{"id":521,"date":"2005-10-05T17:35:00","date_gmt":"2005-10-05T17:35:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm"},"modified":"2007-06-11T21:22:35","modified_gmt":"2007-06-11T20:22:35","slug":"symantec-internet-security-threat","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm","title":{"rendered":"The Symantec Internet security threat report"},"content":{"rendered":"<p><!--113441261776024880-->Earlier today, I downloaded the Eighth Edition of the <a href=\"http:\/\/enterprisesecurity.symantec.com\/content.cfm?articleid=1539\">Symantec Internet Security Threat Report<\/a>.  Published twice a year, this report highlights trends in the Internet security space and the following list highlights some of the key findings (according to Symantec).<\/p>\n<p>Vulnerability trend highlights:<\/p>\n<ul>\n<li>Symantec documented 1,862 new vulnerabilities, the highest number since Symantec started tracking vulnerabilities in six-month increments.<\/li>\n<li>The time between the disclosure of a vulnerability and the release of an associated exploit was 6.0 days.<\/li>\n<li>The average patch-release time for the past 6 months was 54 days. This means that, on average, 48 days elapsed between the release of an exploit and the release of an associated patch.<\/li>\n<li>97% of vulnerabilities were either moderately or highly severe.<\/li>\n<li>73% of reported vulnerabilities this period were classified as easily exploitable.<\/li>\n<li>59% of vulnerabilities were associated with web application technologies.<\/li>\n<li>25 vulnerabilities were disclosed for Mozilla browsers and 13 for Microsoft Internet Explorer.<\/li>\n<\/ul>\n<p>Attack trend highlights:<\/p>\n<ul>\n<li>For the fourth consecutive reporting period, the Microsoft SQL Server Resolution Service Stack Overflow Attack was the most common attack, accounting for 33% of all attacks.<\/li>\n<li>Symantec sensors detected an average of 57 attacks per day.<\/li>\n<li>TCP port 445, commonly implemented for Microsoft file and printer sharing, was the most frequently targeted port.<\/li>\n<li>Symantec identified an average of 10,352 bots per day, up from 4,348 in December 2004.<\/li>\n<li>On average, the number of denial of service (DoS) attacks grew from 119 to 927 per day, an increase of 679% over the previous reporting period.<\/li>\n<li>33% of Internet attacks originated in the United States, up from 30% last period.<\/li>\n<li>Between January 1 and June 30, 2005, education was the most frequently targeted industry followed by small business.<\/li>\n<\/ul>\n<p>Malicious code trend highlights:<\/p>\n<ul>\n<li>Symantec documented more than 10, 866 new Win32 virus and worm variants, a 48% increase over the second half of 2004 and a 142% increase of the first half of 2004.<\/li>\n<li>For the second straight period, Netsky.P was the most reported malicious code sample. Gaobot and Spybot were the second and third most reported, respectively.<\/li>\n<li>Malicious code that exposes confidential information represented 74% of the top 50 malicious code samples received by Symantec.<\/li>\n<li>Bot-related malicious code reported to Symantec made up 14% of the top 50 reports.<\/li>\n<li>6,361 new variants of Spybot were reported to Symantec, a 48% increase over the 4,288 new variants documented in the second half of 2004.<\/li>\n<\/ul>\n<p>Additional security risks:<\/p>\n<ul>\n<li>Adware made up 8% of the top 50 reported programs, up from 5% in the previous reporting period.<\/li>\n<li>Eight of the top ten adware programs were installed through web browsers.<\/li>\n<li>Six of the top ten spyware programs were bundled with other programs and six were installed through web browsers.<\/li>\n<li>Of the top ten adware programs reported in the first six months of 2005, five hijacked browsers.<\/li>\n<li>Messages that constitute phishing attempts increased from an average of 2.99 million per day to approximately 5.70 million messages.<\/li>\n<li>Spam made up 61% of all email traffic.<\/li>\n<li>51% of all spam received worldwide originated in the United States.<\/li>\n<\/ul>\n<p>Some interesting (and some frankly frightening) statistics there.  Definitely worth a read for any network administrator or IT manager.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier today, I downloaded the Eighth Edition of the Symantec Internet Security Threat Report. Published twice a year, this report highlights trends in the Internet security space and the following list highlights some of the key findings (according to Symantec). Vulnerability trend highlights: Symantec documented 1,862 new vulnerabilities, the highest number since Symantec started tracking &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The Symantec Internet security threat report<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[5,43,89],"class_list":["post-521","post","type-post","status-publish","format-standard","hentry","tag-internet","tag-security","tag-symantec"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Symantec Internet security threat report - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Symantec Internet security threat report - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"Earlier today, I downloaded the Eighth Edition of the Symantec Internet Security Threat Report. Published twice a year, this report highlights trends in the Internet security space and the following list highlights some of the key findings (according to Symantec). Vulnerability trend highlights: Symantec documented 1,862 new vulnerabilities, the highest number since Symantec started tracking &hellip; Continue reading The Symantec Internet security threat report\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2005-10-05T17:35:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-06-11T20:22:35+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/10\\\/symantec-internet-security-threat.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/10\\\/symantec-internet-security-threat.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"The Symantec Internet security threat report\",\"datePublished\":\"2005-10-05T17:35:00+00:00\",\"dateModified\":\"2007-06-11T20:22:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/10\\\/symantec-internet-security-threat.htm\"},\"wordCount\":483,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Internet\",\"Security\",\"Symantec\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/10\\\/symantec-internet-security-threat.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/10\\\/symantec-internet-security-threat.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/10\\\/symantec-internet-security-threat.htm\",\"name\":\"The Symantec Internet security threat report - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2005-10-05T17:35:00+00:00\",\"dateModified\":\"2007-06-11T20:22:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/10\\\/symantec-internet-security-threat.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/10\\\/symantec-internet-security-threat.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/10\\\/symantec-internet-security-threat.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Symantec Internet security threat report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Symantec Internet security threat report - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm","og_locale":"en_GB","og_type":"article","og_title":"The Symantec Internet security threat report - markwilson.it","og_description":"Earlier today, I downloaded the Eighth Edition of the Symantec Internet Security Threat Report. Published twice a year, this report highlights trends in the Internet security space and the following list highlights some of the key findings (according to Symantec). Vulnerability trend highlights: Symantec documented 1,862 new vulnerabilities, the highest number since Symantec started tracking &hellip; Continue reading The Symantec Internet security threat report","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm","og_site_name":"markwilson.it","article_published_time":"2005-10-05T17:35:00+00:00","article_modified_time":"2007-06-11T20:22:35+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"The Symantec Internet security threat report","datePublished":"2005-10-05T17:35:00+00:00","dateModified":"2007-06-11T20:22:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm"},"wordCount":483,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Internet","Security","Symantec"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm","name":"The Symantec Internet security threat report - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2005-10-05T17:35:00+00:00","dateModified":"2007-06-11T20:22:35+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-internet-security-threat.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"The Symantec Internet security threat report"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":525,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/10\/symantec-and-veritas-after-merger.htm","url_meta":{"origin":521,"position":0},"title":"Symantec and Veritas &#8211; after the merger","author":"Mark Wilson","date":"Wednesday 5 October 2005","format":false,"excerpt":"Last December, I blogged about the merger between Symantec and Veritas. Then, a couple of weeks ago, I got the chance to see Mark Seager, Symantec's VP Technology (EMEA), present about the new organisation. Apologies if what follows appears to be a marketing plug for Symantec, but bear in mind\u2026","rel":"","context":"In \"Symantec\"","block_context":{"text":"Symantec","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/symantec"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1533,"url":"https:\/\/www.markwilson.co.uk\/blog\/2009\/09\/how-much-is-your-personal-information-worth.htm","url_meta":{"origin":521,"position":1},"title":"How much is your personal information worth?","author":"Mark Wilson","date":"Tuesday 22 September 2009","format":false,"excerpt":"We've all heard the horror stories about personal information, such as credit card details, falling into the wrong hands and, thankfully, in many cases the banking system limits the damage but it's a growing problem. Now Symantec have issued the results of some research which shows that this information may\u2026","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3968,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/05\/windows-file-copy-issues-with-symantec-endpoint-protection-on-windows-7.htm","url_meta":{"origin":521,"position":2},"title":"File copy issues with Symantec Endpoint Protection on Windows 7","author":"Mark Wilson","date":"Monday 21 May 2012","format":false,"excerpt":"I've been trying to copy some files from my work PC to my home PC. That should be straightforward enough - after all they are both running Windows 7 (x64) with all current updates installed - but I frequently found that Windows Explorer would hang in the middle of a\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/file-copy-error.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":737,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/password-to-remove-symantec-antivirus.htm","url_meta":{"origin":521,"position":3},"title":"Password to remove Symantec AntiVirus","author":"Mark Wilson","date":"Friday 9 March 2007","format":false,"excerpt":"I'm just in the process of installing Microsoft Windows Live OneCare on my Mum's laptop but first of all I needed to remove Symantec AntiVirus 8 Corporate Edition. I had some trouble though as it needed a password for removal and the password I use for managing the anti-virus infrastructure\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":47,"url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/12\/symantec-and-veritas-to-merge.htm","url_meta":{"origin":521,"position":4},"title":"Symantec and Veritas to merge","author":"Mark Wilson","date":"Tuesday 21 December 2004","format":false,"excerpt":"December seems to be the month for high-profile corporate takeovers in the IT world! A couple of weeks back IBM sold its PC business. Then last week Microsoft bought an anti-spyware company. Now I've read that Symantec and Veritas are to merge in a $13.5bn deal. I regularly recommend Veritas'\u2026","rel":"","context":"In \"Symantec\"","block_context":{"text":"Symantec","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/symantec"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":81,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm","url_meta":{"origin":521,"position":5},"title":"Spyware re-enforces the need for network segmentation and remediation","author":"Mark Wilson","date":"Thursday 31 March 2005","format":false,"excerpt":"There is no doubt that malicious software (malware) is on the increase. We have learnt how to deal with the ever increasing number of viruses, worms and Trojan horses, but spyware is now a major problem too. Earlier this month, it was widely reported how a joint investigation by law\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=521"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/521\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}