13.07.2015 Views

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HP Security Research | Cyber Risk Report 2015Table of contents2 Introduction4 About HP Security Research4 Our data4 Key themes6 The <strong>security</strong> conversation8 Threat actors8 Nation-state supported activity12 The <strong>cyber</strong> underground12 Conclusion13 Vulnerabilities and exploits15 Weaknesses in enterprise middleware15 Vulnerability and exploits trends in 2014(Windows case)18 Malware and exploits18 Top CVE-2014 numbers collected in 201419 Top CVE-2014 for malware attacks20 Top CVE numbers seen in 201422 Defenders are global23 Conclusion24 Threats24 Windows malware overview27 Notable malware29 Proliferation of .NET malware in 201431 ATM malware attacks32 Linux malware34 Mobile malware35 Android anti-malware market36 Top Android malware families in 201436 Notable Android malware in 201439 Conclusion40 Risks: Spotlight on privacy42 Exposures42 Emerging avenues for compromise:POS and IoT42 The evolution of POS malware46 The Internet of Things49 Conclusion49 Controls50 Distribution by kingdom52 Breakdown of top five Web applicationvulnerabilities53 Top 10 Web application vulnerabilities55 Breakdown of the top five mobileapplication vulnerabilities56 Top 10 mobile application vulnerabilities58 Open source software dependencies61 The Heartbleed effect63 Remediation of static issues65 Conclusion66 Summary68 Authors and contributors69 Glossary

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!