informa
Commentary

Top 15 Threats: How The Crooks Are Coming At You

The latest Verizon Data Breach Report lists the top outside threats -- keyloggers, spyware, SQL injections, remote access and control -- and inside threats -- access and privilege abuse, usage and other policy violations -- that businesses have faced. The report is based on actual business's data breach experiences.
The latest Verizon Data Breach Report lists the top outside threats -- keyloggers, spyware, SQL injections, remote access and control -- and inside threats -- access and privilege abuse, usage and other policy violations -- that businesses have faced. The report is based on actual business's data breach experiences.According to Verizon, keyloggers and spyware were the top two attack types resulting in serious data breaches.

But there are plenty more attack vectors, as the new report shows.

The 2009 Data Breach Investigations Supplemental Report from Verizon is a detailed analysis and exploration of data company's earlier and even more detailed 2009 Data Breach Investigations Report.

Both are, I would say, must reads.

Drawing on information gathered by Verizon's computer forensics team, the top data breach attack result from:

1. Keyloggers/spyware

Recommended Reading: