神刀安全网

February 2016 Cyber Attacks Statistics

It’s now time to publish the statistics derived from the Cyber Attacks Timelines of February (Part I andPart II).

Let’s start from the Daily Trend of Attacks , which shows a slow start, immediately followed by a plateau, a peak concentrated on the 15th, and finally a stable trend until the end of the month.

February 2016 Cyber Attacks Statistics

One again, Cyber Crime ranks on top of the Motivations Behind Attacks chart with 62.7%, substantially stable and in line with January (was 60.6%). Hacktivism  ranks at number two, nearly with the same value reported in January (28% vs 27.7%). Cyber Espionage ranks at number three with 5.3% (was 7.4% in January), while attacks motivated by Cyber Warfare are equally substantially stable with 4% (was 4.3% in January).

February 2016 Cyber Attacks Statistics

The Attack Techniques were unknown in 41.3% of the cases. Account Hijackings are immediately behind with 12%, and SQLi achieve an impressive 10.7%. Impressive are also the percentages of targeted attacks (9.3%) and malware (6.7%). All the other techniques follow…

February 2016 Cyber Attacks Statistics

Industries lead the Distribution of Targets chart with 29.3% (was 22.3% in January), ahead of Governments (14.7%, was 17.0% in January) and Finance, Law Enforcement Agencies and Single Individuals (each of them at 8%). Organizations (6.7%), Online Services (5.3%) and Education (4.0%) emerge on the other targets. February 2016 Cyber Attacks Statistics

For the second month in a row, software Companies lead the Industry Drill Down Chart with 13.6%, but this time they share the higher stand of the podium with E-Commerce. Job seeking and Telco emerge from the rest of the group.

February 2016 Cyber Attacks Statistics

Software also leads the Organization Drill Down Chart.

February 2016 Cyber Attacks Statistics

As usual, the sample must be taken very carefully since it refers only to discovered attacks included in mytimelines, aiming to provide an high level overview of the “cyber landscape”.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in2011, 2012 , 2013 ,2014 and now2015 (regularly updated). You may also want to have a look at the Cyber Attack Statistics .

Of course follow @paulsparrows on Twitter for the latest updates, andfeel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

转载本站任何文章请注明:转载至神刀安全网,谢谢神刀安全网 » February 2016 Cyber Attacks Statistics

分享到:更多 ()

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址
分享按钮