Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Cyber Criminals Launching Higher Numbers of Sophisticated Attacks

  • 07 March, 2006 16:34

<p>Media Advisory</p>
<p>Symantec Internet Security Threat Report - the industry's "State of the Internet" analysis, confirms shift from hacking for fame to hacking for fortune</p>
<p>Online security threats are moving away from widespread, chaotic nuisances to smaller, more targeted attacks motivated by financial gain, according to findings unveiled today by Symantec in its latest Internet Security Threat Report[1].</p>
<p>The semi-annual global report - the most comprehensive gauge of the Internet landscape, detailed the current threat landscape; which is dominated by emerging threats such as modular malicious code[2], cybercrime[3] (through an increased use of crimeware[4]) and web browser vulnerabilities[5] and provided information for consumers on the type of Internet nasties lurking behind the screen.</p>
<p>Rob Pregnell, Senior Product Marketing Manager, Asia Pacific said of the findings in the Report: "Cybercrime represents today's greatest threat. Whereas traditional attack activity has been motivated by curiosity and a desire to show off technical virtuosity, many current threats are motivated by profit. They often attempt to perpetrate criminal acts, such as identity theft, extortion, and fraud for financial gain.</p>
<p>"What we expect to see in the near future is more diversification and sophistication of the threats used for cybercrime, as well as an increase in the theft of confidential, financial and personal information for financial gain."</p>
<p>The Symantec Internet Security Threat Report Vol 9's key findings include (a key findings document is available for further explanation):</p>
<p>- Of malicious code targeting instant messaging services, worms made up 91 percent, compared to 83 percent in the first half of 2005.
One in 119 emails was determined to be phishing attempts, up from one in 125.</p>
<p>- Spam made up 50 percent of all monitored email traffic - a decrease over the past two reporting periods.</p>
<p>- Microsoft® Internet Explorer had the highest number of new vulnerabilities with 24.</p>
<p>- Web application vulnerabilities made up 69 percent of all vulnerabilities during this period.</p>
<p>- Symantec detected an average of 7.9 million phishing attempts per day, an increase of 39 percent over the first half of 2005.</p>
<p>- Symantec documented 6,542 new variants of Spybot, up from 6,361 in the first half of the year.</p>
<p>- In the last half of 2005, Symantec blocked 1.5 billion phishing attempts, a 44 percent increase over the first half of 2005.</p>
<p>"By tracking these trends in a comprehensive report, Symantec not only gains unparalleled insight into how attacks, vulnerabilities and malicious code is evolving but how it can be prevented," added Pregnell.</p>
<p>NOTE TO EDITORS// A Symantec security expert is available to discuss these findings and offer simple tips for your readers on how to make your home or small business computers safe.</p>
<p>[1] The Report covers the six-month period from 1 July 2005 to 31 December 2005.</p>
<p>[2] Modular malicious code initially posses limited functionality, such as disabling antivirus software and firewalls; however, once it has infected a computer, it can download additional code that has new, potentially more damaging and malicious capabilities.</p>
<p>[3] Cybercrime are criminal acts that incorporate a computer or Internet component.</p>
<p>[4] Software designed with the intent to commit a crime.</p>
<p>[5] Like most software available today, they have security flaws, these fall into the category of web browser vulnerabilities</p>
<p>About the Internet Security Threat Report
The Internet Security Threat Report is based on data collected from Symantec's Global Intelligence Network, which includes 40,000 registered sensors worldwide (via Symantec Deepsight Threat Management and Symantec Managed Security Services), monitoring network activity in more than 180 countries and tracking attack activity across the entire Internet.</p>
<p>Symantec gathers malicious code data along with spyware and adware reports from over 120 million client, server, and gateway systems that have deployed Symantec's antivirus products.</p>
<p>Symantec also maintains one of the world's most comprehensive databases of security vulnerabilities, covering 13,000 vulnerabilities affecting more than 30,000 technologies from over 4,000 vendors. In addition to the vulnerability database, Symantec operates BugTraq(tm); and, the Symantec Probe Network.</p>
<p>These resources provide Symantec analysts with unparalleled sources of data which to identify emerging trends in attacks and malicious code activity. The Internet Security Threat Report is grounded principally on the expert analysis of this data.</p>
<p>Antoinette Trovato
Public Relations Manager - Asia Pacific
02 8879 1173</p>
<p>Anastasia Jones
Max Australia
02 9954 3492</p>

Most Popular

Cool Tech

Bang and Olufsen Beosound Stage - Dolby Atmos Soundbar

Learn more >

Toys for Boys

ASUS ROG, ACRONYM partner for Special Edition Zephyrus G14

Learn more >

Sony WF-1000XM3 Wireless Noise Cancelling Headphones

Learn more >

Nakamichi Delta 100 3-Way Hi Fi Speaker System

Learn more >

Family Friendly

Philips Sonicare Diamond Clean 9000 Toothbrush

Learn more >

Mario Kart Live: Home Circuit for Nintendo Switch

Learn more >

Stocking Stuffer

Teac 7 inch Swivel Screen Portable DVD Player

Learn more >

SunnyBunny Snowflakes 20 LED Solar Powered Fairy String

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest Articles


PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Jack Jeffries


As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr


The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?