Knowledge Center - Monthly Statistics

Knowledge Center
Educational Whitepapers
Monthly Statistics
Kaspersky Videos
Threatpost Spotlight
May, 2010
Looking at April’s ratings, one of the main trends of recent months is clearly visible: cybercriminals are making active use of exploits whose source codes are widely available. In the vast majority of cases, the target of such attacks is confidential data.
May, 2010
The most newsworthy events in the first quarter of 2010 are, in one way or another, connected to Internet threats. As usual, the most common tactic employed by the cybercriminals is the so-called ‘drive-by download.’ Key to these types of attacks is that the exploits are used to take advantage of different vulnerabilities in browsers and plug-ins.
April, 2010
In April, the situation generally remained stable with the percentage of spam in email staying relatively unchanged. India and Vietnam came very close to being the prime distributors of spam. If the amount of spam originating from these two countries continues to grow, they may soon topple the USA from its position as leader.
April, 2010
New methods of packing and concealing the true function of popular malware are being developed all the time, which explains why new variants of families such as Krap appear in our Top Twenty virtually every month.
April, 2010
The beginning of 2010 was rather quiet for the spam industry. The amount of spam in mail traffic stopped growing and during the first quarter of 2010 did not exceed last year’s figures. Taking recent development trends into consideration, we can already speak about the saturation of mail traffic with spam. Analysis proves that the share of spam in mail traffic has been following a parabolic curve over the last 10 years.
March, 2010
During March the percentage of phishing messages found in mail traffic decreased considerably. The amount of malicious attachments in mail traffic reverted to January’s level. The quantity of spam in the Computer Fraud category also saw a mild decrease. Therefore it appears that the trend is very slightly towards an overall reduction in the amount of spam demonstrating criminal intent.
February, 2010
In this security bulletin you will learn about spam trends and new distribution methods being employed by spammers. You'll also learn about the new techniques and tactics being employed to scam online users.
February, 2010
The facts speak for themselves. Vulnerabilities in popular software continue to pose the main threat to users and their data.
February, 2010
In this security bulletin you will learn about spam trends for 2009 and methods being employed by spammers. This report also includes a summary of the techniques and tactics being employed to scam online users.
January, 2010
The statistics used in this report are generated by the Kaspersky Security Network (KSN). KSN enables our analysts to detect, in real time, new malicious programs for which signature or heuristic detection does not yet exist. KSN is also able to identify sources which are spreading malware on the Internet, and to prevent users from accessing these sources.
January, 2010
In this security bulletin you will learn about spam trends and new distribution methods being employed by spammers. You'll also learn about the new techniques and tactics being employed to scam online users.
January, 2010
There has been no major change to recent trends. Malware is actively spreading via removable media with the help of script downloaders, and for the most part exploiting vulnerabilities in popular software products.
December, 2009
Attacks are becoming more sophisticated and more difficult to analyze. Their aim, in the vast majority of cases, is to make money in some way. Virtual threats are no longer purely virtual; they can cause real damage, and this is why is it vital to ensure that your computer and data are protected.
November, 2009
In this security bulletin you will learn about spam trends and new distribution methods being employed by spammers. You'll also learn about the new techniques and tactics being employed to scam online users.
October, 2009
In this security bulletin you will learn about spam trends and new distribution methods being employed by spammers. You'll also learn about the new techniques and tactics being employed to scam online users.