• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Symantec Report Reveals 81 Percent Increase in Malicious Attacks in 2011

Joined
Dec 6, 2011
Messages
4,784 (1.00/day)
Location
Still on the East Side
Symantec Corp. today announced the findings of its Internet Security Threat Report, Volume 17, which shows that while the number of vulnerabilities decreased by 20 percent, the number of malicious attacks continued to skyrocket by 81 percent. In addition, the report highlights that advanced targeted attacks are spreading to organizations of all sizes and variety of personnel, data breaches are increasing, and that attackers are focusing on mobile threats.

Malicious Attacks Continue to Grow Rapidly

Symantec blocked more than 5.5 billion malicious attacks in 2011, an increase of 81 percent over the previous year. In addition, the number of unique malware variants increased to 403 million and the number of Web attacks blocked per day increased by 36 percent.



At the same time, spam levels fell considerably and new vulnerabilities discovered decreased by 20 percent. These statistics, compared to the continued growth in malware, paint an interesting picture. Attackers have embraced easy to use attack toolkits to efficiently leverage existing vulnerabilities. Moving beyond spam, cyber criminals are then turning to social networks to launch their attacks. The very nature of these networks makes users incorrectly assume they are not at risk and attackers are using these sites to target new victims. Due to social engineering techniques and the viral nature of social networks, it's much easier for threats to spread from one person to the next.

Advanced Targeted Attacks Spread to Organizations of All Sizes

Targeted attacks are growing, with the number of daily targeted attacks increasing from 77 per day to 82 per day by the end of 2011. Targeted attacks use social engineering and customized malware to gain unauthorized access to sensitive information. These advanced attacks have traditionally focused on public sector and government; however, in 2011, targeted attacks diversified.

Targeted attacks are no longer limited to large organizations. More than 50 percent of such attacks target organizations with fewer than 2,500 employees, and almost 18 percent target companies with fewer than 250 employees. These organizations may be targeted because they are in the supply chain or partner ecosystem of a larger company and because they are less well-defended. Furthermore, 58 percent of attacks target non-execs, employees in roles such as human resources, public relations, and sales. Individuals in these jobs may not have direct access to information, but they can serve as a direct link into the company. They are also easy for attackers to identify online and are used to getting proactive inquiries and attachments from unknown sources.

Rise of Data Breaches, Lost Devices Concern for the Future

Approximately 1.1 million identities were stolen per data breach on average in 2011, a dramatic increase over the amount seen in any other year. Hacking incidents posed the greatest threat, exposing 187 million identities in 2011-the greatest number for any type of breach last year. However, the most frequent cause of data breaches that could facilitate identity theft was theft or loss of a computer or other medium on which data is stored or transmitted, such as a smartphone, USB key or a backup device. These theft-or loss-related breaches exposed 18.5 million identities.

As tablets and smartphones continue to outsell PCs, more sensitive information will be available on mobile devices. Workers are bringing their smartphones and tablets into the corporate environment faster than many organizations are able to secure and manage them. This may lead to an increase in data breaches as lost mobile devices present risks to information if not properly protected. Recent research by Symantec shows that 50 percent of lost phones will not be returned and 96 percent (including those returned) will experience a data breach.

Mobile Threats Expose Businesses and Consumers

Mobile vulnerabilities increased by 93 percent in 2011. At the same time, there was a rise in threats targeting the Android operating system. With the number of vulnerabilities in the mobile space rising and malware authors not only reinventing existing malware for mobile devices, but creating mobile-specific malware geared to the unique mobile opportunities, 2011 was the first year that mobile malware presented a tangible threat to businesses and consumers. These threats are designed for activities including data collection, the sending of content, and user tracking.

View at TechPowerUp Main Site
 

FreedomEclipse

~Technological Technocrat~
Joined
Apr 20, 2007
Messages
24,173 (3.74/day)
Location
London,UK
System Name WorkInProgress
Processor AMD 7800X3D
Motherboard MSI X670E GAMING PLUS
Cooling Thermalright AM5 Contact Frame + Phantom Spirit 120SE
Memory 2x32GB G.Skill Trident Z5 NEO DDR5 6000 CL32-38-38-96
Video Card(s) Asus Dual Radeon™ RX 6700 XT OC Edition
Storage WD SN770 1TB (Boot)|1x WD SN850X 8TB (Gaming) | 2x2TB WD SN770| 2x2TB+2x4TB Crucial BX500
Display(s) LG GP850-B
Case Corsair 760T (White) {1xCorsair ML120 Pro|5xML140 Pro}
Audio Device(s) Yamaha RX-V573|Speakers: JBL Control One|Auna 300-CN|Wharfedale Diamond SW150
Power Supply Seasonic Focus GX-850 80+ GOLD
Mouse Logitech G502 X
Keyboard Duckyshine Dead LED(s) III
Software Windows 11 Home
Benchmark Scores ლ(ಠ益ಠ)ლ
Its always the case..... holes in security get patched up, Hackers find another exploit or hack to get inside your machines. I dont see it stopping until Firewalls become more Ai bound, more reactive and 'adapt' to whats hacking them in real time and even hack the hacker back

right now Firewalls are other security software are merely just 'engine's' but all they can do is defend against the bad stuff so long as the data in its databases.
 
Joined
Mar 26, 2010
Messages
9,910 (1.84/day)
Location
Jakarta, Indonesia
System Name micropage7
Processor Intel Xeon X3470
Motherboard Gigabyte Technology Co. Ltd. P55A-UD3R (Socket 1156)
Cooling Enermax ETS-T40F
Memory Samsung 8.00GB Dual-Channel DDR3
Video Card(s) NVIDIA Quadro FX 1800
Storage V-GEN03AS18EU120GB, Seagate 2 x 1TB and Seagate 4TB
Display(s) Samsung 21 inch LCD Wide Screen
Case Icute Super 18
Audio Device(s) Auzentech X-Fi Forte
Power Supply Silverstone 600 Watt
Mouse Logitech G502
Keyboard Sades Excalibur + Taihao keycaps
Software Win 7 64-bit
Benchmark Scores Classified
Its always the case..... holes in security get patched up, Hackers find another exploit or hack to get inside your machines. I dont see it stopping until Firewalls become more Ai bound, more reactive and 'adapt' to whats hacking them in real time and even hack the hacker back

right now Firewalls are other security software are merely just 'engine's' but all they can do is defend against the bad stuff so long as the data in its databases.

so we need clever, i mean more clever AV and firewall?
and there it comes the skynet, where engine could think and decide better than human :D
 
Joined
Nov 4, 2005
Messages
12,013 (1.72/day)
System Name Compy 386
Processor 7800X3D
Motherboard Asus
Cooling Air for now.....
Memory 64 GB DDR5 6400Mhz
Video Card(s) 7900XTX 310 Merc
Storage Samsung 990 2TB, 2 SP 2TB SSDs, 24TB Enterprise drives
Display(s) 55" Samsung 4K HDR
Audio Device(s) ATI HDMI
Mouse Logitech MX518
Keyboard Razer
Software A lot.
Benchmark Scores Its fast. Enough.
Its always the case..... holes in security get patched up, Hackers find another exploit or hack to get inside your machines. I dont see it stopping until Firewalls become more Ai bound, more reactive and 'adapt' to whats hacking them in real time and even hack the hacker back

right now Firewalls are other security software are merely just 'engine's' but all they can do is defend against the bad stuff so long as the data in its databases.

Um, only if you are using a software firewall. Pure hardware with explicit rules means all uninitiated connections are ignored or refused. With the next step of controlled connectivity in domains by a host wlthat checks health and traffic it also prevents infections from spreading internally.
 
Joined
Jun 13, 2009
Messages
1,539 (0.27/day)
Location
Canada/Québec/Montreal
System Name Main PC
Processor PII 925 x4 @3.724GHz (266x14) 1.525v NB 2660 1.425v
Motherboard Gigabyte AM3 GA-890XA-UD3 (790x+SB850)
Cooling Scythe Mugen 2 rev.B
Memory Hyperx 8GB (2x4) 1600@1418 8-7-7-20-27-1t
Video Card(s) GTX 680
Storage 256GB SSD / 2TB HDD
Display(s) LCD Samsung 24" 16:9
Case Cooler Master HAF 912
Audio Device(s) On-Board HD
Power Supply CM 750w GX |3.3v@25a|5v@25a|12v@60a
Software Kubuntu dual boot /Windows 7 Ultimate 64bit
Benchmark Scores later...
All lies... it's Norton , it's a trap...(publicity stunt) don't buy their software :shadedshu

It's ok! no need to get up , i know my way out... :p :rolleyes:
 

treehouse

New Member
Joined
Apr 9, 2011
Messages
199 (0.04/day)
System Name hazel
Processor phenom II 555 BE unlocked to 4 cores at 3.6ghz
Motherboard asus m4a89gtdpro
Cooling antec kuhler
Memory 8gb corsair
Video Card(s) 2 x 6950 crossfire
Storage ocz ssd 60gb
Display(s) LG 24 inch 1080p
Case nzxt phantom
Audio Device(s) onboard
Power Supply BeQuiet 750w
see my sig for reactive measures :)
 

fullinfusion

Vanguard Beta Tester
Joined
Jan 11, 2008
Messages
9,909 (1.60/day)
My new OS install was good but had a few viruses on the 2nd disk.

The free online ESET - NOD32 freaking rocks....:toast:
 
Joined
Oct 29, 2009
Messages
2,670 (0.48/day)
System Name Old Gateway
Processor i5 4440 3.1ghz
Motherboard Gateway
Cooling Eh it doesn't thermal throttle
Memory 2x 8GB JEDEC 1600mhz DDR3
Video Card(s) RX 560D 4GB
Storage 240gb 2.5 SSD 3TB 7.2k Seagate
Display(s) Dell @ 1280*1024 75hz
Case Gateway
Audio Device(s) Gateway Diamond Audio EMC2.0-USB 5375U ($15 a long ass time ago)
Power Supply 380w oem
Mouse Purple Walmart special, 1600dpi. Black desk mat
Keyboard SteelSeries Apex 100
VR HMD Lmao
Software Windows 10
Benchmark Scores It can run Crysis (Original), Doom 2016, and Halo MCC

treehouse

New Member
Joined
Apr 9, 2011
Messages
199 (0.04/day)
System Name hazel
Processor phenom II 555 BE unlocked to 4 cores at 3.6ghz
Motherboard asus m4a89gtdpro
Cooling antec kuhler
Memory 8gb corsair
Video Card(s) 2 x 6950 crossfire
Storage ocz ssd 60gb
Display(s) LG 24 inch 1080p
Case nzxt phantom
Audio Device(s) onboard
Power Supply BeQuiet 750w
Last edited:
Top