internet_security_threat_report_xiii_04-2008.en-us

internet_security_threat_report_xiii_04-2008.en-us -...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: SYMANTEC ENTERPRISE SECURITY Symantec Global Internet Security Threat Report Trends for July–December 07 Volume XIII, Published April 2008 Dean Turner Executive Editor Director, Global Intelligence Network Symantec Security Response Marc Fossi Manager, Development Symantec Security Response Eric Johnson Editor Symantec Security Response Trevor Mack Associate Editor Symantec Security Response Joseph Blackbird Threat Analyst Symantec Security Response Stephen Entwisle Threat Analyst Symantec Security Response Mo King Low Threat Analyst Symantec Security Response David McKinney Threat Analyst Symantec Security Response Candid Wueest Analyst Symantec Security Response Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Attack Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 Vulnerability Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Malicious Code Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Phishing Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Spam Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Appendix A—Symantec Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Appendix B—Attack Trends Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Appendix C—Vulnerability Trends Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Appendix D—Malicious Code Trends Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Appendix E—Phishing and Spam Trends Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Contents Volume XIII, Published April 2008 Symantec Global Internet Security Threat Report Symantec Global Internet Security Threat Report Introduction The Symantec Global Internet Security Threat Report provides a six-month update of worldwide Internet threat activity. It includes analysis of network-based attacks, a review of known vulnerabilities, and threat activity....
View Full Document

This note was uploaded on 12/14/2011 for the course CPE 549 taught by Professor Sparks during the Fall '11 term at University of Alabama - Huntsville.

Page1 / 99

internet_security_threat_report_xiii_04-2008.en-us -...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online