The Cyber Espionage Blueprint by RSA Security

  • 285 views
Uploaded on

Read more via http://blogs.rsa.com/the-cyber-espionage-blueprint/?fb_source=pubv1

Read more via http://blogs.rsa.com/the-cyber-espionage-blueprint/?fb_source=pubv1

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
285
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
8
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. The Current State of Cyber Threats • 2397 01 Number of cyber espionage malware samples analyzed for the “Blueprint” report Finding • 60 02 Approx. # of Trojan families used in Cyber Espionage campaigns Finding 54% Percent of cyber espionage malware samples with random or nonsensical filenames 68% Percent of cyber espionage malware samples using standard ports to communicate • 05 Finding 03 • Finding 04 • Finding 67% Percent of cyber espionage malware samples installed in the user profile directory Findings listed above come from the report, “The Cyber Espionage Blueprint” EMC2, EMC, RSA, the RSA logo, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2013 EMC Corporation. All rights reserved.