Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Database
    • Mobile

    Symantec Report Says Huge Data Breaches, Targeted Attacks Defined 2013

    Written by

    Robert Lemos
    Published April 9, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Attackers made off with more than 550 million identities in 2013, the largest loss to date, according to security firm Symantec’s Internet Security Threat Report released on April 8.

      The return of “mega breaches” that resulted in the loss of 10 million or more records was a major trend identified by the company in its annual report. In 2013, there were eight mega breaches—such as the compromise of retail giant Target and that of software maker Adobe—outpacing the five large breaches in 2011.

      “The number of breaches this year far surpasses any other year,” Kevin Haley, director of Symantec’s security response group, said in a statement. “The numbers confirm what the news accounts of these breaches told us, that this is the worst year ever.”

      The larger number of breaches was not the only trend in 2013. In addition, targeted attacks became more focused, with a greater number of attacks occurring, but averaging fewer emails per incident, the company said. Ransomware also exploded in 2013, growing by 500 percent in most part due to the popularity of the CryptoLocker attack among cyber-criminals.

      While the number of small and medium businesses targeted by attackers climbed in 2013—reaching 61 percent of reported attacks, up from 50 percent in 2012—larger companies still had a higher chance of being attacked than smaller firms, the report stated. SMBs have a 1 in 5.2 chance of being attacked while larger companies have a 1 in 2.3 chance, according to the report.

      “While there are more attacks against small businesses than large businesses, there are more (SMBs),” Haley said. “When you look at the risk factors and odds, the mining industry has the greatest chance to be attacked.”

      Web attacks continued to climb, reaching nearly 570,000 attacks blocked per day in 2013, up from 464,000 in 2012 and 190,000 in 2011.

      Spammers focused more heavily on lures involving dating and adult content, topics that accounted for 70 percent of all spam, a 15 point increase of 2012. Meanwhile, pharmaceutical spam dropped 3 points to account for 18 percent of all junk mail intercepted by Symantec in 2013.

      On the mobile side, the number of families of Android malware dropped to 57 from 103 in 2012 while the number of variants per family climbed. The trend shows that mobile-malware developers are focusing on a smaller number of attacks, perfecting their software, according to the report.

      “It might be said that mobile malware has not yet exploded because the bad guys have not needed it to get what they want,” the report stated.

      Moreover, the total number of mobile vulnerabilities shrank to 127 in 2013, down from 416 in 2012. Attackers have mainly focused on using trojanized applications, posted online or in third-party app stores, to get malicious code on victims’ devices, the company said.

      Add to smartphones the increasing population of network-connected devices, the so-called Internet of Things, and security will become a larger problem in the future, the report concluded.

      “The risks get even higher with the proliferation of data being generated from these devices,” the report stated. “Big data is big money and unless the right security steps are taken, it’s all available for an enterprising cyber-criminal.”

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×