SYMANTEC INTELLIGENCE REPORT JUNE 2015
|
|
- Esther Marshall
- 8 years ago
- Views:
Transcription
1 SYNTEC INTELLIGENCE REPORT UNE 015
2 une Summary 4 une in Numbers 5 Targeted ttacks & Phishing 5 Top 10 Industries Targeted in Spear-Phishing ttacks 5 Spear-Phishing ttacks by Size of Targeted Organization 6 Phishing Rate 6 Proportion of Traffic Identified as Phishing by Industry Sector 7 Proportion of Traffic Identified as Phishing by Organization Size 8 Vulnerabilities 8 Total Number of Vulnerabilities 8 Zero-ay Vulnerabilities 9 Vulnerabilities isclosed in Industrial Control Systems 10 alware 10 New alware Variants 10 Top 10 ac OSX alware Blocked on OSX Endpoints 11 Ransomware Over Time 11 Crypto-Ransomware Over Time 1 Proportion of Traffic in Which alware Was etected 1 Percent of alware as URL vs. ttachment by onth 13 Proportion of Traffic Identified as alicious by Industry Sector 13 Proportion of Traffic Identified as alicious by Organization Size 14 obile & Social edia 14 ndroid obile alware amilies by onth 14 New ndroid Variants per amily by onth 15 Social edia Welcome to the une edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks. Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 57.6 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec eepsight Intelligence, Symantec anaged Security Services, Norton consumer products, and other third-party data sources. 16 Spam 16 Overall Spam Rate 16 Proportion of Traffic Identified as Spam by Industry Sector 17 Proportion of Traffic Identified as Spam by Organization Size 18 bout Symantec 18 ore Information
3 3 une 015 Summary There is good news this month on the -based front of the threat landscape. ccording to our metrics, the overall spam rate has dropped to 49.7 percent. This is the first time this rate has fallen below 50 percent of for over a decade. The last time Symantec recorded a similar spam rate was clear back in September of 003. Phishing rates and -based malware were also down this month. However, there were 57.6 million new malware variants created in une, up from 44.5 million pieces of malware created in ay and 9. million in pril. This increase in activity lends more evidence to the idea that, with the continued drops in -based malicious activity, attackers are simply moving to other areas of the threat landscape. Ransomware attacks are up in une, with over 477,000 detected during the month. While still below the levels seen at the end of 014, this is the second month in a row ransomware attacks have increased since they reached a 1-month low in pril. Crypto-ransomware is also up in une, reaching the highest levels seen since ecember 014. In other news, after a busy month in ay targeted attacks against the anufacturing industry leveled out in une, dropping from 41 percent to percent. anufacturing still comes out on top in terms of sectors subject to targeted attacks, but activity is now in line with what is being seen in the inance, Insurance, & Real Estate sector and the Services Professional sector, which come in at second and third place. We hope that you enjoy this month s report and feel free to contact us with any comments or feedback. Ben Nahorney, Cyber Security Threat nalyst symantec_intelligence@symantec.com
4 4 une 015 UNE IN NUBERS
5 5 une 015 Targeted ttacks & Phishing anufacturing inance, Insurance, & Real Estate une ay % 41 The anufacturing sector was targeted with the greatest volume of spear-phishing attacks in une, as percent were directed at manufacturing organizations. Services - Professional 5 17 Transportation, Communications, Electric, Gas, & Sanitary Services 6 1 Services - Non Traditional 9 8 Wholesale 8 9 Construction <1 7 Nonclassifiable Establishments Retail ining <1 Top 10 Industries Targeted in Spear-Phishing ttacks Top 10 Industries Targeted in Spear-Phishing ttacks Company Size une ay % 4.5% % 5.1% % 6.6% Large enterprises were the target of 5.1 percent of spear-phishing attacks in une, down from 39. percent in ay. In contrast, 38.1 percent of attacks were directed at organizations with less than 50 employees %.7% % 3.9% % 39.% Spear-Phishing ttacks by Size of Targeted Organization Spear-Phishing ttacks by Size of Targeted Organization
6 6 une 015 S O N 015 The overall phishing rate has decreased slightly this month, where one in,448 s was a phishing attempt IN Phishing Rate Inverse Graph: Smaller Number = Greater Risk Phishing Rate Industry une ay griculture, orestry, & ishing 1 in 1, in Public dministration 1 in, in 1,89.3 Services - Professional 1 in, in 1,76. The griculture, orestry, & ishing sector was once again the most targeted Industry overall for phishing attempts in une, where phishing comprised one in every 1,470 s. This rate was higher than any other industry in either ay or une. Nonclassifiable Establishments 1 in, in 1,834.9 inance, Insurance & Real Estate 1 in, in 1,349.9 Construction 1 in 3, in,14.9 ining 1 in 3, in,30.6 Services - Non Traditional 1 in 3, in,408. Wholesale 1 in 4, in,878. Transportation, Communications, Electric, Gas, & Sanitary Services 1 in 4, in,840. Proportion of Traffic Identified as Phishing Proportion by Industry of Sector Traffic Identified as Phishing by Industry Sector.cloud
7 7 une 015 Company Size une ay in 1, in 1,473.9 Small companies with less than 50 employees were again the most targeted organization size in une in, in 1, in 3, in 1, in 3, in 1, in 3, in, in 3, in,80.8 Proportion of Traffic Identified as Phishing by Organization Size.cloud Proportion of Traffic Identified as Phishing by Organization Size
8 8 une 015 Vulnerabilities The number of vulnerabilities declined in une, down from 579 in ay to 56 vulnerabilities reported during the month S O N Total Number of Vulnerabilities 015 Total Number of Vulnerabilities 3 There was a one zero-day vulnerability discovered in ay, the dobe lash Player CVE Unspecified Heap Buffer Overflow Vulnerability S O Zero-ay Vulnerabilities N 015 Zero-ay Vulnerabilities
9 9 une Vulnerabilities Unique Vendors While two vulnerabilities in industrial control systems were reported by one vendor in pril, none were reported in ay or une Vulnerabilities isclosed in Industrial Control Systems S O N 015 Vulnerabilities isclosed in Industrial Control Systems ethodology In some cases the details of a vulnerability are not publicly disclosed during the same month that it was initially discovered. In these cases, our vulnerability metics are updated to reflect the time that the vulnerability was discovered, as opposed to the month it was disclosed. This can cause fluctuations in the numbers reported for previous months when a new report is released. 0
10 10 une 015 alware There were more than 57.6 million new pieces of malware created in une, up from 44.5 million created in ay. ILLIONS S New alware Variants New alware Variants O N 015 Rank alware Name une Percentage alware Name ay Percentage 1 OSX.RSPlug. 9.5% OSX.RSPlug. 3.9% OSX.RSPlug. continues to be the most commonly seen OS X threat seen on OS X endpoints in une, up 5.6 percentage points from ay. OSX.Keylogger 11.6% OSX.Keylogger 14.0% 3 OSX.Klog. 8.9% OSX.Wirelurker 9.0% 4 OSX.Luaddit 7.8% OSX.Luaddit 8.3% 5 OSX.Wirelurker 7.1% OSX.Klog. 8.0% 6 OSX.lashback.K 5.4% OSX.lashback.K 6.4% 7 OSX.Stealbit.B 4.3% OSX.Netweird 3.9% 8 OSX.reezer 3.% OSX.Sabpab 3.8% 9 OSX.Netweird.9% OSX.Stealbit.B 3.6% 10 OSX.Okaz.5% OSX.lashback 3.0% Top 10 ac OS X alware Blocked on OS X Endpoints Top 10 ac OSX alware Blocked on OSX Endpoints
11 11 une Ransomware attacks were up in une for the second month in a row, where over 477 thousand attacks were detected. THOUSNS S O Ransomware Over Time N 015 Ransomware Over Time Crypto-ransomware was also up duing une, reaching its highest levels since ecember of 014. THOUSNS S O N Crypto-Ransomware Over Time 015 Crypto-Ransomware Over Time
12 1 une S O N 015 The proportion of traffic containing malware decreased again this month, down from one in 07 s in ay to one in 319 s in une. 1 IN Inverse Graph: Smaller Number = Greater Risk Proportion of Traffic in Which alware Was etected Proportion of Traffic in Which alware Was etected The percentage of malware that contains a URL remained low in une, hovering around three percent S O N 015 Percent of alware as URL vs. ttachment by onth Percent of alware as URL vs. ttachment by onth
13 13 une 015 Industry une ay Transportation, Communications, Electric, Gas, & Sanitary Services 1 in in griculture, orestry, & ishing 1 in in The Transportation, Communications, Electric, Gas, & Sanitary Services sector was the most targeted industry in une, with one in 30 s containing malware. Public dministration 1 in in Services - Professional 1 in in Wholesale 1 in in Construction 1 in in 40.9 Services - Non Traditional 1 in in 36.6 ining 1 in in 35.8 inance, Insurance, & Real Estate 1 in in 9.8 Nonclassifiable Establishments 1 in in 55.9 Proportion of Traffic Identified as alicious by Industry Sector.cloud Proportion of Traffic Identified as alicious by Industry Sector Company Size une ay in in in in Organizations with employees were most likely to be targeted by malicious in the month of une, where one in 164 s contained malware in in in 9. 1 in in in in in Proportion of Traffic Identified as alicious by Organization Size.cloud Proportion of Traffic Identified as alicious by Organization Size
14 14 une 015 obile & Social edia In une there was one new mobile malware familiy discovered S O N 015 ndroid obile alware amilies by onth ndroid obile alware amilies by onth 50 There was an average of 40 ndroid malware variants per family in the month of in une S O N 015 New ndroid Variants per amily by onth New ndroid Variants per amily by onth
15 15 une Last 1 onths In the last twelve months, 83 percent of social media threats required end users to propagate them ake offerings comprised 11 percent of social media threats anual Sharing 11 ake Offering 5 Likejacking 1.4 ake pps 0.1 Comment acking anual Sharing These rely on victims to actually do the work of sharing the scam by presenting them with intriguing videos, fake offers or messages that they share with their friends. ake Offering These scams invite social network users to join a fake event or group with incentives such as free gift cards. oining often requires the user to share credentials with the attacker or send a text to a premium rate number. Likejacking Using fake Like buttons, attackers trick users into clicking website buttons that install malware and may post updates on a user s newsfeed, spreading the attack. ake pps Users are invited to subscribe to an application that appears to be integrated for use with a social network, but is not as described and may be used to steal credentials or harvest other personal data. Comment acking This attack is similar to the "Like" jacking where the attacker tricks the user into submitting a comment about a link or site, which will then be posted to his/her wall. Social edia Social edia
16 16 une 015 Spam % 51.5% -1.8% pts -0.6% pts 5.1% The overall spam rate further declined in une, dropping below 50 percent, to 49.7 percent. une ay pril Overall Spam Rate Overall Spam Rate Industry ay pril ining 56.1% 55.4% anufacturing 53.7% 53.7% t over 56 percent, the ining sector had the highest spam rate again during une. The anufacturing sector came in second with 54 percent. Construction 53.3% 54.1% Retail 53.1% 5.1% Services - Non Traditional 53.0% 51.6% Services - Professional 5.6% 5.5% griculture, orestry, & ishing 5.3% 5.3% Public dministration 5.3% 51.4% Wholesale 5.% 5.1% inance, Insurance, & Real Estate 51.9% 51.7% Proportion of Traffic Identified as Spam by Industry Sector Proportion.cloud of Traffic Identified as Spam by Industry Sector
17 17 une 015 Company Size ay pril % 5.7% % 5.6% While all organization sizes had around a 5-53 percent spam rate, organizations with employees had the highest rate at 53. percent % 5.0% % 5.% % 5.% % 5.% Proportion of Traffic Identified as Spam by Organization Size.cloud Proportion of Traffic Identified as Spam by Organization Size
18 18 une 015 bout Symantec Symantec Corporation (NSQ: SYC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings anytime, anywhere. ounded in pril 198, Symantec, a ortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company s more than 0,000 employees reside in more than 50 countries. Ninety-nine percent of ortune 500 companies are Symantec customers. In fiscal 014, it recorded revenues of $6.7 billion. To learn more go to or connect with Symantec at: go.symantec.com/socialmedia. ore Information Symantec Worldwide: ISTR and Symantec Intelligence Resources: Symantec Security Response: Norton Threat Explorer: Norton Cybercrime Index:
19 Symantec Corporation World Headquarters 350 Ellis Street ountain View, C US +1 (650) (800) or specific country offices and contact numbers, please visit our website. or product information in the U.S., call toll-free 1 (800) Copyright 015 Symantec Corporation. ll rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners 04/15 1,
SYMANTEC INTELLIGENCE REPORT MAY 2015
SYNTEC INTELLIGENCE REPORT Y 015 ay 015 3 Summary 4 ay in Numbers 5 Targeted ttacks & Phishing 5 verage Number of Spear-Phishing ttacks per Day 5 ttachments Used in Spear-Phishing ttacks 6 Top 10 Industries
More informationSYMANTEC INTELLIGENCE REPORT JANUARY 2015
SYTEC ITELLIGECE REPRT URY 2015 p. 2 Symantec Intelligence Report :: URY 2015 CTETS 3 Summary 4 TRGETE TTCKS + T BRECHES 5 Targeted ttacks 5 ttachments Used in Spear-Phishing Emails 5 Spear-Phishing ttacks
More informationSYMANTEC INTELLIGENCE REPORT NOVEMBER 2015
SYNTEC INTELLIGENCE REPORT NOVEBER 2015 2 November 2015 3 Summary 4 From the Security Response Blog 4 Terror-lert Spam Targets the iddle East, Canada to Spread alware 5 November in Numbers 6 Targeted ttacks
More informationSYMANTEC INTELLIGENCE REPORT NOVEMBER 2013
SYMANTEC INTELLIGENCE REPORT NOVEMBER 2013 p. 2 CONTENTS CONTENTS 3 Executive Summary 4 BIG NUMBERS 7 TARGETED ATTACKS 8 Targeted Attacks in 2013 8 Targeted Attacks per Day 8 First Attacks Logged by Month
More informationSYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
More informationSymantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
More informationFinding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
More informationSymantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationCyber Security Services: Data Loss Prevention Monitoring Overview
WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in
More informationSymantec RuleSpace Data Sheet
OEM URL Categorization Database and Real-time Web Categorization Technology Data Sheet: Security Intelligence OVERVIEW A major challenge today is ensuring a safe web environment for users and companies
More informationSymantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
More informationHost-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
More informationPartner Technical Support Benefits Quick Guide
PARTNER BRIEF: TECHNICAL SUPPORT BENEFITS........................................ Symantec Secure One Partner Technical Support Benefits Who should read this paper Symantec Partners supporting end user
More informationPreparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
More informationSymantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
More informationThe Symantec Approach to Defeating Advanced Threats
WHITE PAPER: THE SYMANTEC APPROACH TO DEFEATING ADVANCED........... THREATS............................. The Symantec Approach to Defeating Advanced Threats Who should read this paper For security practioners
More informationModern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
More informationAchieving Business Agility Through An Agile Data Center
Achieving Business Agility Through An Agile Data Center Overview: Enable the Agile Data Center Business Agility Is Your End Goal In today s world, customers expect or even demand instant gratification
More informationSymantec Control Compliance Suite Standards Manager
Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance
More informationBetter Together: Microsoft Office 365 & Symantec Office 365
#SymVisionEmea #SymVisionEmea Better Together: Microsoft Office 365 & Symantec Office 365 & Symantec Mike Smart Product Marketing Information SECURITY David Moseley Product Marketing Information MANAGEMENT
More informationTrust the Innovator to Simplify Cloud Security
Trust the Innovator to Simplify Cloud Security Contents MailGuard Pty Ltd Page 1 of 7 2 Let s get real for a moment. Your antivirus software isn t stopping fastbreak phishing and other spam attacks like
More informationSymantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,
More informationHow to Unlock Agility by Backing up to, from, and in the Cloud
WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper
More informationStreamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
More informationBig Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data
More informationINFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
More informationSymantec Intelligence Report: February 2013
Symantec Intelligence Symantec Intelligence Report: February 2013 Welcome to the February edition of the Symantec Intelligence report, which provides the latest analysis of cyber security threats, trends,
More informationBalancing Cloud-Based Email Benefits With Security. White Paper
Balancing Cloud-Based Email Benefits With Security White Paper Balancing Cloud-Based Email Benefits With Security Balancing Cloud-Based Email Benefits With Security CONTENTS Trouble Spots in Cloud Email
More informationCountering Insider Threats Jeremy Ho
Countering Insider Threats Jeremy Ho Strategic Sales Group (ASEAN) 1 CONFIDENTIAL Key Challenges Impacting Organization Today REGULATORY COMPLIANCE Rising Data Volumes Changing Requirements Prioritization
More informationSYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5
SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 Simplify continuous security monitoring for physical and virtual servers as well as private and public clouds. Data Sheet: Security Management Symantec
More informationSYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5
SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 Advanced protection and hardening for advanced threats. Data Sheet: Security Management Symantec Data Center Security: Server Advanced 6.5 Solution Overviewview
More informationSecuring Mobile App Data - Comparing Containers and App Wrappers
WHITE PAPER: SECURING MOBILE APP DATA - COMPARING CONTAINERS............ AND..... APP... WRAPPERS.................... Securing Mobile App Data - Comparing Containers and App Wrappers Who should read this
More informationQUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
More informationisheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
More informationSymantec Managed Security Services The Power To Protect
Symantec Managed Security Services The Power To Protect Peter Sparkes Senior Director, Cyber Security Services Asia Pacific & Japan Symantec Managed Security Services Cyber Security Services 1 Expanding
More informationWHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks
WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?
More informationSymantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
More informationDelivering Performance and Value through Multiple Deduplication Pools
SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering Performance and Value through Multiple Deduplication Pools Who should read this paper - Directors of IT and IT Managers
More informationIs cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary
Is cyber security now too hard for enterprises? Executive Summary Sponsors The creation and distribution of this study was supported by CGI, cybx and Fujitsu/Symantec. Premium sponsors: Gold sponsor: 2
More informationHow Extended Validation SSL Brings Confidence to Online Sales and Transactions
WHITE PAPER: HOW EXTENDED VALIDATION SSL BRINGS CONFIDENCE TO ONLINE SALES AND TRANSACTIONS White Paper How Extended Validation SSL Brings Confidence to Online Sales and Transactions How Extended Validation
More informationCSUF Tech Day 2015. Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu
CSUF Tech Day 2015 Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu Agenda Introduction Large scale data breaches: 2014 and beyond Email based attacks:
More informationAlmost 400 million people 1 fall victim to cybercrime every year.
400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked
More informationSymantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
More informationCybercrime Security Risks and Challenges Facing Business
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationOverview. Introduction. Conclusions WINE TRIAGE. Zero day analysis. Symantec Research Labs (SRL)
1 Overview Introduction WINE TRIAGE Zero day analysis Conclusions 2 5 locations: USA: Mountain View (CA), Culver City (CA), Herndon (VA) Europe: Dublin (IE), Sophia Antipolis(FR).. 4 thematic domains:
More informationSecuring Endpoints without a Security Expert
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series
More information5 Must-Haves for an Enterprise Mobility Management (EMM) Solution
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationEndpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
More informationENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
More informationWeb Protection for Your Business, Customers and Data
WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision
More informationMANAGED SECURITY SERVICES
MANAGED SECURITY SERVICES True Managed Security Services give you the freedom and confidence to focus on your business, knowing your information assets are always fully protected and available. Finding
More informationSymantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses
A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed
More information2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
More informationSecuring Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely
Securing Your Enterprise in the Cloud IT executives must be ready to move to the cloud safely The technology pendulum is always swinging. And chief information security officers must be prepared to swing
More informationBackup Exec 2014: Protecting Microsoft SharePoint
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers
More informationSymantec Server Management Suite 7.6 powered by Altiris technology
Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management
More informationReducing the Cost and Complexity of Web Vulnerability Management
WHITE PAPER: REDUCING THE COST AND COMPLEXITY OF WEB..... VULNERABILITY.............. MANAGEMENT..................... Reducing the Cost and Complexity of Web Vulnerability Management Who should read this
More informationSymantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
More informationSymantec Enterprise Vault and Symantec Enterprise Vault.cloud
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened
More informationSR B17. The Threat Landscape Continues to Change: How are You Keeping Pace? Dean Turner
SR B17 The Threat Landscape Continues to Change: How are You Keeping Pace? Dean Turner Director - Engineering, Global Intelligence Network Symantec Intelligence Group Agenda 1 2 3 5 Symantec Intelligence
More informationBackup Exec 2014: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationUnited Kingdom Internet Security Threat Profile
Internet Security Threat Profile Worldwide Ranking.%.%.%.%.%.%.%.%.%.%.%.% Overall Average Spam Zombies Malicious Code Phishing Hosts Bots Network Copyright Symantec Corporation. All rights reserved. Symantec,
More informationConfidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
WHITE PAPER: VIRTUALIZE BUSINESS-CRITICAL APPLICATIONS.............. WITH..... CONFIDENCE..................... Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
More informationPrimer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS
A Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS Even with today s breakthroughs in online communication, email is still one of the main ways that most
More informationClosing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
More informationProduct Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd
Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,
More informationBackup Exec 15: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationTop 5 Reasons to Choose User-Friendly Strong Authentication
SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationCloud Services Prevent Zero-day and Targeted Attacks Tom De Belie Security Engineer. [Restricted] ONLY for designated groups and individuals
Cloud Services Prevent Zero-day and Targeted Attacks Tom De Belie Security Engineer Facts 2 3 WOULD YOU OPEN THIS ATTACHMENT? 4 TARGETED ATTACKS BEGIN WITH ZERO-DAY EXPLOITS 5 Check Point Multi-Layered
More informationSecuring the Mobile App Market
WHITE PAPER: SECURING THE MOBILE APP MARKET White Paper Securing the Mobile App Market How Code Signing Can Bolster Security for Mobile Applications Securing the Mobile App Market How Code Signing Can
More informationYou ll learn about our roadmap across the Symantec email and gateway security offerings.
#SymVisionEmea In this session you will hear how Symantec continues to focus our comprehensive security expertise, global intelligence and portfolio on giving organizations proactive, targeted attack protection
More informationSecuring Office 365 with Symantec
January, 2016 Solution Overview: Enterprise Security Adoption of Microsoft Office 365, Google Apps, and other cloud-based productivity solutions is growing. Microsoft in its Ignite 2015 session claimed
More informationMicrosoft Office 365 Migrations with Symantec Enterprise Vault.cloud
WHITE PAPER: MICROSOFT OFFICE 365 MIGRATIONS WITH SYMANTEC........... ENTERPRISE........... VAULT.CLOUD.................. Microsoft Office 365 Migrations with Symantec Enterprise Vault.cloud Who should
More informationSymantec Client Management Suite 7.5 powered by Altiris
Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve
More informationAsset Discovery with Symantec Control Compliance Suite
WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations
More informationDATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able
More informationThe webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
More informationSymantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
More informationThe Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
More informationCKAHU Symposium Cyber-Security
CKAHU Symposium Cyber-Security Scott Logan Technical Director of Security Position: Technical Director of Security Employment: NetGain Technologies (6+ years) NetGain is a Regional partner with 7 locations
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationwhite paper Malware Security and the Bottom Line
Malware Security Report: Protecting Your BusineSS, Customers, and the Bottom Line Contents 1 Malware is crawling onto web sites everywhere 1 What is Malware? 2 The anatomy of Malware attacks 3 The Malware
More informationSecuring OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
More informationBackup Exec 15: Protecting Microsoft Hyper-V
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are
More informationBest Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
More informationSymantec Enterprise Vault for Microsoft Exchange Server
Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy
More informationProtecting Point-of-Sale Environments Against Multi-Stage Attacks
SOLUTION BRIEF: PROTECTING POS DEVICES & BROADER ENVIRONMENT........................................ Protecting Point-of-Sale Environments Against Multi-Stage Attacks Who should read this paper Point-of-Sale
More informationRLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
More informationBreakout Session B: Cyber Security and Cybercrime Trends in Africa
Breakout Session B: Cyber Security and Cybercrime Trends in Africa Global Forum for Cyber Expertise Awareness Initiative The African Union, Symantec, and the U.S. Department of State committed to develop
More informationIBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
More informationSecuring Your Software for the Mobile Application Market
WHITE PAPER: SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET White Paper Securing Your Software for the Mobile Application Market The Latest Code Signing Technology Securing Your Software for
More informationMcAfee Endpoint Protection for SMB. You grow your business. We keep it secure.
McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,
More informationTHE THREE Es OF MODERN EMAIL SECURITY FOR PHISHING
THE THREE Es OF MODERN EMAIL SECURITY FOR PHISHING AN ACCUVANT VIEWPOINT By James Robinson, Director, Office of the CISO Attempting to keep up with the ever-changing world of cyber security threats can
More informationNorton Small Business. Getting Started Guide
Norton Small Business Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright 2015
More informationSPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
More informationNorton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.
Norton 360 Our ultimate protection, now even more so. Introducing the new Norton 360. Our ultimate Internet and antivirus protection for all you do online Provides proactive protection, so you can do what
More informationTRITON APX. Websense TRITON APX
TRITON APX Unified protection and intelligence against Advanced Threats and data theft Your organization is faced with an increasing number of Advanced Threats that lead to data theft, denial of service
More information