Threat Stats

June 2013
SC Magazine: For IT Security Professionals (15476693);Jun2013, Vol. 24 Issue 6, p10
Statistics are presented related to the threat on online security which includes the April 2013 malware vertical encounter rate for several industries, the top April 2013 breaches in data loss, and the top five attacks used by U.S. hackers.


Related Articles

  • Botnets vs. botnets. Rapoza, Jim // eWeek;5/5/2008, Vol. 25 Issue 14, p53 

    The author reflects on the implication of using botnets in counteracting malicious hackers in the U.S. The author believes that although there are more proactive means of protecting data from malware attacks, such as the use of tarpits and honeypots, such schemes could be exploited by attackers...

  • Malware Predicted to Be No. 1 2010 Security Threat.  // Bank Security Report;Feb2010, Vol. 39 Issue 2, p7 

    The article reports that information security services provider Perimeter E-Security Inc. has named Malware as the top computer security threat for 2010. It notes that Malware allows hackers to monitor personal computer activity keystroke by keystroke from the installed systems of vulnerable...

  • Beware of rogue reviews for rogueware.  // Australian NetGuide;Jun2009, Issue 133, p19 

    The article offers updates related to malicious software or malware. Developers of Rogueware have developed Web sites designed to promote their fake product, and attempted to manipulate reviews of their products in their favor on at some popular search engines. Symantec Internet Security...

  • Top City firm fights off cyber attack. Ames, Jonathan // Lawyer (Online Edition);10/28/2013, p9 

    The article reports that a law firm in London, England, was successful in preventing a breach of client confidentiality by computer hackers. The legal profession is being seen as highly vulnerable to cyber attacks. According to Tom Burton, business director at BAE Systems Detica and a cyber...

  • Don't Be Dragooned Into the Botnet Army. Larkin, Erik // PCWorld;Dec2008, Vol. 26 Issue 12, p47 

    The article focuses on the threats of botnets proliferating malware in the Internet. The volunteer white hats of Shadowserver.org, a nonprofit organization dedicated to battling the bot scourge, maintain a count of how many bot-infected personal computers they see with their distributed Interact...

  • Time to Flameproof your business. Ashford, Warwick // Computer Weekly;6/5/2012, p4 

    The article discusses the significance of the Flame cyber threat and how organizations can integrate computer security measures into business processes. Topics include comparisons between Flame and the Stuxnet cyber weapon attack toolkits, the inadequacy of traditional security technologies and...

  • Remove rootkits. Thompson, Jon // APC (Bauer Media Group);May2010, Vol. 30 Issue 5, p96 

    The article offers information on how users can keep their computer's operating system safe from the malware program called rootkit. It cites that a rootkit is a program that allow hackers to come and go, unhindered by computer defenses as no firewall can stop it and no antivirus program, will...

  • Security Helpdesk.  // Web User;10/22/2014, Issue 356, p12 

    The article presents several questions and answers related to computer security including one on spread of malware from computer to cellphone, another related to whether hackers will target digital-payment system Apple Pay and other on replacement of Desktop security software with cloud-based tool.

  • Browsers: The new threat landscape. Garcia, Andrew // eWeek;8/4/2008, Vol. 25 Issue 23, p42 

    The article reports on the strategies that need to be developed by information technology (IT) pesonnel and computer security companies to address computer and data security risks brought by malicious software (malware) in the U.S. It reveals that the development of domains and Web sites that...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics