1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers
2 Internet Security Threat Report X Internet Security Threat Report VI Figure 2. Window Of Exposure, Enterprise Vendors
3 Internet Security Threat Report X Internet Security Threat Report VI Figure 3. Operating System Window Of Exposure
4 Internet Security Threat Report X Internet Security Threat Report VI Figure 4. Web Browsers Window Of Exposure
5 Internet Security Threat Report X Internet Security Threat Report VI Figure 5. Web Browser Vulnerabilities
6 Internet Security Threat Report X Internet Security Threat Report VI Figure 6. Active Bot Network Computers Per Day
7 Internet Security Threat Report X Internet Security Threat Report VI Figure 7. Number Of Unique Phishing Messages
8 Internet Security Threat Report X Internet Security Threat Report VI Figure 8. Phishing Activity By Sector
9 Internet Security Threat Report X Internet Security Threat Report VI Figure 9. Distribution of Attacks Targeting Web Browsers
10 Internet Security Threat Report X Internet Security Threat Report VI Figure 10. Denial Of Service Attacks Per Day
11 Internet Security Threat Report X Internet Security Threat Report VI Figure 11. Top Countries Targeted By Denial Of Service Attacks
12 Internet Security Threat Report X Internet Security Threat Report VI Figure 12. Active Bot Network Computers Per Day
13 Internet Security Threat Report X Internet Security Threat Report VI Figure 13. Top Countries By Bot-Infected Computers
14 Internet Security Threat Report X Internet Security Threat Report VI Figure 14. Distribution Of Command-And-Control Servers
15 Internet Security Threat Report X Internet Security Threat Report VI Figure 15. Top Originating Countries
16 Internet Security Threat Report X Internet Security Threat Report VI Figure 16. Total Volume Of Vulnerabilities
17 Internet Security Threat Report X Internet Security Threat Report VI Figure 17. Web Application Vulnerabilities
18 Internet Security Threat Report X Internet Security Threat Report VI Figure 18. Easily Exploitable Vulnerabilities
19 Internet Security Threat Report X Internet Security Threat Report VI Figure 19. Easily Exploitable Vulnerabilities By Type
20 Internet Security Threat Report X Internet Security Threat Report VI Figure 20. Window Of Exposure, Enterprise Vendors
21 Internet Security Threat Report X Internet Security Threat Report VI Figure 21. Operating System Exploit Development Time
22 Internet Security Threat Report X Internet Security Threat Report VI Figure 22. Operating System Patch Development Time
23 Internet Security Threat Report X Internet Security Threat Report VI Figure 23. Operating System Window Of Exposure
24 Internet Security Threat Report X Internet Security Threat Report VI Figure 24. Patch Development Time, Web Browsers
25 Internet Security Threat Report X Internet Security Threat Report VI Figure 25. Window Of Exposure, Web Browsers
26 Internet Security Threat Report X Internet Security Threat Report VI Figure 26. Web Browser Vulnerabilities
27 Internet Security Threat Report X Internet Security Threat Report VI Figure 27. Exploit Code Release Period
28 Internet Security Threat Report X Internet Security Threat Report VI Figure 28. Previously Unseen Threats As A Proportion Of All Threats
29 Internet Security Threat Report X Internet Security Threat Report VI Figure 29. Malicious Code Types By Volume
30 Internet Security Threat Report X Internet Security Threat Report VI Figure 30. New Win32 Virus And Worm Variants
31 Internet Security Threat Report X Internet Security Threat Report VI Figure 31. Volume Of Bots Reported
32 Internet Security Threat Report X Internet Security Threat Report VI Figure 32. Exposure Of Confidential Information
33 Internet Security Threat Report X Internet Security Threat Report VI Figure 33. Percentage Of Instant Messaging Threat Propagation By Protocol
34 Internet Security Threat Report X Internet Security Threat Report VI Figure 34. Volume Of Modular Malicious Code
35 Internet Security Threat Report X Internet Security Threat Report VI Figure 35. Modular Malicious Code Samples
36 Internet Security Threat Report X Internet Security Threat Report VI Figure 36. Malicious Code Propagation Vectors
37 Internet Security Threat Report X Internet Security Threat Report VI Figure 37. Number Of Unique Phishing Messages
38 Internet Security Threat Report X Internet Security Threat Report VI Figure 38. Blocked Phishing Attempts
39 Internet Security Threat Report X Internet Security Threat Report VI Figure 39. Phishing Activity By Sector
40 Internet Security Threat Report X Internet Security Threat Report VI Figure 40. Spam Categories
41 Internet Security Threat Report X Internet Security Threat Report VI Figure 41. Top Ten Countries Of Spam Origin
42 Internet Security Threat Report X Internet Security Threat Report VI Figure 42. Spam Containing Malicious Code
43 Internet Security Threat Report X Internet Security Threat Report VI Figure 43. Industry Representational Breakdown
44 Internet Security Threat Report X Internet Security Threat Report VI Table 1. TopTargetedSector
45 Internet Security Threat Report X Internet Security Threat Report VI Table 2. TopSectDoSAtks
46 Internet Security Threat Report X Internet Security Threat Report VI Table 3. TopWebBrwsrAttacks
47 Internet Security Threat Report X Internet Security Threat Report VI Table 4. TopAttacksWireless
48 Internet Security Threat Report X Internet Security Threat Report VI Table 5. TopSectDoSAtks
49 Internet Security Threat Report X Internet Security Threat Report VI Table 6. TopBotNetworkCities
50 Internet Security Threat Report X Internet Security Threat Report VI Table 7. TopTargetedSector
51 Internet Security Threat Report X Internet Security Threat Report VI Table 8. TopNewMalCodeFam
52 Internet Security Threat Report X Internet Security Threat Report VI Table 10. Top10CountSpamOrg
53 Internet Security Threat Report X Internet Security Threat Report VI Table 11. TopNewSecurRisks
54 Internet Security Threat Report X Internet Security Threat Report VI Table 12. Anti-removalTechs
55 Internet Security Threat Report X Internet Security Threat Report VI Table 13. Self-updatSecur
56 Internet Security Threat Report X Internet Security Threat Report VI Table 14. TopSecurityRisks