Security Response Publications

Symantec Security Response is a worldwide team of security engineers, threat analysts, and researchers who develop a variety of content on the latest threats that impact organizations and end users.
Archives
ISTR Annual Report

2016 Internet Security Threat Report, Volume 21

The 2016 Internet Security Threat Report (ISTR) provides an overview and analysis of the year in global threat activity. It is compiled using data from the Symantec Global Intelligence Network, which our global cybersecurity experts use to identify, analyze, and provide commentary on emerging trends in the threat landscape.
Overview and Analysis
81 pages, 10.5 MB (PDF)
Additional Stats and Information
25 pages, 0.98 MB (PDF)

Highlights from the 2016 Internet Security Threat Report

Symantec discovered more than 430 million new unique pieces of malware in 2015. Remarkably, these numbers no longer surprise us. Attacks against businesses and nations hit the headlines with such regularity that we’ve become numb to the sheer volume and acceleration of cyber threats. Most threat reports only scratch the surface of the threat landscape, whereas the breadth of Symantec’s data enables the Internet Security Threat Report (ISTR) to examine multiple facets, including attackers’ tactics, motivations, and behaviors. The following are six key findings and trends from 2015.

Key Findings

  • A new zero-day vulnerability was discovered on average each week. Advanced attackers continue to profit from flaws in browsers and website plugins.
  • Half a billion personal records were stolen or lost. More companies than ever are not reporting the full extent of their data breaches.
  • Major security vulnerabilities in three quarters of popular websites put us all at risk. Web administrators still struggle to stay current on patches.
  • Spear-phishing campaigns targeting employees increased 55 percent. Cyber attackers are playing the long game against large companies.
  • Ransomware increased 35 percent. Cyber criminals are using encryption as a weapon to hold companies’ and individuals’ critical data hostage.
  • One hundred million fake technical support scams were blocked. Cyber scammers now make you call them to hand over your cash.

Highlights from the 2016 Internet Security Threat Report

  • A new zero-day vulnerability was discovered on average each week. Advanced attackers continue to profit from flaws in browsers and website plugins.
  • Half a billion personal records were stolen or lost. More companies than ever are not reporting the full extent of their data breaches.
  • Major security vulnerabilities in three quarters of popular websites put us all at risk. Web administrators still struggle to stay current on patches.
  • Spear-phishing campaigns targeting employees increased 55 percent. Cyber attackers are playing the long game against large companies.
  • Ransomware increased 35 percent. Cyber criminals are using encryption as a weapon to hold companies’ and individuals’ critical data hostage.
  • One hundred million fake technical support scams were blocked. Cyber scammers now make you call them to hand over your cash.
Share
  • Google+
  • Technorati
  • Digg
  • Delicious
  • Reddit
  • StumbleUpon
  • Twitter
  • Facebook
  • Newsvine

Key findings from the 2016 Internet Security Threat Report

Privacy: Symantec does not retain any personal information you enter when using our social media share links. Read our policy.

Infographics

View or share graphics that highlight some of the key findings from this year's report.
Share
  • Google+
  • Technorati
  • Digg
  • Delicious
  • Reddit
  • StumbleUpon
  • Twitter
  • Facebook
  • Newsvine

Attackers Target Both Large and Small Businesses

Privacy: Symantec does not retain any personal information you enter when using our social media share links. Read our policy.
Share
  • Google+
  • Technorati
  • Digg
  • Delicious
  • Reddit
  • StumbleUpon
  • Twitter
  • Facebook
  • Newsvine

Peek into the Future: The Risk of Things

Privacy: Symantec does not retain any personal information you enter when using our social media share links. Read our policy.
Share
  • Google+
  • Technorati
  • Digg
  • Delicious
  • Reddit
  • StumbleUpon
  • Twitter
  • Facebook
  • Newsvine

Facts About the Attack on Anthem

Privacy: Symantec does not retain any personal information you enter when using our social media share links. Read our policy.
Share
  • Google+
  • Technorati
  • Digg
  • Delicious
  • Reddit
  • StumbleUpon
  • Twitter
  • Facebook
  • Newsvine

A New Zero-Day Vulnerability Discovered Every Week in 2015

Privacy: Symantec does not retain any personal information you enter when using our social media share links. Read our policy.
Share
  • Google+
  • Technorati
  • Digg
  • Delicious
  • Reddit
  • StumbleUpon
  • Twitter
  • Facebook
  • Newsvine

How the Gmail Scam Works

Privacy: Symantec does not retain any personal information you enter when using our social media share links. Read our policy.
Share
  • Google+
  • Technorati
  • Digg
  • Delicious
  • Reddit
  • StumbleUpon
  • Twitter
  • Facebook
  • Newsvine

Over Half a Billion Personal Information Records Stolen or Lost in 2015

Privacy: Symantec does not retain any personal information you enter when using our social media share links. Read our policy.

2016 Internet Security Threat Report, Volume 21

Overview and Analysis
81 pages, 10.5 MB (PDF)
Additional Stats and Information
25 pages, 0.98MB (PDF)

VIEW THE WEBCAST

2016 ISTR: Drive your security program with confidence! Date: 11th May 2016, 11am
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube