13.07.2015 Views

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

HP Security Research | Cyber Risk Report 2015Figure 3. Monthly breakdown of the top 10 exploit samples discovered in 201410,0009,0008,0007,0006,0005,0004,000CVE-2010-2568CVE-2010-0188CVE-2013-0422CVE-2012-1723CVE-2012-0507CVE-2012-0158CVE-2013-2456CVE-2012-4681CVE-2013-2423CVE-2009-31293,0002,0001,0000JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberLooking at the file types used to deliver exploits through Web browsing or email attachments,Java applets and class files are the most common and account for 48 percent of all samples ofthis set, followed by PDF files, HTML (JavaScript), and Word (OLE2) documents. These accountfor 33 percent, 10 percent, and 5 percent of discovered malware samples respectively.Figure 4. Web or email exploit samples by file typeJava 48%PDF33%HTML11%Word5%SWF3%ExcelMultimediaPowerPoint®CHM0.4%0.18%0.03%0.01%0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!