Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
B-whitepaper Internet Security Threat Report Xiii 04-2008.en-us23970-0

B-whitepaper Internet Security Threat Report Xiii 04-2008.en-us23970-0

Ratings: (0)|Views: 6 |Likes:
Published by ezra242

More info:

Published by: ezra242 on Apr 23, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/11/2014

pdf

text

original

SyMAnteCent
erpriSeSeCU
rity
Symantec Global Internet
Security Threat Report
t\ue004\ue000\ue002ds fo\ue004 Jul\ue006\u2013D\ue000c\ue000mb\ue000\ue004 07
Volum\ue000 Xiii, publ\ue001sh\ue000d A\ue003\ue004\ue001l 2008
Dean Turner

ex\ue000cu\ue005\ue001v\ue000 ed\ue001\ue005o\ue004
D\ue001\ue004\ue000c\ue005o\ue004, Global i\ue002\ue005\ue000ll\ue001g\ue000\ue002c\ue000 n\ue000\ue005wo\ue004k
S\ue006ma\ue002\ue005\ue000c S\ue000cu\ue004\ue001\ue005\ue006 r\ue000s\ue003o\ue002s\ue000

Marc Fossi
Ma\ue002ag\ue000\ue004, D\ue000v\ue000lo\ue003m\ue000\ue002\ue005
S\ue006ma\ue002\ue005\ue000c S\ue000cu\ue004\ue001\ue005\ue006 r\ue000s\ue003o\ue002s\ue000
Eric Johnson
ed\ue001\ue005o\ue004
S\ue006ma\ue002\ue005\ue000c S\ue000cu\ue004\ue001\ue005\ue006 r\ue000s\ue003o\ue002s\ue000
Trevor Mack
Assoc\ue001a\ue005\ue000 ed\ue001\ue005o\ue004
S\ue006ma\ue002\ue005\ue000c S\ue000cu\ue004\ue001\ue005\ue006 r\ue000s\ue003o\ue002s\ue000
Joseph Blackbird
th\ue004\ue000a\ue005 A\ue002al\ue006s\ue005
S\ue006ma\ue002\ue005\ue000c S\ue000cu\ue004\ue001\ue005\ue006 r\ue000s\ue003o\ue002s\ue000
Stephen Entwisle
th\ue004\ue000a\ue005 A\ue002al\ue006s\ue005
S\ue006ma\ue002\ue005\ue000c S\ue000cu\ue004\ue001\ue005\ue006 r\ue000s\ue003o\ue002s\ue000
Mo King Low
th\ue004\ue000a\ue005 A\ue002al\ue006s\ue005
S\ue006ma\ue002\ue005\ue000c S\ue000cu\ue004\ue001\ue005\ue006 r\ue000s\ue003o\ue002s\ue000
David McKinney
th\ue004\ue000a\ue005 A\ue002al\ue006s\ue005
S\ue006ma\ue002\ue005\ue000c S\ue000cu\ue004\ue001\ue005\ue006 r\ue000s\ue003o\ue002s\ue000
Candid Wueest
A\ue002al\ue006s\ue005
S\ue006ma\ue002\ue005\ue000c S\ue000cu\ue004\ue001\ue005\ue006 r\ue000s\ue003o\ue002s\ue000

Introduction\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue0004 Highlights\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue000\ue0005 Attack Trends..............................................................................9 Vulnerability Trends......................................................................24 Malicious Code Trends....................................................................45 Phishing Trends..........................................................................64 Spam Trends. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75 Appendix A\u2014Symantec Best Practices......................................................79 Appendix B\u2014Attack Trends Methodology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81 Appendix C\u2014Vulnerability Trends Methodology..............................................83 Appendix D\u2014Malicious Code Trends Methodology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93 Appendix E\u2014Phishing and Spam Trends Methodology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

Contents
Volum\ue000 Xiii, publ\ue001sh\ue000d A\ue003\ue004\ue001l 2008
Symantec Global Internet Security
Threat Report

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->