SlideShare a Scribd company logo
 
SYMANTEC	
  INTERENT	
  SECURITY	
  THREAT	
  




                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  

                                                        SYMANTEC INTERNET
                                                         SECURITY THREAT
                                                 	
  
                                                             REPORT
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
                                                 	
  
Foreword	
  
	
  
       As	
   the	
   Secretary	
   General	
   of	
   the	
   International	
   Telecommunications	
   Union	
   (ITU),	
   it	
   gives	
   me	
  
       immense	
   pleasure	
   to	
   present	
   The	
   Internet	
   Security	
   Threat	
   Report	
   from	
   Symantec,	
   for	
   the	
  
       year	
  2011.	
  This	
  report,	
  made	
  available	
  by	
   the	
  ITU,	
   shall	
  be	
  the	
  forerunner	
  of	
   many	
   reports	
  that	
  
       I	
  aspire	
  to	
  put	
  forward	
  in	
  order	
  to	
  emphasize	
  the	
  importance	
  of	
  cybersecurity	
  in	
  this	
  era.	
  
	
  
       On	
   19th	
   May	
   2011,	
   through	
   its	
   public–private	
   partnership	
   with	
   Symantec,	
   ITU	
   reached	
   new	
  
       milestones	
  in	
  the	
  fight	
  against	
  cyber	
  threats,	
  further	
  strengthening	
  the	
  security	
  in	
  the	
  usage	
  of	
  
       ICTs.	
  	
   ITU’s	
  	
   ongoing	
  	
   commitment	
  	
   to	
  	
   publish	
  	
   Symantec	
  	
   security	
  	
   reports	
  	
   aims	
  	
   to	
  	
   appraise	
  
       Member	
   States	
  of	
   the	
   rising	
   cyber	
   threats,	
   subsequently	
   creating	
   a	
   safer	
   and	
  more	
   secure	
   cyber	
  
       space	
  for	
  general	
  consumers,	
  businesses	
  and	
  most	
  significantly	
  children	
  and	
  youth	
  at	
  large.	
  
	
  
       The	
  Internet	
  Security	
  Threat	
  Report	
   volume	
  17,	
  published	
  in	
   	
  May 2012	
  provides	
   an	
  overview	
  
       and	
  analysis	
  of	
  global	
  threat	
  activity	
  for	
  the	
  year	
  2011.	
  	
  The	
  highlights	
  of	
  the	
  report	
  were:	
  
	
  
        §    Symantec	
  blocked	
  over	
  5.5	
  billion	
  malware	
  attacks	
  in	
  2011.	
   Malicious	
  attacks	
  increased	
  by	
  
              81%	
   compared	
   to	
   the	
   year	
   2010.	
   403	
   million	
   new	
   variants	
   of	
   malware	
   were	
   created	
   in	
  
              2011,	
  	
   which	
  	
   is	
  	
   41%	
  	
   more	
  	
   compared	
  	
   to	
  	
   2010.	
  	
   The	
  	
   three	
  	
   most	
  	
   prevalent	
  	
   malicious	
  
              programs	
  for	
  the	
  year	
  2011	
  were	
  Ramnit,	
  Sality.AE,	
  and	
  Bamital;	
  
        §    More	
   than	
   232.4	
  million	
  identities	
   were	
   exposed	
  overall	
   in	
  2011.	
  The	
  most	
   frequent	
   cause	
  
              for	
  data	
  breaches	
  was	
  theft	
  or	
  loss	
  of	
  a	
  medium	
  on	
  which	
  data	
  is	
  stored	
  or	
  transmitted;	
  
        §    Targeted	
   attacks,	
   politically	
   motivated	
   attacks,	
   data	
   breaches	
   and	
   attacks	
   on	
   certificate	
  
              authorities	
   were	
   prominent	
   and	
   increased	
   in	
   2011.	
   Government	
   and	
   Public	
   sector	
  
              organisations	
  were	
  the	
   most	
  targeted	
  by	
  email	
  attacks	
   in	
  the	
  year	
  2011,	
  while	
  a	
  rising	
  tide	
  
              of	
  advanced	
  targeted	
  attacks	
  also	
  puts	
  businesses	
  of	
  all	
  sizes	
  at	
  risk;	
  
        §    Spam	
  activity	
  fell	
  from	
  88.5%	
  in	
  2010	
  to	
  75.1%	
  in	
  2011.	
  Spammers	
  are	
  now	
  focusing	
  more	
  
              on	
  social	
  networking,	
  URL	
  shorteners	
  and	
  other	
  technologies	
  that	
  challenge	
  spam	
  blocking;	
  
        §    As	
  malicious	
  programs	
  targeting	
  Macs	
  was	
  on	
  the	
  rise,	
  this	
  trend	
  is	
  expected	
  to	
  continue	
  
              through	
  2012	
  as	
  the	
  codes	
  become	
  more	
  integrated	
  with	
  the	
  wider	
  web-­‐attack	
  toolkits;	
  
        §    Phishing	
   activity	
   continued	
   to	
   rise	
   for	
   the	
   year	
   2011.	
   Phishing	
   schemes	
   continued	
   to	
   use	
  
              major	
  events	
  to	
  entice	
  recipients;	
  
        §    As	
   the	
   sales	
   of	
   smartphones	
   rose,	
   mobiles	
   offer	
   new	
   opportunities	
   of	
   potentially	
   more	
  
              profitable	
  	
   cybercrimes.	
  	
   2011	
  	
   has	
  	
   thus	
  	
   become	
  	
   the	
  	
   first	
  	
   year	
  	
   that	
  	
   mobile	
  	
   malware	
  
              presented	
   a	
   tangible	
   threat	
   to	
   enterprises	
   and	
   consumers,	
   with	
   an	
   increase	
   of	
   93.3%	
   in	
  
              mobile	
  space	
  vulnerabilities.	
  	
  Moreover,	
  malware	
  authors	
  will	
  continue	
  to	
  explore	
  ways	
  to	
  
              attack	
  mobile	
  phones	
  and	
  tablets;	
  
	
  
       I	
   believe	
   the	
   information	
   presented	
   in	
   this	
   report	
   successfully	
   highlights	
   the	
   present	
   and	
  
       predicts	
   the	
   future	
   trends	
   in	
   cyber	
   threats.	
   Thanks	
   to	
   our	
   partnership	
   and	
   common	
  
       determination,	
  we	
  have	
  managed	
  to	
  raise	
  awareness	
  and	
   control	
  cyber	
  risks	
  to	
  a	
  great	
  extent.	
  
       This	
   information	
   lays	
   emphasis	
   on	
   the	
   potential	
   cyber	
   threats	
   and	
   the	
   areas	
   with	
   scope	
   for	
  
       improvement	
  and	
  further	
  facilitates	
  the	
  creation	
  of	
  a	
  more	
  protected	
  and	
  reliable	
  cyber	
  space.	
  
	
  
	
  
	
  
	
  
	
  
	
  
       Dr.	
  Hamadoun	
  I.	
  Touré	
  
       Secretary-­‐General,	
  ITU	
  

More Related Content

Viewers also liked

Boletin junio 2016
Boletin junio 2016Boletin junio 2016
Boletin junio 2016
cepecole
 
Nevermore
NevermoreNevermore
Nevermore
cepecole
 
Pre Historia
Pre HistoriaPre Historia
Pre Historia
cepecole
 
Verminoses
VerminosesVerminoses
Verminoses
pratesclaudio
 
Cafe solo
Cafe soloCafe solo
Cafe solo
cepecole
 
El disco del_tiempo
El disco del_tiempoEl disco del_tiempo
El disco del_tiempo
cepecole
 

Viewers also liked (6)

Boletin junio 2016
Boletin junio 2016Boletin junio 2016
Boletin junio 2016
 
Nevermore
NevermoreNevermore
Nevermore
 
Pre Historia
Pre HistoriaPre Historia
Pre Historia
 
Verminoses
VerminosesVerminoses
Verminoses
 
Cafe solo
Cafe soloCafe solo
Cafe solo
 
El disco del_tiempo
El disco del_tiempoEl disco del_tiempo
El disco del_tiempo
 

Similar to Symantec reportinternetsecurity

Region 8 Aviation Safety Newsletter
Region 8 Aviation Safety NewsletterRegion 8 Aviation Safety Newsletter
Region 8 Aviation Safety Newsletter
butest
 
Mr Sahel Skype Net Neutrality DigiWorld Summit 2011
Mr Sahel Skype Net Neutrality DigiWorld Summit 2011Mr Sahel Skype Net Neutrality DigiWorld Summit 2011
Mr Sahel Skype Net Neutrality DigiWorld Summit 2011
IDATE DigiWorld
 
Mon cirt khaltar
Mon cirt khaltarMon cirt khaltar
Mon cirt khaltar
Khaltar Togtuun
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD
 
Information Assurance
Information AssuranceInformation Assurance
Information Assurance
strativia01
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
AM Publications
 
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMDSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
Andris Soroka
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
Tracy Berry
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
Symantec Italia
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Ivanti
 
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
AmmLibera AL
 
Attact evolution
Attact evolutionAttact evolution
Attact evolution
RoshAan4
 
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-RoundtableTMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
Laura Tibbo
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
Ivanti
 
Earning Attention Where it Matters Most: The Power & Imperative to Build Bran...
Earning Attention Where it Matters Most: The Power & Imperative to Build Bran...Earning Attention Where it Matters Most: The Power & Imperative to Build Bran...
Earning Attention Where it Matters Most: The Power & Imperative to Build Bran...
iStrategy
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
Constantin Cocioaba
 
Awarenesstechnologies Intro Document
Awarenesstechnologies Intro DocumentAwarenesstechnologies Intro Document
Awarenesstechnologies Intro Document
GuardEra Access Solutions, Inc.
 
Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital world
forumdavignon
 
Top Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdfTop Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdf
Techugo Inc
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Online
evolutionaryit
 

Similar to Symantec reportinternetsecurity (20)

Region 8 Aviation Safety Newsletter
Region 8 Aviation Safety NewsletterRegion 8 Aviation Safety Newsletter
Region 8 Aviation Safety Newsletter
 
Mr Sahel Skype Net Neutrality DigiWorld Summit 2011
Mr Sahel Skype Net Neutrality DigiWorld Summit 2011Mr Sahel Skype Net Neutrality DigiWorld Summit 2011
Mr Sahel Skype Net Neutrality DigiWorld Summit 2011
 
Mon cirt khaltar
Mon cirt khaltarMon cirt khaltar
Mon cirt khaltar
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Information Assurance
Information AssuranceInformation Assurance
Information Assurance
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
 
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMDSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
 
Attact evolution
Attact evolutionAttact evolution
Attact evolution
 
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-RoundtableTMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Earning Attention Where it Matters Most: The Power & Imperative to Build Bran...
Earning Attention Where it Matters Most: The Power & Imperative to Build Bran...Earning Attention Where it Matters Most: The Power & Imperative to Build Bran...
Earning Attention Where it Matters Most: The Power & Imperative to Build Bran...
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
Awarenesstechnologies Intro Document
Awarenesstechnologies Intro DocumentAwarenesstechnologies Intro Document
Awarenesstechnologies Intro Document
 
Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital world
 
Top Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdfTop Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdf
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Online
 

Symantec reportinternetsecurity

  • 1.   SYMANTEC  INTERENT  SECURITY  THREAT                 SYMANTEC INTERNET SECURITY THREAT   REPORT                                  
  • 2. Foreword     As   the   Secretary   General   of   the   International   Telecommunications   Union   (ITU),   it   gives   me   immense   pleasure   to   present   The   Internet   Security   Threat   Report   from   Symantec,   for   the   year  2011.  This  report,  made  available  by   the  ITU,   shall  be  the  forerunner  of   many   reports  that   I  aspire  to  put  forward  in  order  to  emphasize  the  importance  of  cybersecurity  in  this  era.     On   19th   May   2011,   through   its   public–private   partnership   with   Symantec,   ITU   reached   new   milestones  in  the  fight  against  cyber  threats,  further  strengthening  the  security  in  the  usage  of   ICTs.     ITU’s     ongoing     commitment     to     publish     Symantec     security     reports     aims     to     appraise   Member   States  of   the   rising   cyber   threats,   subsequently   creating   a   safer   and  more   secure   cyber   space  for  general  consumers,  businesses  and  most  significantly  children  and  youth  at  large.     The  Internet  Security  Threat  Report   volume  17,  published  in    May 2012  provides   an  overview   and  analysis  of  global  threat  activity  for  the  year  2011.    The  highlights  of  the  report  were:     § Symantec  blocked  over  5.5  billion  malware  attacks  in  2011.   Malicious  attacks  increased  by   81%   compared   to   the   year   2010.   403   million   new   variants   of   malware   were   created   in   2011,     which     is     41%     more     compared     to     2010.     The     three     most     prevalent     malicious   programs  for  the  year  2011  were  Ramnit,  Sality.AE,  and  Bamital;   § More   than   232.4  million  identities   were   exposed  overall   in  2011.  The  most   frequent   cause   for  data  breaches  was  theft  or  loss  of  a  medium  on  which  data  is  stored  or  transmitted;   § Targeted   attacks,   politically   motivated   attacks,   data   breaches   and   attacks   on   certificate   authorities   were   prominent   and   increased   in   2011.   Government   and   Public   sector   organisations  were  the   most  targeted  by  email  attacks   in  the  year  2011,  while  a  rising  tide   of  advanced  targeted  attacks  also  puts  businesses  of  all  sizes  at  risk;   § Spam  activity  fell  from  88.5%  in  2010  to  75.1%  in  2011.  Spammers  are  now  focusing  more   on  social  networking,  URL  shorteners  and  other  technologies  that  challenge  spam  blocking;   § As  malicious  programs  targeting  Macs  was  on  the  rise,  this  trend  is  expected  to  continue   through  2012  as  the  codes  become  more  integrated  with  the  wider  web-­‐attack  toolkits;   § Phishing   activity   continued   to   rise   for   the   year   2011.   Phishing   schemes   continued   to   use   major  events  to  entice  recipients;   § As   the   sales   of   smartphones   rose,   mobiles   offer   new   opportunities   of   potentially   more   profitable     cybercrimes.     2011     has     thus     become     the     first     year     that     mobile     malware   presented   a   tangible   threat   to   enterprises   and   consumers,   with   an   increase   of   93.3%   in   mobile  space  vulnerabilities.    Moreover,  malware  authors  will  continue  to  explore  ways  to   attack  mobile  phones  and  tablets;     I   believe   the   information   presented   in   this   report   successfully   highlights   the   present   and   predicts   the   future   trends   in   cyber   threats.   Thanks   to   our   partnership   and   common   determination,  we  have  managed  to  raise  awareness  and   control  cyber  risks  to  a  great  extent.   This   information   lays   emphasis   on   the   potential   cyber   threats   and   the   areas   with   scope   for   improvement  and  further  facilitates  the  creation  of  a  more  protected  and  reliable  cyber  space.               Dr.  Hamadoun  I.  Touré   Secretary-­‐General,  ITU