Top 15 Threats: How The Crooks Are Coming At You

The latest Verizon Data Breach Report lists the top outside threats -- keyloggers, spyware, SQL injections, remote access and control -- and inside threats -- access and privilege abuse, usage and other policy violations -- that businesses have faced. The report is based on actual business's data breach experiences.

Keith Ferrell, Contributor

December 10, 2009

1 Min Read
Dark Reading logo in a gray background | Dark Reading

The latest Verizon Data Breach Report lists the top outside threats -- keyloggers, spyware, SQL injections, remote access and control -- and inside threats -- access and privilege abuse, usage and other policy violations -- that businesses have faced. The report is based on actual business's data breach experiences.According to Verizon, keyloggers and spyware were the top two attack types resulting in serious data breaches.

But there are plenty more attack vectors, as the new report shows.

The 2009 Data Breach Investigations Supplemental Report from Verizon is a detailed analysis and exploration of data company's earlier and even more detailed 2009 Data Breach Investigations Report.

Both are, I would say, must reads.

Drawing on information gathered by Verizon's computer forensics team, the top data breach attack result from:

1. Keyloggers/spyware

About the Author

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights