Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Cyber Criminals Launching Higher Numbers of Sophisticated Attacks

  • 07 March, 2006 16:34

<p>Media Advisory</p>
<p>Symantec Internet Security Threat Report - the industry's "State of the Internet" analysis, confirms shift from hacking for fame to hacking for fortune</p>
<p>Online security threats are moving away from widespread, chaotic nuisances to smaller, more targeted attacks motivated by financial gain, according to findings unveiled today by Symantec in its latest Internet Security Threat Report[1].</p>
<p>The semi-annual global report - the most comprehensive gauge of the Internet landscape, detailed the current threat landscape; which is dominated by emerging threats such as modular malicious code[2], cybercrime[3] (through an increased use of crimeware[4]) and web browser vulnerabilities[5] and provided information for consumers on the type of Internet nasties lurking behind the screen.</p>
<p>Rob Pregnell, Senior Product Marketing Manager, Asia Pacific said of the findings in the Report: "Cybercrime represents today's greatest threat. Whereas traditional attack activity has been motivated by curiosity and a desire to show off technical virtuosity, many current threats are motivated by profit. They often attempt to perpetrate criminal acts, such as identity theft, extortion, and fraud for financial gain.</p>
<p>"What we expect to see in the near future is more diversification and sophistication of the threats used for cybercrime, as well as an increase in the theft of confidential, financial and personal information for financial gain."</p>
<p>The Symantec Internet Security Threat Report Vol 9's key findings include (a key findings document is available for further explanation):</p>
<p>- Of malicious code targeting instant messaging services, worms made up 91 percent, compared to 83 percent in the first half of 2005.
One in 119 emails was determined to be phishing attempts, up from one in 125.</p>
<p>- Spam made up 50 percent of all monitored email traffic - a decrease over the past two reporting periods.</p>
<p>- Microsoft® Internet Explorer had the highest number of new vulnerabilities with 24.</p>
<p>- Web application vulnerabilities made up 69 percent of all vulnerabilities during this period.</p>
<p>- Symantec detected an average of 7.9 million phishing attempts per day, an increase of 39 percent over the first half of 2005.</p>
<p>- Symantec documented 6,542 new variants of Spybot, up from 6,361 in the first half of the year.</p>
<p>- In the last half of 2005, Symantec blocked 1.5 billion phishing attempts, a 44 percent increase over the first half of 2005.</p>
<p>"By tracking these trends in a comprehensive report, Symantec not only gains unparalleled insight into how attacks, vulnerabilities and malicious code is evolving but how it can be prevented," added Pregnell.</p>
<p>NOTE TO EDITORS// A Symantec security expert is available to discuss these findings and offer simple tips for your readers on how to make your home or small business computers safe.</p>
<p>[1] The Report covers the six-month period from 1 July 2005 to 31 December 2005.</p>
<p>[2] Modular malicious code initially posses limited functionality, such as disabling antivirus software and firewalls; however, once it has infected a computer, it can download additional code that has new, potentially more damaging and malicious capabilities.</p>
<p>[3] Cybercrime are criminal acts that incorporate a computer or Internet component.</p>
<p>[4] Software designed with the intent to commit a crime.</p>
<p>[5] Like most software available today, they have security flaws, these fall into the category of web browser vulnerabilities</p>
<p>About the Internet Security Threat Report
The Internet Security Threat Report is based on data collected from Symantec's Global Intelligence Network, which includes 40,000 registered sensors worldwide (via Symantec Deepsight Threat Management and Symantec Managed Security Services), monitoring network activity in more than 180 countries and tracking attack activity across the entire Internet.</p>
<p>Symantec gathers malicious code data along with spyware and adware reports from over 120 million client, server, and gateway systems that have deployed Symantec's antivirus products.</p>
<p>Symantec also maintains one of the world's most comprehensive databases of security vulnerabilities, covering 13,000 vulnerabilities affecting more than 30,000 technologies from over 4,000 vendors. In addition to the vulnerability database, Symantec operates BugTraq(tm); and, the Symantec Probe Network.</p>
<p>These resources provide Symantec analysts with unparalleled sources of data which to identify emerging trends in attacks and malicious code activity. The Internet Security Threat Report is grounded principally on the expert analysis of this data.</p>
<p>Antoinette Trovato
Public Relations Manager - Asia Pacific
02 8879 1173</p>
<p>Anastasia Jones
Max Australia
02 9954 3492</p>

Most Popular

Cool Tech

Breitling Superocean Heritage Chronographe 44

Learn more >

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest Articles


PCW Evaluation Team

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?