Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Cyber Criminals Launching Higher Numbers of Sophisticated Attacks

  • 07 March, 2006 16:34

<p>Media Advisory</p>
<p>Symantec Internet Security Threat Report - the industry's "State of the Internet" analysis, confirms shift from hacking for fame to hacking for fortune</p>
<p>Online security threats are moving away from widespread, chaotic nuisances to smaller, more targeted attacks motivated by financial gain, according to findings unveiled today by Symantec in its latest Internet Security Threat Report[1].</p>
<p>The semi-annual global report - the most comprehensive gauge of the Internet landscape, detailed the current threat landscape; which is dominated by emerging threats such as modular malicious code[2], cybercrime[3] (through an increased use of crimeware[4]) and web browser vulnerabilities[5] and provided information for consumers on the type of Internet nasties lurking behind the screen.</p>
<p>Rob Pregnell, Senior Product Marketing Manager, Asia Pacific said of the findings in the Report: "Cybercrime represents today's greatest threat. Whereas traditional attack activity has been motivated by curiosity and a desire to show off technical virtuosity, many current threats are motivated by profit. They often attempt to perpetrate criminal acts, such as identity theft, extortion, and fraud for financial gain.</p>
<p>"What we expect to see in the near future is more diversification and sophistication of the threats used for cybercrime, as well as an increase in the theft of confidential, financial and personal information for financial gain."</p>
<p>The Symantec Internet Security Threat Report Vol 9's key findings include (a key findings document is available for further explanation):</p>
<p>- Of malicious code targeting instant messaging services, worms made up 91 percent, compared to 83 percent in the first half of 2005.
One in 119 emails was determined to be phishing attempts, up from one in 125.</p>
<p>- Spam made up 50 percent of all monitored email traffic - a decrease over the past two reporting periods.</p>
<p>- Microsoft® Internet Explorer had the highest number of new vulnerabilities with 24.</p>
<p>- Web application vulnerabilities made up 69 percent of all vulnerabilities during this period.</p>
<p>- Symantec detected an average of 7.9 million phishing attempts per day, an increase of 39 percent over the first half of 2005.</p>
<p>- Symantec documented 6,542 new variants of Spybot, up from 6,361 in the first half of the year.</p>
<p>- In the last half of 2005, Symantec blocked 1.5 billion phishing attempts, a 44 percent increase over the first half of 2005.</p>
<p>"By tracking these trends in a comprehensive report, Symantec not only gains unparalleled insight into how attacks, vulnerabilities and malicious code is evolving but how it can be prevented," added Pregnell.</p>
<p>NOTE TO EDITORS// A Symantec security expert is available to discuss these findings and offer simple tips for your readers on how to make your home or small business computers safe.</p>
<p>[1] The Report covers the six-month period from 1 July 2005 to 31 December 2005.</p>
<p>[2] Modular malicious code initially posses limited functionality, such as disabling antivirus software and firewalls; however, once it has infected a computer, it can download additional code that has new, potentially more damaging and malicious capabilities.</p>
<p>[3] Cybercrime are criminal acts that incorporate a computer or Internet component.</p>
<p>[4] Software designed with the intent to commit a crime.</p>
<p>[5] Like most software available today, they have security flaws, these fall into the category of web browser vulnerabilities</p>
<p>About the Internet Security Threat Report
The Internet Security Threat Report is based on data collected from Symantec's Global Intelligence Network, which includes 40,000 registered sensors worldwide (via Symantec Deepsight Threat Management and Symantec Managed Security Services), monitoring network activity in more than 180 countries and tracking attack activity across the entire Internet.</p>
<p>Symantec gathers malicious code data along with spyware and adware reports from over 120 million client, server, and gateway systems that have deployed Symantec's antivirus products.</p>
<p>Symantec also maintains one of the world's most comprehensive databases of security vulnerabilities, covering 13,000 vulnerabilities affecting more than 30,000 technologies from over 4,000 vendors. In addition to the vulnerability database, Symantec operates BugTraq(tm); and, the Symantec Probe Network.</p>
<p>These resources provide Symantec analysts with unparalleled sources of data which to identify emerging trends in attacks and malicious code activity. The Internet Security Threat Report is grounded principally on the expert analysis of this data.</p>
<p>Antoinette Trovato
Public Relations Manager - Asia Pacific
02 8879 1173</p>
<p>Anastasia Jones
Max Australia
02 9954 3492</p>

Most Popular

Brand Post

Most Popular Reviews

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest Articles


PCW Evaluation Team

Luke Hill


I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?