15 Sep. 2011
Cyberdefence, Key trends and Statistics
Number of entries: 13
- 1-12
- 13-13
-
Download high resolution image
In 2011 there were 403 million unique variants of malware, compared to 286 million in 2010. Source: Symantec ISTR, April 2012 (Photo by NCIRC NATO)
-
Download high resolution image
Nearly 5,000 new vulnerabilities were discovered in 2011. Source: Symantec ISTR, April 2012 (Photo by NCIRC NATO)
-
Download high resolution image
In 2011 mobile malware presented a tangible threat to businesses and consumers for the first time. The number of vulnerabilities for mobile devices is rising, with malware authors reinventing existing malware and creating mobile-specific malware. Source: Symantec ISTR, April 2012.
-
Download high resolution image
As tablets and smartphones continue to gain popularity, increasing amounts of sensitive information will be available on these devices. Malware designed for data collection, the sending of content, and user tracking will also become a greater problem. Source: Symantec ISTR, April 2012.
-
Download high resolution image
More than 232.4 million identities were exposed and subject to potential theft during 2011. Hacking incidents posed the greatest threat, exposing 187 million identities. Source: Symantec ISTR, April 2012 (Photo by Andres Rueda)
-
Download high resolution image
Workers are bringing their smartphones and tablets into the corporate environment faster than many organizations are able to secure and manage them. Source: Symantec ISTR, April 2012
-
Download high resolution image
According to a recent Symantec survey, 50% of lost phones will not be returned. For unprotected phones, 96% of lost phones will have the data on that phone breached. Source: Symantec ISTR, April 2012.
-
Download high resolution image
The most frequent cause of data breaches that could lead to stolen identities is theft or loss of computers, smartphones, USB keys, and backup devices. Theft or loss related breaches exposed 18.5 million identities. Source: Symantec ISTR, April 2012.
-
Download high resolution image
Macs are not immune from cyber threats. A number of new threats emerged for Mac OS X in 2011, including trojans like MacDefender, a fake anti-virus programme. It looks convincing and it installs without requiring admin permission first. Source: Symantec ISTR, April 2012 (Photo by Sharyn Morrow)
-
Download high resolution image
In 2010, Stuxnet grabbed headlines around the world. It showed that targeted attacks could be used to cause physical damage in the real world, making the spectre of cyber-sabotage a reality. In October 2011, Stuxnets successor, Duqu, came to light. It uses a zero-day exploit to install spyware that records keystrokes and other system information. Source: Symantec ISTR, April 2012.
-
Download high resolution image
At 54% combined, the government/public sector, manufacturing and finance were the most targeted industries when it came to email cyber attacks in 2011. Source: Symantec
-
Download high resolution image
QR codes, a way for people to convert a barcode into a Web site link using a camera app on their smartphone, have become increasingly popular over the last couple of years. Its fast, convenient and dangerous. Malware authors have used it to install infected software on Android phones. Source: Symantec ISTR, April 2012.
Last updated: 15-Sep-2011 10:38