Symantec.com > Enterprise > Security Response > Internet Security Threat Report > Build Your Report

Build Your Report

Build Your Report

Build your custom version of the Internet Security Threat Report, Volume 16


  1. EXPAND individual sections by clicking the + symbols below.
  2. CHECK the boxes to select the material that interests you.
  3. CLICK the Build My Report button to assemble your custom report.
  4. PRINT, BOOKMARK, or SHARE your custom report from the Web browser in which it appears.
Select all|Clear all



Highlights

  • Threat Activity Trends

  • Vulnerability Trends

  • Malicious Code Trends

  • Fraud Actvity Trends

Symantec Internet Security Threat Report - 2010

  • About This Report

  • Executive Summary

  • Notable Statistics

  • Threat Landscape

  • 2010 Timeline

Threat Activity Trends

  • Threat Activity Trends Introduction

  • Malicious Activity by Source

  • Web-Based Attack Prevalence

  • Web-Based Attack Activity

  • Malicious Websites by Search Term

  • Data Breaches That Could Lead to Identity Theft

  • Malicious Shortened URLS on Social Networking Sites

  • Bot-Infected Computers

Vulnerability Trends

  • Vulnerability Trends Introduction

  • Total Number of Vulnerabilities

  • Web Browser Vulnerabilities

  • Window of Exposure for Web Browsers

  • Web Browser Plug-in Vulnerabilities

  • Zero-Day Vulnerabilities

  • SCADA vulnerabilities

Malicious Code Trends

  • Malicious Code Trends Introduction

  • Top Malicious Code Families

  • Prevalence of Malicious Code Features

  • Top Malicious Code Samples by Region

  • Threats to Confidential Information

  • Propagation Mechanisms

Fraud Activity Trends

  • Fraud Activity Trends Introduction

  • Phishing Scams Using Current Events

  • Underground Economy Servers—Goods and Services Available for Sale

  • Spam Delivered by Botnets

  • Originating Sources of Botnet Spam

  • Significant Spam Tactics

  • Spam by Category

Europe, the Middle East, and Africa (EMEA)

  • EMEA Introduction

  • EMEA Threat Activity Trends

  • EMEA Malicious Activity by Country

  • EMEA Attack Origin by Country

  • EMEA Web-based Attack Activity

  • EMEA Bot-Infected Computers by Country

  • EMEA Malicious Code Activity Trends

  • EMEA Prevalence of Malicious Code Features

  • EMEA Top Malicious Code Samples

  • EMEA Top New Malicious Code Families

  • EMEA Threats to Confidential Information

  • EMEA Propagation Mechanisms

  • EMEA Fraud Activity Trends

  • EMEA Phishing URLs by Country and Top Targeted Sectors

  • EMEA Countries of Botnet Spam Origin

Latin America (LAM)

  • LAM Introduction

  • LAM Malicious Activity by Country

  • LAM Attack Origin by Source

  • LAM Bot-Infected Computers by Country

  • LAM Top Malicious Code Samples

  • LAM Countries of Botnet Spam Origin

Best Practices

  • Enterprise Best Practices

  • Consumer Best Practices