Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
1Activity

Table Of Contents

Threat Activity Trends Introduction
Malicious Activity by Source
Web-Based Attack Prevalence
Web-Based Attack Activity
Malicious Websites by Search Term
Data Breaches That Could Lead to Identity Theft
Malicious Shortened URLS on Social Networking Sites
Bot-Infected Computers
Vulnerability Trends Introduction
Total Number of Vulnerabilities
Web Browser Vulnerabilities
Window of Exposure for Web Browsers
Web Browser Plug-in Vulnerabilities
Zero-Day Vulnerabilities
SCADA vulnerabilities
Malicious Code Trends Introduction
Top Malicious Code Families
Prevalence of Malicious Code Features
Top Malicious Code Samples by Region
Threats to Confidential Information
Propagation Mechanisms
Fraud Activity Trends Introduction
Phishing Scams Using Current Events
Underground Economy Servers Goods and Services Available for Sale
Spam Delivered by Botnets
Originating Sources of Botnet Spam
Significant Spam Tactics
Spam by Category
EMEA Introduction
EMEA Threat Activity Trends
EMEA Malicious Activity by Country
EMEA Attack Origin by Country
EMEA Web-based Attack Activity
EMEA Bot-Infected Computers by Country
EMEA Malicious Code Activity Trends
EMEA Prevalence of Malicious Code Features
EMEA Top Malicious Code Samples
EMEA Top New Malicious Code Families
EMEA Propagation Mechanisms
EMEA Fraud Activity Trends
EMEA Phishing URLs by Country and Top Targeted Sectors
EMEA Countries of Botnet Spam Origin
LAM Introduction
LAM Malicious Activity by Country
LAM Attack Origin by Source
LAM Bot-Infected Computers by Country
LAM Top Malicious Code Samples
LAM Countries of Botnet Spam Origin
Enterprise Best Practices
Consumer Best Practices
0 of .
Results for:
No results containing your search query
P. 1
SymantecSecurityThreatReport

SymantecSecurityThreatReport

Ratings: (0)|Views: 1,145|Likes:
Published by pdesantis64

More info:

Published by: pdesantis64 on Sep 01, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/13/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 14 are not shown in this preview.
You're Reading a Free Preview
Pages 18 to 84 are not shown in this preview.
You're Reading a Free Preview
Pages 88 to 101 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->