Profit Is Personal
Profit is Personal
This is the third Symantec Internet Security Threat Report (ISTR) I’ve had the privilege of launching and I’m always impressed by the depth of information and analysis the researchers and analysts are able to uncover in one report -- especially when the report is in addition to their primary responsibilities. But, cybercriminals and malware authors do not seem to take vacations.
And neither do our researchers.
Known as one of the most comprehensive sources of Internet threat data in the world, the ISTR is both a bear and a treasure chest all at once. The sheer enormity of numbers, data and content make this report quite a challenge to pull together, yet the reality it exposes about the threat landscape is filled with such incredible insight and deep understanding of such a wicked Web-based world.
Today’s report reveals many significant changes to the threat landscape in 2010, complete with more than 286 million new threats identified in 2010. Key highlights of the report center around targeted attacks, social networks continuing to serve as a target for cybercriminals and the growing concern over mobile security.
One trend in the report I find particularly fascinating is how attacks are becoming more targeted. Gone are the days of kids spending their summer vacation seeing what kind of havoc they can wreak on networks and anonymous individuals. Today’s threat landscape serves as a virtual groundbed of employment for many a dark being wishing to make an easy buck off of an innocent targeted victim or company. Profit is personal.
If you want to check out the report and explore a cool, new feature, use the“Build Your Report” online tool online, where you can create your own custom report by selecting only the topic areas in which you have interest.
And if you only remember one protective measure, let it be to employ defense-in-depth to protect against single-point failures in any specific technology or protection method. For consumers, this means using an Internet security solution that combines antivirus, firewall, intrusion detection, and vulnerability management.
Let our researchers know what you think; Tweet your thoughts on the #ISTR.