• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Saturday, April 11, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » Symantec Tracks Growing Phishing and Watering Hole Attacks

Symantec Tracks Growing Phishing and Watering Hole Attacks

April 21, 2013
in All
A A

Targeted cyber attacks, such as spear phishing, rose 42% in 2012 compared to a year earlier, according to Symantec’s Internet Security Threat Report, Volume 18 (ISTR), released last week.

Over the past year, Symantec noted an increase in cyberespionage attacks targeted at the manufacturing sector as well as small businesses, which now constitute 31 percent of these attacks. This could be due to more sophisticated defenses in place at larger enterprises, or simply that the criminals have extended their reach to more organization.

Two significant attack vectors, according to the report, remain unpatched but legitimate websites (nearly 53% of legitimate websites were found to have unpatched vulnerabilities that hackers could potentially exploit to place malware) and mobile malware.

“This year’s ISTR shows that cybercriminals aren’t slowing down, and they continue to devise new ways to steal information from organizations of all sizes,” said Stephen Trilling, chief technology officer, Symantec. “The sophistication of attacks coupled with today’s IT complexities, such as virtualization, mobility and cloud, require organizations to remain proactive and use ‘defense in depth’ security measures to stay ahead of attacks.”

Some highlights of the report:

  • Watering hole attacks, where a legitimate website is poisoned and the hackers then wait for a victim to arrive, emerged as a rising threat in 2012. A large number of victims can be compromised in a short period of time.
  • Symantec estimates that 61% of websites serving malware are in fact legitimate website and unaware they have been compromised.
  • Global spam rates declined slightly in 2012.  Spam represented about 69% of all email sent in October 2012 compared to 79% in January 2011.
  • Symantec estimates that 1 in 414 emails is a phishing attack.
  • Symantec estimates that 1 in 283 emails is a malware attack.
  • Symantec found that Apple’s iOS had the most documented vulnerabilities in 2012, but that there was only one threat created for the platform. On the other hand, the Android OS only had 13 vulnerabilities reported, but led all mobile operating systems in the amount of malware written for the platform. 

http://www.symantec.com/about/news/release/article.jsp?prid=20130415_01

http://www.slideshare.net/symantec/istr-volume-18

Tags: Blueprint columnsCyber SecuritySymantec
ShareTweetShare
Previous Post

Google Expands North Carolina Data Center

Next Post

Reporter Notes from ONS 2013: NTT Com, Internet 2, Google

Staff

Staff

Related Posts

Blueprint: Brazil looks to municipal Wi-Fi 6E
Blueprints

Blueprint: Brazil looks to municipal Wi-Fi 6E

February 21, 2023
Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
BT trials C-RAN in Leeds
All

BT trials C-RAN in Leeds

December 19, 2022
T-Mobile builds cloud native 5G converged core with Cisco
All

T-Mobile builds cloud native 5G converged core with Cisco

December 15, 2022
Meta halts data center expansion construction in Denmark
All

Meta halts data center expansion construction in Denmark

December 15, 2022
Next Post
Reporter Notes from ONS 2013:  NTT Com, Internet 2, Google

Reporter Notes from ONS 2013: NTT Com, Internet 2, Google

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version