRAPHIC▶ Enable the Agile Data CenterINFOGRAPHIC▶ Enable the Agile Data Center
INFOGRAPHIC▶ Enable the Agile Data CenterSymantec
 
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...Symantec
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperSymantec
 
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330Symantec
 
NetBackup: backup to the cloud, from the cloud, and in the cloud
NetBackup: backup to the cloud, from the cloud, and in the cloudNetBackup: backup to the cloud, from the cloud, and in the cloud
NetBackup: backup to the cloud, from the cloud, and in the cloudSymantec
 
WHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareWHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareSymantec
 

Viewers also liked (12)

Whitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudyWhitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach Study
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014
 
Butterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial GainButterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial Gain
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015
 
Backup Exec Partner Toolkit
Backup Exec Partner ToolkitBackup Exec Partner Toolkit
Backup Exec Partner Toolkit
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
 
INFOGRAPHIC▶ Enable the Agile Data Center
INFOGRAPHIC▶ Enable the Agile Data CenterINFOGRAPHIC▶ Enable the Agile Data Center
INFOGRAPHIC▶ Enable the Agile Data Center
 
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
 
NetBackup: backup to the cloud, from the cloud, and in the cloud
NetBackup: backup to the cloud, from the cloud, and in the cloudNetBackup: backup to the cloud, from the cloud, and in the cloud
NetBackup: backup to the cloud, from the cloud, and in the cloud
 
WHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareWHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of Ransomware
 

Similar to Symantec Intelligence Report - June 2014

Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec
 
Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]Sergey Ulankin
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoJonas Mercier
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013- Mark - Fullbright
 
Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentInternet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentSSLRenewals
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017Dryden Geary
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security ReportBAKOTECH
 
Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013Kenn Peterson
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enAndrey Apuhtin
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Symantec
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexAndreanne Clarke
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009Symantec Italia
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 

Similar to Symantec Intelligence Report - June 2014 (20)

Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 
Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
 
Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentInternet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) Government
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security Report
 
B intelligence report-08-2013.en-us
B intelligence report-08-2013.en-usB intelligence report-08-2013.en-us
B intelligence report-08-2013.en-us
 
Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence Index
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Symantec Intelligence Report - June 2014

  • 2. p. 2 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 CONTENTS 3 Summary 4 TARGETED ATTACKS + DATA BREACHES 5 Targeted Attacks 5 Attachments Used in Spear-Phishing Emails 5 Spear-Phishing Attacks by Size of Targeted Organization 5 Average Number of Spear-Phishing Attacks Per Day 6 Top-Ten Industries Targeted in Spear-Phishing Attacks 7 Data Breaches 7 Timeline of Data Breaches 8 Total Identities Exposed 8 Top Causes of Data Breaches 8 Total Data Breaches 9 Top-Ten Types of Information Breached 10 MALWARE TACTICS 11 Malware Tactics 11 Top-Ten Malware 11 Malicious Activity by Source: Bots 12 Top-Ten Mac OSX Malware 12 Ransomware Over Time 13 Vulnerabilities 13 Number of Vulnerabilities 13 Zero-Day Vulnerabilities 14 Browser Vulnerabilities 14 Plug-in Vulnerabilities 15 SOCIAL MEDIA + MOBILE THREATS 16 Mobile 16 Mobile Malware Families by Month, Android 16 Number of Android Variants Per Family 17 Mobile Threat Classifications 18 Social Media 18 Social Media 19 PHISHING, SPAM + EMAIL THREATS 20 Phishing and Spam 20 Phishing Rate 20 Global Spam Rate 21 Email Threats 21 Proportion of Email Traffic Containing URL Malware 21 Proportion of Email Traffic in Which Virus Was Detected 22 About Symantec 22 More Information
  • 3. p. 3 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Summary Welcome to the June edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks. Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources. The largest data breach reported in June resulted in the exposure up 1.3 million identities. This seems like a small number when compared to the 145 million exposed in the largest breach of May. However, while reported in June, this breach also took place during the month of May. This brings the total number of identities exposed in May to over 147 million, which is the second-worst month for data breaches in the last 12 months. There was an average of 88 spear-phishing attacks per day in June. This appears to be a return of spear-phishing levels seen in the months of March and April, after the average per day dropped in May. A relatively new OSX threat by the name of OSX.Stealbit.B topped our list of OSX malware, responsible for 25.7 percent of OSX threat found on OSX systems. This threat looks for specific bitcoin-related software on OSX computers and will attempt to modify the programs in order to steal bitcoins. The number of Android variants per family reached the lowest levels seen in the last twelve months. While there was not a significant change in the number of families discovered in June, this may indicate that attackers have had more success with their current set of threats, reducing their need to create multiple variants. June was a quiet month for vulnerabilities, where (only) 438 were reported—tying the lowest number reported in the last 12 months. There were no zero day vulnerabilities disclosed during the month. We hope that you enjoy this month’s report and feel free to contact us with any comments or feedback. Ben Nahorney, Cyber Security Threat Analyst symantec_intelligence@symantec.com
  • 4. p. 4 Symantec Corporation Symantec Intelligence Report :: JUNE 2014TARGETEDATTACKS +DATABREACHES
  • 5. p. 5 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 At a Glance • The average number of spear-phishing attacks per day returned to similar levels seen in March and April, after dropping in May. • The .doc file type continues to be the most common attachment type used in spear-phishing attacks, followed by .exe files. • Organizations with 2500+ employees were the most likely to be targeted in May. • The Top-Ten Industries targeted remains largely unchanged from May, with minor shifts of less than one percent for various industries. Targeted Attacks Average Number of Spear-Phishing Attacks Per Day Source: Symantec :: JULY 2013 — JUNE 2014 25 50 75 100 125 150 175 200 225 250 JMAMFJ 2014 DNOSAJ 171 188 21 116 54 141 84 84 54 88 103 165 Attachments Used in Spear-Phishing Emails Source: Symantec :: JUNE 2014 Executable type June May .doc 19.5% 17.7% .exe 15.4% 16.1% .au3 11.5% 11.8% .jpg 6.2% 7.0% .scr 5.8% 6.4% .class 2.1% 1.6% .pdf 1.7% 1.3% .bin 1.1% 1.2% .mso 0.6% — .dmp 0.6% — Spear-Phishing Attacks by Size of Targeted Organization Source: Symantec :: JUNE 2014 Organization Size June May 1-250 36.3% 37.0% 251-500 8.4% 8.6% 501-1000 9.3% 9.0% 1001-1500 3.0% 3.0% 1501-2500 4.1% 4.1% 2500+ 38.9% 38.3%
  • 6. p. 6 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Top-Ten Industries Targeted in Spear-Phishing Attacks Source: Symantec :: JUNE 2014 Mining Construction Retail Transportation, Gas, Communications, Electric Public Administration Wholesale Services – Professional Finance, Insurance & Real Estate Manufacturing Services – Non-Traditional 22% 19 17 11 9 6 6 3 1 1
  • 7. p. 7 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Data Breaches At a Glance • The largest data breach reported in June took place during the month of May. • With 1.3 million identities exposed in this breach, this brings the total identities exposed in May to 147 million. • Hackers have been responsible for 49 percent of data breach- es in the last 12 months. • Real names, government ID numbers, such as Social Security numbers, and home addresses were the top three types of data exposed in data breaches. 20 40 60 80 100 120 140 160 JMAMFJDNOSAJ NUMBEROFINCIDENTS IDENTITIESEXPOSED(MILLIONS)INCIDENTS IDENTITIES EXPOSED (Millions) Timeline of Data Breaches Source: Symantec :: JULY 2013 — JUNE 2014 147 2.7 .91.72.6 8 130 113 159 .8.3 8 37 17 27 22 22 28 27 23 18 16 9 20 5 10 15 20 25 30 35 40
  • 8. p. 8 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Top Causes of Data Breaches Source: Symantec :: JULY 2013 — JUNE 2014 Unknown Fraud Insider Theft Theft or Loss of Computer or Drive Accidentally Made Public Hackers 49% 20% 23% 7% .4% .4% Number of Incidents 131 62 52 19 1 1 266TOTAL Total Data Breaches JULY 2013 — JUNE 2014 266 Total Identities Exposed JULY 2013 — JUNE 2014 574Million
  • 9. p. 9 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Top-Ten Types of Information Breached Source: Symantec :: JULY 2013 — JUNE 2014 Real Names Gov ID numbers (Soc Sec) Home Address Birth Dates Medical Records Financial Information Phone Numbers Email Addresses Usernames & Passwords Insurance 01 02 03 04 05 06 07 08 09 10 74% 46% 44% 44% 33% 26% 20% 18% 14% 9% Methodology This data is procured from the Norton Cybercrime Index (CCI). The Norton CCI is a statistical model that measures the levels of threats, including malicious software, fraud, identity theft, spam, phishing, and social engineering daily. The data breach section of the Norton CCI is derived from data breaches that have been reported by legitimate media sources and have exposed personal information. In some cases a data breach is not publicly reported during the same month the incident occurred, or an adjustment is made in the number of identities reportedly exposed. In these cases, the data in the Norton CCI is updated. This causes fluctuations in the numbers reported for previous months when a new report is released. Norton Cybercrime Index http://us.norton.com/protect-yourself
  • 10. p. 10 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 MALWARETACTICS
  • 11. p. 11 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Malware Tactics At a Glance • W32.Sality and W32.Ramnit variants continue to dominate the top-ten malware list. • The United States contin- ues to be the largest source of bot activity. • The most common threat on OSX was OSX.Stealbit.B, making up 26 percent of all OSX malware found on OSX Endpoints. Malicious Activity by Source: Bots Source: Symantec :: JUNE 2014 Rank Country/Region Percent 1 United States 21.9% 2 China 10.6% 3 Taiwan 7.1% 4 Hungary 5.0% 5 Italy 4.4% 6 Brazil 3.0% 7 Japan 2.9% 8 Canada 2.7% 9 France 2.6% 10 Germany 2.2% Top-Ten Malware Source: Symantec :: JUNE 2014 Rank Name Percentage 1 W32.Sality.AE 5.3% 2 W32.Ramnit!html 5.1% 3 W32.Ramnit.B 3.8% 4 W32.Almanahe.B!inf 3.7% 5 W32.Downadup.B 2.9% 6 W32.Ramnit.B!inf 2.6% 7 W32.SillyFDC.BDP!lnk 2.1% 8 W32.Virut.CF 1.6% 9 Trojan.Malscript 1.4% 10 Trojan.Zbot 1.4%
  • 12. p. 12 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Top-Ten Mac OSX Malware Blocked on OSX Endpoints Source: Symantec :: JUNE 2014 Malware Name Percent of Mac Threats Detected on Macs OSX.Stealbit.B 25.7% OSX.RSPlug.A 24.1% OSX.Flashback.K 14.7% OSX.HellRTS 6.0% OSX.Sabpab 4.9% OSX.SMSSend 4.5% OSX.Keylogger 2.5% OSX.Loosemaque 2.2% OSX.Remoteaccess 2.0% OSX.Flashback 1.6%
  • 13. p. 13 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Number of Vulnerabilities Source: Symantec :: JULY 2013 — JUNE 2014 100 200 300 400 500 600 700 800 JMAMFJ 2014 DNOSAJ 438 561 469 549 438 471 542 562 579 473 663 555 Zero-Day Vulnerabilities Source: Symantec :: JULY 2013 — JUNE 2014 1 2 3 4 5 6 7 8 JMAMFJ 2014 DNOSAJ 0 1 0 0 0 2 2 0 5 0 1 4 Vulnerabilities At a Glance • Vulnerabilities are at their lowest levels seen in the last 12 months. • There were no zero-day vulnerabilities discovered in June. • Internet Explorer has reported the most brows- er vulnerabilities in the last 12 months. • Oracle’s Java reported the most plug-in vulner- abilities over the same time period.
  • 14. p. 14 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Browser Vulnerabilities Source: Symantec :: JULY 2013 — JUNE 2014 20 40 60 80 100 JMAMFJ 2014 DNOSAJ Opera Mozilla Firefox Microsoft Internet Explorer Google Chrome Apple Safari Plug-in Vulnerabilities Source: Symantec :: JULY 2013 — JUNE 2014 10 20 30 40 50 60 70 80 Java Apple Adobe ActiveX JMAMFJ 2014 DNOSAJ
  • 15. p. 15 Symantec Corporation Symantec Intelligence Report :: JUNE 2014SOCIALMEDIA +MOBILETHREATS
  • 16. p. 16 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Mobile Mobile Malware Families by Month, Android Source: Symantec :: JULY 2013 — JUNE 2014 8 2 7 2 4 2 4 2 3 44 3 1 2 3 4 5 6 7 8 9 10 JMAMFJ 2014 DNOSAJ Number of Android Variants Per Family Source: Symantec :: JULY 2013 — JUNE 2014 20 40 60 80 100 120 JMAMFJ 2014 DNOSAJ 20 107 36 93 33 60 41 80 66 18 48 46 At a Glance • There were four Android malware families discov- ered in June. • The number of variants per family reached its lowest levels seen in the last 12 months. • Of the threats discovered in the last 12 months, 28 percent track the device’s user and 21 percent steal information from the device. • In terms of social networking scams, 78 percent were fake offerings.
  • 17. p. 17 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Mobile Threat Classifications Source: Symantec :: JULY 2013 — JUNE 2014 Track User Risks that spy on the individual using the device, collecting SMS messages or phone call logs, tracking GPS coordinates, recording phone calls, or gathering pictures and video taken with the device. Steal Information This includes the collection of both device- and user-specific data, such as device information, configuration data, or banking details. Traditional Threats Threats that carry out traditional malware functions, such as back doors and downloaders. Reconfigure Device These types of risks attempt to elevate privileges or simply modify various settings within the operating system. Adware/Annoyance Mobile risks that display advertising or generally perform actions to disrupt the user. Send Content These risks will send text messages to premium SMS numbers, ultimately appearing on the bill of the device’s owner. Other risks can be used to send spam messages. 5 10 15 20 25 30 Adware Annoyance Send Content Reconfigure Device Traditional Threats Steal Information Track User 7% 12% 21%21% 13% 24%
  • 18. p. 18 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Social Media Social Media Source: Symantec :: JULY 2013 — JUNE 2014 70% Fake Offers These scams invite social network users to join a fake event or group with incentives such as free gift cards. Joining often requires the user to share credentials with the attacker or send a text to a premium rate number. Manual Sharing Scams These rely on victims to actually do the work of sharing the scam by presenting them with intriguing videos, fake offers or messages that they share with their friends. Likejacking Using fake “Like” buttons, attackers trick users into clicking website buttons that install malware and may post updates on a user’s newsfeed, spreading the attack. Comment Jacking Similar to likejacking, this type of scam relies on users clicking links that are added to comments by attackers. The links may lead to malware or survey scams. Fake App Users are invited to subscribe to an application that appears to be integrated for use with a social network, but is not as described and may be used to steal credentials or harvest other personal data. 10 20 30 40 50 60 70 80 90% Comment Jacking Fake Apps LikejackingManual Sharing Fake Offering 20% 7% 1% .7%
  • 19. p. 19 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 PHISHING,SPAM+EMAILTHREATS
  • 20. p. 20 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Phishing and Spam Phishing Rate Source: Symantec :: JULY 2013 — JUNE 2014 1 in 100 1 in 200 1 in 300 1 in 400 1 in 500 1 in 600 1 in 700 1 in 800 1 in 900 JMAMFJ 2014 DNOSAJ At a Glance • The phishing rate for June was one in 496 emails, down from one in 395 emails in May. • The global spam rate was 59.9 percent for the month of June. • One out of every 232 emails contained a virus. • Of the email traffic in the month of June, 7.4 percent contained a mali- cious URL. Global Spam Rate Source: Symantec :: JULY 2013 — JUNE 2014 10 20 30 40 50 60 70 80% JMAMFJ 2014 DNOSAJ
  • 21. p. 21 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 Email Threats Proportion of Email Traffic Containing URL Malware Source: Symantec :: JULY 2013 — JUNE 2014 5 10 15 20 25 30 35 40 45% JMAMFJ 2014 DNOSAJ 1 in 50 1 in 100 1 in 150 1 in 200 1 in 250 1 in 300 1 in 350 1 in 400 1 in 450 1 in 500 JMAMFJ 2014 DNOSAJ Proportion of Email Traffic in Which Virus Was Detected Source: Symantec :: JULY 2013 — JUNE 2014
  • 22. p. 22 Symantec Corporation Symantec Intelligence Report :: JUNE 2014 About Symantec More Information •  Symantec Worldwide: http://www.symantec.com/ •  ISTR and Symantec Intelligence Resources: http://www.symantec.com/threatreport/ •  Symantec Security Response: http://www.symantec.com/security_response/ •  Norton Threat Explorer: http://us.norton.com/security_response/threatexplorer/ •  Norton Cybercrime Index: http://us.norton.com/cybercrimeindex/ Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings – anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company’s more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2013, it recorded revenues of $6.9 billion. To learn more go to www.symantec.com or connect with Symantec at: go.symantec.com/socialmedia.
  • 23. For specific country offices and contact numbers, please visit our website. For product information in the U.S., call toll-free 1 (800) 745 6054. Symantec Corporation World Headquarters 350 Ellis Street Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners