Insights from Collective Threat Intelligence
|
|
|
- August Sanders
- 10 years ago
- Views:
Transcription
1 Insights from Collective Threat Intelligence During 2014, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks. APRIL 2015
2 CONTENTS Foreword...3 Introduction...4 How BrightCloud Threat Intelligence is Captured, Analyzed, Classified, Correlated and Published 85,000 Net New Malicious IPs are Launched Every Day...7 Webroot BrightCloud IP Reputation Key Findings on IPs Less than 55% of all URLs are Trustworthy...10 Webroot BrightCloud Web Classification and Web Reputation Key Findings on URLs 30% of Internet Users Access Phishing Sites...14 Webroot BrightCloud Real-Time Anti-Phishing Key Findings on Phishing 15% of New Files are Malicious Executables...17 Webroot BrightCloud File Reputation Key Findings on Files Only 28% of Mobile Apps are Trustworthy or Benign...19 Webroot BrightCloud Mobile App Reputation Key Findings on Mobile Apps Conclusion
3 FOREWORD Hal Lonas, Chief Technology Officer Webroot, Inc. Webroot has seen a continued rise in the number of malicious URLs, IP addresses, malware, and mobile applications, used to enable cybercriminals to steal data, disrupt services, or cause other harm. With more breaches at major retailers, financial institutions and technology companies in the headlines and scores of other, smaller breaches in 2014, the trend shows no signs of slowing down. Each of these organizations had some form of security infrastructure. But if this is the case, to what can we attribute these breaches? A likely contributing factor is dependence on outdated security practices. They likely also lacked suitable insight and intelligence into today s dynamic threat landscape, the ability to block previously unseen attacks, and the tools to minimize time-to-detection for breaches that had gone unnoticed. At Webroot, we believe that it is essential for IT departments, users and others to have access to up-to-date intelligence on threats to their systems and endpoints of all types. Threats are constantly changing, so security controls must adapt accordingly. These security controls include being aware of the latest malicious IPs, the types of websites that are most often impersonated in phishing attacks, and the categories of apps that are most likely to be malicious. Real-time, contextual, and predictive threat intelligence that spans the spectrum of attack vectors is a critical component to implementing a defense-in-depth strategy to take on today s cybercriminals, giving companies the edge they need to combat both new and known threats. 3
4 INTRODUCTION The Webroot 2015 Threat Brief provides an overview of the threats against a wide range of organizations and individuals during It is based on analysis of threat intelligence metrics automatically captured, analyzed and correlated across threat vectors by BrightCloud, a Big Data security engine that acts as the backbone for all Webroot endpoint solutions and threat intelligence services. During 2014, BrightCloud found tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report also contains supplementary insights from the Webroot Threat Research team, and includes: Analysis of IP addresses associated with malicious activity Details on the classification and reputation of URLs Phishing detection statistics Insights into malware and potentially unwanted applications Information on mobile app security for Android devices 4
5 How BrightCloud Threat Intelligence is Captured, Analyzed, Classified, Correlated and Published Webroot endpoint and threat intelligence solutions are all powered by BrightCloud, which was purpose-built as a revolutionary approach to next-generation threat protection. BrightCloud integrates billions of pieces of information from millions of sensors to create the world s largest malware detection net. The next-generation threat intelligence produced is available to Webroot partners through BrightCloud Threat Intelligence Services for proactive protection for their customers against both known and never-before-seen attacks. These services cover URL classification and reputation, IP reputation, file reputation, anti-phishing, and mobile security. Collective Threat Intelligence Partner End Users Protected (27 Million) Figure 1: BrightCloud 5
6 Its powerful, real-time threat analysis engine has enabled Webroot to pull insights together from across the internet landscape for this threat brief. The massive data processing capacity, coupled with Webroot s proprietary implementation of the most advanced machine learning technology available and a powerful contextual analysis engine, has enabled Webroot to: 1 Monitor 3 Categorize Accurately monitor the entire IPv4 space and in-use IPv6 addresses and continuously update a dynamic list of approximately 12 million malicious IP addresses Categorize millions of files that are seen across millions of Webroot customer endpoints Classify and score over 95% of the internet on a daily basis and detect phishing sites in real time Assess the risk of millions of mobile apps (over 7 million new and updated in 2014) 2 Classify 4 Assess In addition, Webroot has mapped all of this data across vectors, linking URLs, IPs, files, and mobile applications to each other to provide greater insight and accuracy, and enabling predictive risk scoring based on those relationships. For example, a URL may seem benign when examined independently, but may be connected to malicious IPs, files, and/or mobile apps, which would affect its reputation score within the Webroot system. While this system is primarily used to keep ahead of the exponential proliferation of threats facing companies and end users today, the Webroot team has analyzed data from this system to develop an overarching view of the threat landscape. 20+ Billion URLs 7+ Billion File Behavior Records 600+ Million Domains 15+ Million Mobile Apps 4+ Billion IP Addresses 10+ Million Connected Sensors 6
7 net new malicious IPs are launched every day. Webroot BrightCloud IP Reputation One of the most effective methods to prevent attacks is by blocking activity from IP addresses that are known to have malicious intent. Webroot continuously monitors and maintains a database of over 4 billion IP addresses, from which a subset of high-risk IP addresses is updated for customers and made available to Webroot partners every five minutes, or as often as they would prefer. This frequency is necessary to identify the latest threats and provide protection against them. Frequent reassessment of IP threats is also necessary, for example, as infected hosts are cleaned and remediated, making them benign again, and as hosts change IP addresses. BrightCloud analyzes and correlates data across numerous dimensions to create a predictive risk score, which falls into one of five rating bands ranging from trustworthy to malicious. The BrightCloud IP Reputation Index provides scores ranging from 1 to 100, with tiers split into Trustworthy, Low Risk, Moderate Risk, Suspicious, and High Risk. Numerically lower, i.e. higher risk, scores indicate an IP is more likely to be or become bad, and are monitored at a greater frequency than trustworthy IPs High Risk Suspicious Moderate Risk Low Risk Trustworthy Figure 2: BrightCloud IP Reputation Index These are high risk IP addresses. There is a high predictive risk that these IPs will deliver attacks such as malicious payloads, DoS attacks, or others to your infrastructure and endpoints. These are suspicious IPs. There is a higher than average predictive risk that these IPs will deliver attacks to your infrastructure and endpoints. These are generally benign IPs, but have exhibited some potential risk characteristics. There is some predictive risk that these IPs will deliver attacks to your infrastructure and endpoints. These are benign IPs, and rarely exhibit characteristics that expose your infrastructure and endpoints to security risks. There is a low predictive risk of attack. These are clean IPs that have not been tied to a security risk. There is a very low predictive risk that your infrastructure and endpoints will be exposed to attack. 7
8 Key Findings on IPs Webroot s dynamic list of known malicious IP addresses contains approximately 12 million IPs at any given time. On a daily basis, approximately 36% of these addresses are dropped from the list, and this percentage remains relatively consistent throughout the year. Malware designers and other attackers know that an IP address is only useful for attack-launching or attack-control purposes until it is detected as malicious. Because blacklisting can occur within minutes of the appearance of new malicious activity for an IP address, attackers must change hosts and IP addresses frequently. However, because the Webroot IP blacklist is constantly updated, these changes are rapidly detected and mitigated, minimizing the window of opportunity for attackers. While most IP addresses on the blacklist drop off and don t reappear, there is a core set of IP addresses that resurface repeatedly on the blacklist. In particular, the top 10,000 malicious IP addresses are reused quite often, on average dropping off and reappearing on the blacklist nearly four times a month. Webroot also adds many IP addresses that weren t previously malicious to the blacklist. Throughout 2014, the average number of net new IP addresses added per day was over 85,000. This reinforces the importance of using an IP blacklist that is consistently updated in near real time to enable security teams to proactively block threat actors behind those IPs, such as stopping spam and distributed denial of service (DDoS) traffic by limiting the exposure to dangerous or risky IPs. As an example, a highly security conscious bank may choose to block anything with a score lower than 80, while others may choose to accept traffic from IPs with scores higher than 60 as long as the site being accessed is affiliated with a partner. Malicious IP addresses come from all over the world, but are concentrated in certain countries and regions. The United States accounts for over 30% of malicious IP addresses, followed by China and Russia, per Figure 3 (below). In fact, half of malicious IP addresses are based in Asia. 31% United States 23% 10% 8% 4% 4% 2% 1% 1% 1% China Russian Federation South Korea Vietnam Ukraine Germany Australia Chile Netherlands Figure 3: Top 10 Threat IP Origin Countries 8
9 Another interesting finding from the malicious IP address data involves threat types, such as spam sources, scanners, proxies, web attacks, phishing, and others. Based on the types of malicious activity that each IP address is involved in, it is categorized as having a primary threat type. Spam sources make up the vast majority of all malicious IPs by threat type approximately 90%. These threats are typically very short-lived, often existing for only hours or even minutes, but by using current blacklists, organizations can successfully stop spam and related botnets by blocking the associated IP addresses. Figure 4 shows the percentage of malicious IPs by threat type, excluding the predominant spam/botnet sources type. Scanners make up roughly half of the remaining threats, with proxies following closely behind. Web Attacks 6% Other 2% Proxy 41% Scanners 51% Figure 4: Malicious IPs by threat type in 2014, excluding spam sources 9
10 of all URLs are trustworthy. Webroot BrightCloud Web Classification and Web Reputation Webroot regularly classifies and monitors the reputations of over 20 billion URLs, and makes that intelligence available through the BrightCloud Web Classification Service and the BrightCloud Web Reputation Service. The Webroot BrightCloud Web Classification Service offers up-to-date and accurate website intelligence across 83 site security categories to help enterprises secure users against online threats, control internet usage, and ensure compliance by implementing sensible web access policies. Similar to the IP Reputation Service, the BrightCloud Web Reputation Service utilizes a five-tiered scoring system to assess the risk of a specific URL based on its site history, age, rank, location, networks, links, and real-time performance, as well as other contextual and behavioral trends. This website security check adds a layer of real-time protection to web defenses by accurately assessing the risk posed when opening a URL, independent of its category. At this time, the BrightCloud analysis engine classifies and scores over 2,500 URLs per second with much higher accuracy rates than can be achieved by human analysts. This speed and accuracy allows for a unique perspective into the online world. 10
11 Key Findings on URLs Not all risky URLs are created equal. Figure 5 shows the breakdown of URLs scored by BrightCloud. It is important to note that over half of the URLs assessed were found to be trustworthy, and another 11% were determined low risk. While 30% were categorized as moderate risk, this includes URLs for which not enough data was available to make a definitive classification (e.g., brand new websites.) Therefore, a URL that is labeled a moderate risk is not necessarily malicious. So while the vast majority of the web is not malicious, there are hundreds of millions of sites that organizations need to account for in their defenses. Trustworthy 54% Low Risk 11% Figure 5: Risk assessment of URLs classified in 2014 Moderate Risk 30% Suspicious 2% High Risk 3% Another important characteristic to consider is where URLs are hosted. Figure 6 depicts malicious URLs by country. The percentages in this chart are significantly different from those in Figures 3 and 5. Countries such as Russia and China, which had a major presence in malicious IP origins, are not nearly so prevalent when considered by the location of malicious URLs. One reason for this is that attackers in high-risk countries often host their malware URLs in the United States or other countries that will not be blocked automatically by geo-filtering services. An example of such a service is an enterprise network that is configured to reject all connection attempts involving URLs from a high-risk country. This underscores the importance of having URL reputation data independent of classification, as filtering purely by IPs may not be enough to keep networks and users secure. 48% 8% 4% 4% 4% 2% 2% 2% 2% 1% United States France Germany Russian Federation Netherlands United Kingdom China Canada Brazil Turkey Figure 6: Top 10 countries that host malicious URLs 11
12 Users and networks need to be kept safe from hundreds-of-millions of malicious websites. To further analyze this data, Webroot looked at the 83 categories that are used to classify URLs, such as content delivery networks, online greeting cards, and translation services. The BrightCloud Web Classification Service includes six categories of high-risk URLs, which are known spam URLs, malware sites, phishing, proxy avoidance and anonymizers, spyware/adware, and botnets. Excluding those categories, Figure 7 shows the top 15 categories in terms of high risk and suspicious activity, and their relative distributions of suspicious, moderate risk, low risk, and trustworthy URLs. These are sites that may have been compromised and not remediated, or have been correlated to other malicious URLs, IP addresses, files, or mobile apps. Online Greeting card websites have the highest likelihood of being suspicious, followed by Dynamically Generated Content sites, which is, typically, a highly trustworthy category. Computer and Internet Security sites have a disproportionately high percentage of high risk URLs, as they include references to security analysis that mentions malicious URLs and related content, and may even include links for legitimate reasons, such as security blogs. Please note that the All Categories designation is an average across all 83 categories, including the malicious categories mentioned earlier, accounting for the relatively high risk score. 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Online Greeting Cards Dynamically Generated Content Marijuana Translation Web-based Personal Storage Abused Drugs Motor Vehicles Computer & Internet Security Image and Video Search Social Networking Individual Stock Advice & Tools Questionable Peer to Peer Recreation & Hobbies All Categories High Risk Suspicious Moderate Risk Low Risk Trustworthy Figure 7: Top 15 Suspicious to High Risk website categories, excluding Malicious categories 12
13 Attackers in high-risk countries are hosting malicious sites in more trustworthy countries. In Figure 8 (below), the left column shows the top 10 most commonly visited URL categories, while the right column reflects the top 10 suspicious to high-risk URL categories. Naturally, URLs in malicious categories pose the most risk. When excluding those malicious categories, the greatest percentage of suspicious to high risk URLs are Business and Economy, Society, Shopping, Travel, and Health and Medicine. Top 10 Categories for URLs Top 10 Categories Suspicious to High Risk URLs 1 Business and Economy 21.2% 1 Spam URLs 30.9% 2 Society 12.8% 2 Malware Sites 13.7% 3 Travel 6.4% 3 Business and Economy 7.8% 4 Adult and Pornography 5.7% 4 Proxy Avoidance and Anonymizers 6.7% 5 Shopping 5.4% 5 Phishing and Other Frauds 6.4% 6 Personal sites and Blogs 4.8% 6 Society 5.1% 7 Entertainment and Arts 4.0% 7 Shopping 5.1% 8 Health and Medicine 2.7% 8 Travel 2.7% 9 Computer and Internet Info 2.5% 9 Health and Medicine 1.8% 10 News and Media 2.3% 10 Entertainment and Arts 1.8% Figure 8: Breakdown of top 10 URL Categories in 2014 Conversely, some categories that might be assumed suspicious or unwanted due to their nature are relatively reputable when compared to average scores. An example is URLs tied to the Cheating category, for which nearly 85% are Trustworthy or Low Risk, as compared to the average for all URLs of 65%. Other such categories include Hate and Racism (82% Trustworthy or Low Risk), Gross (81%), Violence (77%), Illegal (67%), Adult and Pornography (65%), and Nudity (65%). While enterprises and households, for that matter may not want their users to visit these types of sites, access and limitations thereof must be based on reliable classifications, as reputation scores alone cannot cover these sites based on preference. A list of categories used by Webroot can be found at 13
14 of internet users access phishing sites. Webroot BrightCloud Real-Time Anti-Phishing The Webroot BrightCloud Real-Time Anti-Phishing Service provides time-of-need analysis of sites to automatically determine whether they are phishing sites within milliseconds. Real-time analysis is critical with phishing sites because they are often only online for a few hours, or until a threshold of visits has been reached. While static blacklists will never be sufficient for dynamic phishing protection, real-time detection can protect against websites that are only a few seconds old. The BrightCloud Real-Time Anti-Phishing Service is used by security vendors to protect their clients and get phishing sites taken down. In 2014 Webroot added additional language support and conducted a phased roll-out of real-time anti-phishing to the Webroot SecureAnywhere protection suite for endpoints. With the additional inputs, the average number of phishing sites detected by Webroot saw a significant increase in starting in the last quarter of Accordingly, data presented in this section covers the time period between October and December
15 Key Findings on Phishing During the final three months of 2014, approximately 2.5% of Webroot customers experienced a first contact with a zero-day phishing site each month. All subsequent contact attempts by Webroot customers were automatically blocked. While 2.5% is not a significant number in itself, when extrapolated over the course of a year it yields a 30% chance of a user falling for a phishing attack that involves a fraudulent zero-day URL. This indicates how important it is to have real-time anti-phishing security controls in place to prevent such attacks from succeeding. As expected, phishing attacks surge during certain times of the year or when major world events occur. For example, there was a major spike in the data when the Charlie Hebdo tragedy occurred in early Additionally, during the last week of December 2014, there was a 50%+ increase in phishing activity when compared with the rest of the quarter, most likely due to the holiday season; it is assumed that this is related to the anticipated addition of new devices and device users. There is a 30% chance of internet users falling for a zero-day phishing attack in the course of a year. 60,000 50,000 40,000 30,000 20,000 10, /5/14 11/12/14 11/19/14 11/26/14 12/3/14 12/10/14 12/17/14 12/24/14 12/31/14 1/7/15 Figure 9: Weekly unique phishing URLs from October to December
16 Examining zero-day phishing data to discover which types of websites are being targeted yields interesting results. Webroot inspected data from the top 60 companies impersonated by phishing sites in Figure 10 (right) shows that financial services and technology companies were nearly even when it came to the total number of phishing sites. While the distribution of phishing sites may be similar among technology companies and financial institutions, the number of companies within each category that are being attacked is not. Figure 11 (right) demonstrates that over 80% of the companies impersonated were financial institutions. However, there are many more phishing attempts per technology company than per financial institution. On average there are nearly 900 phishing attempts detected per financial institution, but over 9,000 attempts detected per technology company. Within these categories, the following are the top 5 impersonated companies within the technology space and financial institutions, pulled from the top 60 targets examined. Shipping.2% Technology 55.6% Financial 44.3% Figure 10: Phishing sites by target (% of website category) Shipping.2% Technology 55.6% Financial 44.3% Figure 11: Phishing sites by target (% of companies within each website category) Top 5 Technology Company Phishing Targets Top 5 Financial Institution Phishing Targets 1 Google 35.6% 1 PayPal 52.2% 2 Apple 23.8% 2 Wells Fargo 17.9% 3 Yahoo 18.6% 3 Bank of America 12.2% 4 Facebook 13.3% 4 Chase 4.6% 5 Dropbox 6.6% 5 Lloyd s Bank 4.5% Other notables: Microsoft, Blizzard, and Adobe Other notables: NatWest, Royal Bank of Canada, Navy Federal Figure 12: Top 5 impersonated companies within the technology and financial institution categories When evaluating phishing sites by country, the United States is by far the largest host of phishing sites, with over 75% of sites being within its borders. This can be accounted for, in part, due to the larger percentage of Webroot customers being in the United States. Additionally, phishing attacks often target victims based on economic standing, so they typically focus on more developed nations, providing a higher return on investment for attackers. 16
17 of new files are malicious executables Webroot BrightCloud File Reputation Webroot offers its technology partners a dynamic, up-to-the-minute file reputation service to protect their customers. This real-time lookup service of known malicious and whitelisted file identifiers allows IT security administrators to stop the distribution of emerging threats through their networks, regardless of file type, file name, platform, encryption or password protection. By examining file characteristics, malicious executables can be divided into two classes: malware and potentially unwanted applications (PUAs). A PUA is an application that, while not inherently malicious, is generally considered inappropriate or undesirable for enterprise use. Examples include some forms of spyware and adware, as well as hacking tools. 17
18 Key Findings on Files Hundreds of millions of unique executable files were seen by Webroot for the first time in Of these files, approximately 3.4% were determined to be malware, and 12% were identified as PUAs. On average, each Webroot user encountered 1.3 new, unique instances of malware, and 4.6 new, unique instances of PUAs during This shows how rapidly executable threats are emerging and how highly customized and targeted they are, based on the sheer number of unique instances of malware and PUAs. PUAs 12% Malware 3% Besides their volume, what s interesting about malware and PUAs is how different they are in terms of variations. In 2014, Webroot detected an average of almost 700 file instances per malware family, but an average of nearly 30,000 file instances per PUA family. This corresponds to the identification of over 14,000 malware families and just over 1,000 PUA families. What this means is that a kind of malware is spread to far fewer users than a kind of PUA. This may be due to PUAs not being detected and blocked in many environments because of their questionable, but not necessarily malicious, nature. In addition to these high-level encounter statistics, 2014 saw significant growth in both volume and complexity of crypto ransomware. In total, there were 15 unique families discovered and hundreds of variants, including widely prevalent CTB/Critroni and Cryptowall 3.0. Each family introduced new innovative social engineering techniques and complexity to the encryption process. Tactics included using Twitter to list those who paid the ransom, impersonating decryption tools as a vector for infection, offering one free file decryption to prove recovery is possible, and targeting gamers and game mods to further motivate a ransom payment. Other 85% Figure 13: Simplified breakdown of file reputation categories in also brought an increase in innovative techniques to infect PCs. Most notable was the discovery of Poweliks, a Windows registry exploit capable of persisting and delivering new malware to an infected PC. What made Poweliks so powerful is that it was fully contained in the registry and did not require a file component to deliver a new infection. While Poweliks did not make the news until August of 2014, largely due to its delivery of crypto ransomware, Webroot first identified and began protecting its customers against this infection in March of Analysis of earlier examples revealed two additional techniques for applying the registry exploit, with the final version using Windows PowerShell. 18
19 ONLY of Mobile Apps are Trustworthy or Benign Webroot BrightCloud Mobile App Reputation The BrightCloud Mobile App Reputation Service helps vendors who provide mobile management and security solutions address the new security vulnerabilities that mobility creates. The service continuously analyzes applications from app stores and other online sources, identifying threats and allowing IT security admins to restrict access to applications based on individual polices and risk tolerance, to deliver safe and compliant applications to their users. Webroot has streamlined the process of analysis to provide concise classification and other information on mobile apps. A six-tiered classification enables Webroot partners to implement effective mobile app usage policies. This provides flexibility for partners to decide how to use the app information and adapt it for specific management requirements. 19
20 Trustworthy apps fell from 52% in 2013 to 28% in Key Findings on Mobile Apps In 2014, Webroot added over 7 million new and updated Android apps to its App Reputation Service, which now includes over 15 million total apps. Figure 14 (below) shows the distribution of these apps by reputation over the course of While the percentage of apps that are trustworthy or benign has remained flat, more apps were identified as unwanted or malicious as the year progressed, while suspicious app levels decreased. On average, only 28% of all apps were trustworthy or benign, nearly 50% were moderate or suspicious, and over 22% were unwanted or malicious. Although these percentages might imply that most apps have nefarious intent, keep in mind that these numbers are generated by analyzing apps from certain feeds some of which are dominated by malware. Regardless, these numbers clearly indicate a shift from benign and trustworthy apps (52% in 2013 to 28% in 2014) to malicious, suspicious, and unwanted apps. A reason for this may be that the market for new apps that offer what existing apps already provide is shrinking. Another reason for this is that malicious, suspicious, and unwanted apps are increasingly installed at the factory, particularly on devices geared for emerging markets. 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Trustworthy Benign Moderate Suspicious Unwanted Malicious Figure 14: Cumulative distribution of mobile app reputation in
21 Figure 15 (below) shows the relative frequency of types of threats within the malicious category, including adware, PUAs, rootkits, spyware, system monitors, Trojans and worms. Trojans make up the vast majority of malicious threats, averaging 77% for Trojans are a very broad category that includes SMS infections, which are the largest family of malicious Android apps, and fake installers. The other prevalent categories are PUAs (10%), spyware (9%), and rootkits (4%). During December 2014, there was a notable spike across the board, with rootkits showing a nearly nine-fold increase from November s numbers. This is likely due to the holiday season and new models of phones coming to market. For each new phone, a rooting tool is usually released soon after. Although the impact of this is not as large as the number increase might suggest, these rooting exploits clearly continue to make their way into apps. Android apps can also be analyzed by their apparent purpose, based on the 45 categories defined by the Google Play store. Webroot found malicious apps in each of the purpose categories, but not evenly distributed. The tools category, which includes a wide range of utilities, ranging from calculators to battery management apps, was by far the leading category for malicious apps, with 44% of all malicious apps, as shown in Figure 16 (next page). 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 01/14 02/14 03/14 04/14 05/14 06/14 07/14 08/14 09/14 10/14 11/14 12/14 Trojan PUA Spyware Rootkit Adware System Monitor Worm Figure 15: Frequency of Android application threat types 21
22 Other 20% Media & Video 2% Lifestyle 2% Tools 44% Social 3% Communication 3% Brain & Puzzle 4% Personalization 4% Entertainment 5% Casual 5% Arcade & Action 8% Figure 16: Top 10 malicious Android apps by category in 2014 Note that apps in this category often require additional access to the device, making them better suited for malicious purposes. The other categories in the top 10 are Arcade & Action (8%), Casual (5%), Entertainment (5%), Personalization (4%), Brain & Puzzle (4%), Communication (3%), Social (3%), Lifestyle (2%), and Media & Video (2%). The remaining 35 categories only comprise 20% of all malicious apps. What these numbers can t show is the details on the malware themselves. Below are some additional insights from Webroot analysts on the nature of these Android-based threats: 1 2 Nearly all Android malware types exploit the device administrator functionality to make themselves powerful and nearly un-removable. Because the device administrator popup label can be specified within the app, apps almost always spoof the names of other apps or use social engineering techniques to convince the victim that the popup is legitimate. It s become commonplace to emulate PC malware for Android devices. One example is the ransomware threats that have targeted PCs for years. These threats have now moved to Android devices, and include Simplelocker, the latest Svpeng variants, and Kohler. Another example is crypto-currency mining software. In 2014, mining software was discovered hidden in a number of Android apps in the Google Play store. 3 4 There s been an ever-growing amount of SMS-related malware for Android devices, including SmsForw, Smsreg, Sms.Fakeinst, and Sms.Thief. Older SMS malware such as ShastroSms and Yzhcsms has also reemerged recently. At the end of 2013, the popular obfuscation tool, Secapk, was widely available. It can be used for both legitimate purposes, such as preventing code theft, and nefarious purposes, such as hiding malicious content. The number of apps using Secapk is not shrinking over time. Webroot continues to see hundreds of apps per week that use Secapk for obfuscation. 22
23 CONCLUSION Webroot data clearly shows that threats are coming from all over the world and that these threats are extremely dynamic in nature. IP address blacklists need to be updated continuously to keep up with new attacks and attackers who thwart blacklists by quickly migrating IP addresses. Phishing attacks also come and go quickly, with approximately 30% of users falling for a zero-day phishing site Webroot BrightCloud Mobile App Reputation annually, making real-time anti-phishing security controls a necessity. The data also shows trends in benign versus malicious content. Based on the data from URL reputation services, users should be made aware that just because a URL category appears benign or malicious, that it doesn t indicate the actual nature of its websites. In addition, a staggering number of executable files over 15% of those encountered were determined to be malware or potentially unwanted applications. On average, each user encountered 6 new, unique instances of these questionable applications, which demonstrates how highly customized and targeted these applications have become in order to infiltrate systems successfully. A final area of study is the reputation of Android apps. With the number of benign and trustworthy apps falling by almost half from 2013 to 2014, and the number of malicious, suspicious, and unwanted apps nearly tripling in that same time period, Android device users are being threatened more often than ever before. In summary, organizations need to bolster their security posture with real-time, highly accurate threat intelligence to protect themselves from cybercriminal activity. This enables them to set proactive policies to automatically protect networks, endpoints, and users as part of a defense-in-depth strategy. This is crucial when security teams consider the threat landscape as a whole, in addition to conducting in-depth analysis on the threats targeting them. Individuals also need to be more vigilant than ever about the websites they visit, the URLs they follow from s, and the applications and mobile apps that they use. The Webroot Threat Research Team Discover more about the power of collective threat intelligence by visiting and where you ll also able to access insightful analyst reports. You can also learn about smarter cybersecurity solutions from Webroot by contacting your local Webroot office located on the back of this report. 23
24 About Webroot Webroot provides intelligent cybersecurity for endpoints that harnesses collective threat intelligence to protect the Internet of Everything. We protect consumers, businesses and technology providers from malware and other cyberattacks using a cloud-based threat intelligence network. Computers, tablets, smartphones and the Internet of Things can be protected by our award-winning suite of SecureAnywhere and BrightCloud products. Webroot protects over 30 million devices and is trusted by market-leading technology companies, including: Cisco, F5 Networks, HP, Microsoft, Palo Alto Networks, and RSA. Webroot is headquartered in Colorado and operates globally across North America, Europe and the Asia Pacific region. Discover smarter cybersecurity at and World Headquarters Webroot EMEA Webroot APAC 385 Interlocken Crescent Suite 800 Broomfield, Colorado USA th floor, Block A 1 George s Quay Plaza George s Quay, Dublin 2, Ireland +44 (0) Suite 1402, Level 14, Tower A 821 Pacific Highway Chatswood, NSW 2067, Australia +61 (0) Webroot Inc. All rights reserved. Webroot, Webroot BrightCloud and BrightCloud are trademarks or registered trademarks of Webroot Inc. in the United States and/or other countries. All other trademarks are properties of their respective owners.
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers
Webroot Security Intelligence for Mobile Suite Cloud-based security solutions for mobile management providers TABLE OF CONTENTS INTRODUCTION 3 WEBROOT INTELLIGENCE NETWORK 4 MOBILE SECURITY INTELLIGENCE
Webroot Security Intelligence. The World s Most Powerful Real-Time Network Security Services
Webroot Security Intelligence The World s Most Powerful Real-Time Network Security Services Table of Contents The World s Most Powerful Real-Time Network Security Services Table of Contents 2 Introduction
WHITE PAPER > THE RISKS & REWARDS OF MOBILE BANKING APPS. The Risks & Rewards of Mobile Banking Apps
> The Risks & Rewards of Mobile Banking Apps FEBRUARY 2015 The market demand for mobile banking technology and its rapidly increasing adoption rate means that many banks have been managing the security
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:
MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)
MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) JULY 2014 INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Cascadia Labs URL Filtering and Web Security
Presented by COMPARATIVE REVIEW Cascadia Labs URL Filtering and Web Security Results from Q4 2008 Executive Summary Companies rely on URL filtering and Web security products to protect their employees,
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
GFI White Paper. How Web Reputation increases your online protection
GFI White Paper How Web Reputation increases your online protection Contents Introduction to Web Reputation 3 Why use Web Reputation? 3 The value of using Web Reputation and antivirus software 3 The value
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER
EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Why phishing is back as the No. 1 web threat, and how web security can protect your company
Phishing 2.0 Why phishing is back as the No. 1 web threat, and how web security can protect your company Contents Why Business Needs to Prepare for Phishing 2.0....................... 1 The Rise and Decline
Using big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst [email protected] http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
MOBILE MALWARE REPORT
TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores
Security Business Review
Security Business Review Security Business Review Q4: 2014 2 By Bitdefender Labs Security Business Review Botnet Anonymization Raises New Security Concerns Executive Overview While botnets, which are large
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.
RESEARCHBRIEF Fake Apps, Russia, and the Mobile Making the SMSS Fraud Connection Paul Pajares and Max Goncharov Web News of an SMS fraud service affecting many countries first broke out in Russia in 2010.
Evaluating DMARC Effectiveness for the Financial Services Industry
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
Zscaler Cloud Web Gateway Test
Zscaler Cloud Web Gateway Test A test commissioned by Zscaler, Inc. and performed by AV-TEST GmbH. Date of the report: April15 th, 2016 Executive Summary In March 2016, AV-TEST performed a review of the
The Advanced Cyber Attack Landscape
The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational
Malware Trend Report, Q2 2014 April May June
Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...
PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD
PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD April 2013 As cybercriminals will have it, phishing attacks are quite the seasonal trend. It seems that every April, after showing a slight decline
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES
WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,
How To Protect Your Endpoints From Attack
2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations
Endpoint Security and the Case For Automated Sandboxing
WHITE PAPER Endpoint Security and the Case For Automated Sandboxing https://enterprise.comodo.com A World of Constant Threat We live in a world of constant threat. Hackers around the globe work every hour
The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Protecting Your Network Against Risky SSL Traffic ABSTRACT
Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure
ENTERPRISE MOBILE THREATS. 2014: A Year In Review. I. Introduction. Methodology. Key Highlights ENTERPRISE
ENTERPRISE ENTERPRISE MOBILE THREATS 04: A Year In Review that a single security breach on a mobile device can put an entire organization at risk. Specifically, organizations face three types of security
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Symantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015 CONTENTS At a glance 03-03 Forecasts and trends 03-03 Current situation: 4,900 new Android malware samples every day 04-04 Half of Android malware is
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
INTERNET SECURITY THREAT REPORT
APRIL 2015 VOLUME 20 INTERNET SECURITY THREAT REPORT APPENDICES 2 2015 Internet Security Threat Report Appendices THREAT ACTIVITY TRENDS MALICIOUS CODE TRENDS SPAM & FRAUD ACTIVITY TRENDS VULNERABILITY
Microsoft Security Intelligence Report volume 7 (January through June 2009)
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Protect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users
Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers
Webroot SecureAnywhere Business Endpoint Protection
> SecureAnywhere Business Endpoint Protection Smarter malware prevention that solves the performance, dwell time visibility and management issues of your endpoint security OVERVIEW Confidence has never
KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE
KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE Global threat intelligence for local implementation www.kaspersky.com 2 A CLOUD-BASED THREAT LABORATORY
The Symantec Approach to Defeating Advanced Threats
WHITE PAPER: THE SYMANTEC APPROACH TO DEFEATING ADVANCED........... THREATS............................. The Symantec Approach to Defeating Advanced Threats Who should read this paper For security practioners
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Integral Ad Science Semiannual Review
2012 Integral Ad Science Semiannual Review Key findings from Integral s analysis of the display advertising industry and 2012 Industry Analysis and Key Findings Understanding and analyzing the risk of
Finding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
