Threat Report 2012: The Year in Review for Threats data theft • targeted attacks • exploit kits

The year in review for threats hit on three themes: data theft, targeted attacks, and exploit kits. Almost all attacks now involve a web component and take advantage of the human element as the weakest link. Social engineering combined with social profiling and geo-location variables provide easy entry for targeted attacks. Yesterday’s high-volume attacks are quickly caught by threat-monitoring radar systems, so they have been replaced with focused sniper attacks that use exploits for a clear shot of threat delivery.