The year in review for threats hit on three themes: data theft, targeted attacks, and exploit kits. Almost all attacks now involve a web component and take advantage of the human element as the weakest link. Social engineering combined with social profiling and geo-location variables provide easy entry for targeted attacks. Yesterday’s high-volume attacks are quickly caught by threat-monitoring radar systems, so they have been replaced with focused sniper attacks that use exploits for a clear shot of threat delivery.
⇩ Register ⇩