October 10, 2012
Spear Phishing Remains Most Difficult Attack to Defend Against
Spear-phishers, like the ones that compromised a White House network last week, are implementing new evasion tactics, fundamentally changing their attack strategies, and revolutionizing the targeted threat model. One of the newer attack strategies is the relatively recent ‘watering hole’ technique, but the changes also include an increased focus on victim behavior, and the adoption of successful tactics used by other factions of the cybercriminal world, specifically scareware and ransomware.
Infographic via Websense

Spear Phishing Remains Most Difficult Attack to Defend Against

Spear-phishers, like the ones that compromised a White House network last week, are implementing new evasion tactics, fundamentally changing their attack strategies, and revolutionizing the targeted threat model. One of the newer attack strategies is the relatively recent ‘watering hole’ technique, but the changes also include an increased focus on victim behavior, and the adoption of successful tactics used by other factions of the cybercriminal world, specifically scareware and ransomware.

Infographic via Websense

July 12, 2012

Geographical Visualization of Blacklisted Websites by Hosting Country

Via Zscaler

ZScaler’s Julien Sobrier analyzed the geographical distribution of the top 1,000,000 websites blacklisted by Google Safe Browsing. The first graphic (top) illustrates the distribution by raw numbers and the second (bottom) illustrates the relative distribution (number of blacklisted sites / number of sites hosted).

June 28, 2012
Android Malware: A Threat Rising at a Meteoric Rate
Infographic via Kaspersky Lab
Check out Threatpost’s mobile security coverage for the specifics.

Android Malware: A Threat Rising at a Meteoric Rate


Infographic via Kaspersky Lab


Check out Threatpost’s mobile security coverage for the specifics.

June 12, 2012
State of the Internet infographic via Online Schools.

State of the Internet infographic via Online Schools.

April 3, 2012
When Good Websites Go Bad!
Infographic via Barracuda Labs
Over 10 million people were hit by exploits served up by 25,000 of the most popular websites in the world in February, according to a new study released by Barracuda Labs.
Read more at Threapost.

When Good Websites Go Bad!

Infographic via Barracuda Labs


Over 10 million people were hit by exploits served up by 25,000 of the most popular websites in the world in February, according to a new study released by Barracuda Labs.

Read more at Threapost.

March 27, 2012
A Visual Analysis of the Taidoor Trojan
via Symantec

A Visual Analysis of the Taidoor Trojan

via Symantec

March 23, 2012
2011 Sampling of Security Incidents by Attack Types, Time, and Impact
via IBM’s X-Force Trend and Risk Report
Spam volume is down, there are fewer unpatched software holes and oftware application developers did a better job of writing secure code over the last year. But IBM’s X-Force Trend and Risk Report still found plenty to worry about in 2011, according to a copy of the report released this week.  

2011 Sampling of Security Incidents by Attack Types, Time, and Impact

via IBM’s X-Force Trend and Risk Report

Spam volume is down, there are fewer unpatched software holes and oftware application developers did a better job of writing secure code over the last year. But IBM’s X-Force Trend and Risk Report still found plenty to worry about in 2011, according to a copy of the report released this week.  

February 27, 2012
Between MWC and RSA, Worlds of Mobility and Security Collide
Infographic via Juniper; Article via ReadWriteWeb
"Mobile World Congress, the largest and most important mobile conference of the year, starts this week in Barcelona. Meanwhile, about 6000 miles away in San Francisco, the RSA Conference brings together cryptographers and security geeks. These conferences, while seemingly unrelated, have more in common in 2012 than ever before."

Between MWC and RSA, Worlds of Mobility and Security Collide

Infographic via Juniper; Article via ReadWriteWeb

"Mobile World Congress, the largest and most important mobile conference of the year, starts this week in Barcelona. Meanwhile, about 6000 miles away in San Francisco, the RSA Conference brings together cryptographers and security geeks. These conferences, while seemingly unrelated, have more in common in 2012 than ever before."

January 16, 2012
Infographic via Microsoft:
Yesterday marked the ten year anniversary of Bill Gates’s Trustworthy Computing Memo.

Infographic via Microsoft:

Yesterday marked the ten year anniversary of Bill Gates’s Trustworthy Computing Memo.

January 4, 2012
iOS vs. Android Infographic: How Secure Are They?
(Infographic via VeraCode)
Check it out, then head over to Threatpost and read up on our Mobile Security coverage to decide for yourself!

iOS vs. Android Infographic: How Secure Are They?

(Infographic via VeraCode)

Check it out, then head over to Threatpost and read up on our Mobile Security coverage to decide for yourself!

Liked posts on Tumblr: More liked posts »