hp-security-research-cyber-risk-report-pdf-2-w-1408
hp-security-research-cyber-risk-report-pdf-2-w-1408
hp-security-research-cyber-risk-report-pdf-2-w-1408
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
HP Security Research | Cyber Risk Report 2015Figure 3. Monthly breakdown of the top 10 exploit samples discovered in 201410,0009,0008,0007,0006,0005,0004,000CVE-2010-2568CVE-2010-0188CVE-2013-0422CVE-2012-1723CVE-2012-0507CVE-2012-0158CVE-2013-2456CVE-2012-4681CVE-2013-2423CVE-2009-31293,0002,0001,0000JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberLooking at the file types used to deliver exploits through Web browsing or email attachments,Java applets and class files are the most common and account for 48 percent of all samples ofthis set, followed by PDF files, HTML (JavaScript), and Word (OLE2) documents. These accountfor 33 percent, 10 percent, and 5 percent of discovered malware samples respectively.Figure 4. Web or email exploit samples by file typeJava 48%PDF33%HTML11%Word5%SWF3%ExcelMultimediaPowerPoint®CHM0.4%0.18%0.03%0.01%0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%21