SlideShare a Scribd company logo
17 CYREN CYBER SECURITY AWARENESS REPORT
CYREN cyber intelligence powers the
security solutions of over 200 of the largest
IT and security technology providers in
the world. Every day, CYREN collects and
analyzes 17 billion pieces of threat data,
through 500,000 global points of presence,
distributed across 200 countries, ultimately
protecting 600 million global users.
6.25%of all Android apps installed
are malicious
655,000new Android malware variants
found in Q3 — 24% less
than in Q2
7of the top 10 types of Android
malware are adware related; the
remaining 3 are SMS Trojans
Android Malware
Distribution Trends
Q3 2015
Phishing Trends Spam Trends
24%
4.3 millionphishing URLs tracked by CYREN
— down 19% from July
Spam Trends
19% 5.4%
CYREN analysts believe that the decrease
could be a normalizing trend from the
significant increase in Q2 (38%)
52 billionaverage Spam Per Day in Q3
— down 5.4% from 55 billion in Q2
The September 2015 spam
level was the lowest in six
years, at 47.4 billlion per day
60
50
40
30
20
10
0
2.5
2
1.5
1
0.5
0
SFThWTMSu
Billions
Billions
Spam Malware
Fridays are the peak distribution days for both Malware and Spam.
CYBERTHREATReport
17B
PIECES OF
THREAT DATA
200
COUNTRIES
500K
GLOBAL POINTS
OF PRESENCE
600M
GLOBAL USERS
2.25
billionaverage Malware
attachments on
Fridays in Q3

More Related Content

What's hot

Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.
DATA SECURITY SOLUTIONS
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
Quick Heal Technologies Ltd.
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
IBM Security
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
Комсс Файквэе
 
Making Sense of Cybersecurity for Small Business
Making Sense of Cybersecurity for Small BusinessMaking Sense of Cybersecurity for Small Business
Making Sense of Cybersecurity for Small Business
Mary Brophy
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
Symantec
 
Cybersecurity Webinar for Small Business
Cybersecurity Webinar for Small BusinessCybersecurity Webinar for Small Business
Cybersecurity Webinar for Small Business
Chad Gniffke
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
jordan67370
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
Cigniti Technologies Ltd
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
 13 Ransomware Statistics That Will Make You Rethink Data Protection  13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
Worksighted
 
INFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats EvolveINFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats Evolve
Symantec
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Rahul Neel Mani
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
 
Cyberattacks and Enterprise Risk Management
Cyberattacks and Enterprise Risk ManagementCyberattacks and Enterprise Risk Management
Cyberattacks and Enterprise Risk Management
Ivanti
 
Vizru GDPR compliance framework
Vizru GDPR compliance frameworkVizru GDPR compliance framework
Vizru GDPR compliance framework
Ramesh Mahalingam
 
Infographic: The crippled state of network security
Infographic: The crippled state of network securityInfographic: The crippled state of network security
Infographic: The crippled state of network security
Great Bay Software
 
2019 State of Cyber Security Report
2019 State of Cyber Security Report2019 State of Cyber Security Report
2019 State of Cyber Security Report
Mohamed Zaheer Husain
 
Online financial fraud infographic
Online financial fraud infographicOnline financial fraud infographic
Online financial fraud infographic
Prayukth K V
 

What's hot (19)

Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Making Sense of Cybersecurity for Small Business
Making Sense of Cybersecurity for Small BusinessMaking Sense of Cybersecurity for Small Business
Making Sense of Cybersecurity for Small Business
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
Cybersecurity Webinar for Small Business
Cybersecurity Webinar for Small BusinessCybersecurity Webinar for Small Business
Cybersecurity Webinar for Small Business
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
 13 Ransomware Statistics That Will Make You Rethink Data Protection  13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
INFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats EvolveINFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats Evolve
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Cyberattacks and Enterprise Risk Management
Cyberattacks and Enterprise Risk ManagementCyberattacks and Enterprise Risk Management
Cyberattacks and Enterprise Risk Management
 
Vizru GDPR compliance framework
Vizru GDPR compliance frameworkVizru GDPR compliance framework
Vizru GDPR compliance framework
 
Infographic: The crippled state of network security
Infographic: The crippled state of network securityInfographic: The crippled state of network security
Infographic: The crippled state of network security
 
2019 State of Cyber Security Report
2019 State of Cyber Security Report2019 State of Cyber Security Report
2019 State of Cyber Security Report
 
Online financial fraud infographic
Online financial fraud infographicOnline financial fraud infographic
Online financial fraud infographic
 

Viewers also liked

Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Cyren, Inc
 
Bruno Franklin- áRvore de causas
Bruno Franklin- áRvore de causasBruno Franklin- áRvore de causas
Bruno Franklin- áRvore de causas
Brunofranklin
 
Cronograma anual 2009
Cronograma anual 2009Cronograma anual 2009
Cronograma anual 2009DGAC
 
Planejamento de trabalho julho
Planejamento de trabalho julhoPlanejamento de trabalho julho
Planejamento de trabalho julho
WELINGTON JUSTO
 
Cronograma anual de capacitaciones pereira
Cronograma anual de capacitaciones pereiraCronograma anual de capacitaciones pereira
Cronograma anual de capacitaciones pereira
Jose Joaco Pena
 
Modelo de ppra_comentado
Modelo de ppra_comentadoModelo de ppra_comentado
Modelo de ppra_comentado
Silvia Nascimento
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Matthew Rosenquist
 
Aac analise arvore de causas
Aac analise arvore de causasAac analise arvore de causas
Aac analise arvore de causas
vanderli cunha
 
PPRA
PPRAPPRA
2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report Infographic2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report InfographicCarlo Arioli
 
Cipa Arvore De Causas
Cipa   Arvore De CausasCipa   Arvore De Causas
Cipa Arvore De Causas
Alessandro Silva
 
2016 Cyber Threat Defense Report
2016 Cyber Threat Defense Report2016 Cyber Threat Defense Report
2016 Cyber Threat Defense Report
Citrix
 
PCMSO - Programa de Controle Médico de Saúde Ocupacional
PCMSO - Programa de Controle Médico de Saúde OcupacionalPCMSO - Programa de Controle Médico de Saúde Ocupacional
PCMSO - Programa de Controle Médico de Saúde OcupacionalRenato Sfolia
 
NR7 PCMSO
NR7 PCMSONR7 PCMSO
NR7 PCMSO
Rose Oliveira
 
Nr 7, a teoria e a prática
Nr 7, a teoria e a práticaNr 7, a teoria e a prática
Nr 7, a teoria e a prática
Ana Carolina Castro
 
PPRA - PROGRAMA DE PREVENÇÃO DE RISCOS AMBIENTAIS
PPRA - PROGRAMA DE PREVENÇÃO DE RISCOS AMBIENTAISPPRA - PROGRAMA DE PREVENÇÃO DE RISCOS AMBIENTAIS
PPRA - PROGRAMA DE PREVENÇÃO DE RISCOS AMBIENTAIS
Francielle Almeida
 

Viewers also liked (18)

Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Bruno Franklin- áRvore de causas
Bruno Franklin- áRvore de causasBruno Franklin- áRvore de causas
Bruno Franklin- áRvore de causas
 
Cronograma anual 2009
Cronograma anual 2009Cronograma anual 2009
Cronograma anual 2009
 
Planejamento de trabalho julho
Planejamento de trabalho julhoPlanejamento de trabalho julho
Planejamento de trabalho julho
 
Cronograma anual de capacitaciones pereira
Cronograma anual de capacitaciones pereiraCronograma anual de capacitaciones pereira
Cronograma anual de capacitaciones pereira
 
Modelo de ppra_comentado
Modelo de ppra_comentadoModelo de ppra_comentado
Modelo de ppra_comentado
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
 
Aac analise arvore de causas
Aac analise arvore de causasAac analise arvore de causas
Aac analise arvore de causas
 
PPRA
PPRAPPRA
PPRA
 
2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report Infographic2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report Infographic
 
Arvore de causas
Arvore de causasArvore de causas
Arvore de causas
 
Cipa Arvore De Causas
Cipa   Arvore De CausasCipa   Arvore De Causas
Cipa Arvore De Causas
 
2016 Cyber Threat Defense Report
2016 Cyber Threat Defense Report2016 Cyber Threat Defense Report
2016 Cyber Threat Defense Report
 
PCMSO - Programa de Controle Médico de Saúde Ocupacional
PCMSO - Programa de Controle Médico de Saúde OcupacionalPCMSO - Programa de Controle Médico de Saúde Ocupacional
PCMSO - Programa de Controle Médico de Saúde Ocupacional
 
Slides diagrama-de-causa-e-efeito
Slides diagrama-de-causa-e-efeitoSlides diagrama-de-causa-e-efeito
Slides diagrama-de-causa-e-efeito
 
NR7 PCMSO
NR7 PCMSONR7 PCMSO
NR7 PCMSO
 
Nr 7, a teoria e a prática
Nr 7, a teoria e a práticaNr 7, a teoria e a prática
Nr 7, a teoria e a prática
 
PPRA - PROGRAMA DE PREVENÇÃO DE RISCOS AMBIENTAIS
PPRA - PROGRAMA DE PREVENÇÃO DE RISCOS AMBIENTAISPPRA - PROGRAMA DE PREVENÇÃO DE RISCOS AMBIENTAIS
PPRA - PROGRAMA DE PREVENÇÃO DE RISCOS AMBIENTAIS
 

Similar to [Infographic] CYREN Q3 2015 Cyber Threat Report

Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015
CheapSSLUSA
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
RapidSSLOnline.com
 
Istr 21-2016-en
Istr 21-2016-enIstr 21-2016-en
Istr 21-2016-en
Andrey Apuhtin
 
HCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportHCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat report
Matthew J McMahon
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
Omar Bshara
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
Waqas Amir
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
Symantec Intelligence Report November 2014
Symantec Intelligence Report November 2014Symantec Intelligence Report November 2014
Symantec Intelligence Report November 2014
Symantec
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Business Days
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence Report
Symantec
 
Career in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptxCareer in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptx
Boni Yeamin
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015
Avast
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
CheapSSLsecurity
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
RapidSSLOnline.com
 
Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentInternet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) Government
SSLRenewals
 
"Latest Android threats and their techniques" - Lukas Štefanko
"Latest Android threats and their techniques" - Lukas Štefanko "Latest Android threats and their techniques" - Lukas Štefanko
"Latest Android threats and their techniques" - Lukas Štefanko
PROIDEA
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
Anjoum .
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal ArticleTaylre Janak
 

Similar to [Infographic] CYREN Q3 2015 Cyber Threat Report (20)

Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
 
Istr 21-2016-en
Istr 21-2016-enIstr 21-2016-en
Istr 21-2016-en
 
HCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportHCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat report
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Symantec Intelligence Report November 2014
Symantec Intelligence Report November 2014Symantec Intelligence Report November 2014
Symantec Intelligence Report November 2014
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence Report
 
Career in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptxCareer in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptx
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentInternet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) Government
 
"Latest Android threats and their techniques" - Lukas Štefanko
"Latest Android threats and their techniques" - Lukas Štefanko "Latest Android threats and their techniques" - Lukas Štefanko
"Latest Android threats and their techniques" - Lukas Štefanko
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal Article
 

[Infographic] CYREN Q3 2015 Cyber Threat Report

  • 1. 17 CYREN CYBER SECURITY AWARENESS REPORT CYREN cyber intelligence powers the security solutions of over 200 of the largest IT and security technology providers in the world. Every day, CYREN collects and analyzes 17 billion pieces of threat data, through 500,000 global points of presence, distributed across 200 countries, ultimately protecting 600 million global users. 6.25%of all Android apps installed are malicious 655,000new Android malware variants found in Q3 — 24% less than in Q2 7of the top 10 types of Android malware are adware related; the remaining 3 are SMS Trojans Android Malware Distribution Trends Q3 2015 Phishing Trends Spam Trends 24% 4.3 millionphishing URLs tracked by CYREN — down 19% from July Spam Trends 19% 5.4% CYREN analysts believe that the decrease could be a normalizing trend from the significant increase in Q2 (38%) 52 billionaverage Spam Per Day in Q3 — down 5.4% from 55 billion in Q2 The September 2015 spam level was the lowest in six years, at 47.4 billlion per day 60 50 40 30 20 10 0 2.5 2 1.5 1 0.5 0 SFThWTMSu Billions Billions Spam Malware Fridays are the peak distribution days for both Malware and Spam. CYBERTHREATReport 17B PIECES OF THREAT DATA 200 COUNTRIES 500K GLOBAL POINTS OF PRESENCE 600M GLOBAL USERS 2.25 billionaverage Malware attachments on Fridays in Q3