Symantec Global Internet Security Threat Report: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
==Symantec Global Internet Security Threat Report: Trends for 2009 | ==Full Title of Reference== | ||
Symantec Global Internet Security Threat Report: Trends for 2009 | |||
==Full Citation== | ==Full Citation== |
Revision as of 16:31, 22 June 2010
Full Title of Reference
Symantec Global Internet Security Threat Report: Trends for 2009
Full Citation
Symantec Corporation, Symantec Global Internet Security Threat Report: Trends for 2009 (2010). Online Paper. Web
Categorization
Overview: Industry Reports
Key Words
Symantec, virus, cybercrime, phishing, honeypot, malicious code, spam, attacks, security, hacker
Synopsis
Symantec gathers malicious code intelligence from more than 133 million client, server, and gateway systems that have deployed its antivirus products. Additionally, Symantec’s distributed honeypot network collects data from around the globe, capturing previously unseen threats and attacks and providing valuable insight into attacker methods.
Spam and phishing data is captured through a variety of sources including: the Symantec Probe Network, a system of more than 5 million decoy accounts; MessageLabs Intelligence, a respected source of data and analysis for messaging security issues, trends and statistics; and other Symantec technologies. Data is collected in more than 86 countries. Over 8 billion email messages, as well as over 1 billion Web requests, are processed per day across 16 data centers. Symantec also gathers phishing information through an extensive antifraud community of enterprises, security vendors and more than 50 million consumers.
These resources give Symantec’s analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the Symantec Global Internet Security Threat Report, which gives enterprises and consumers essential information to effectively secure their systems now and into the future