SHARE
Facebook X Pinterest WhatsApp

Why Taking the Right Security Measures Matters

Security measures More Vulnerabilities Than Ever The Common Vulnerabilities and Exposures (CVE) system reported about 9,400 new vulnerabilities, with two-thirds of them involving networks. More Unique Attacks Than Ever Of 1.7 trillion attacks made against intrusion prevention systems, 37 million of them were unique. That’s a 100% increase from 2013. Most Common Exploits The Nuclear, […]

Written By
thumbnail Michael Vizard
Michael Vizard
Apr 23, 2015
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Security measures

1 - More Vulnerabilities Than EverMore Vulnerabilities Than Ever

The Common Vulnerabilities and Exposures (CVE) system reported about 9,400 new vulnerabilities, with two-thirds of them involving networks.

2 - More Unique Attacks Than EverMore Unique Attacks Than Ever

Of 1.7 trillion attacks made against intrusion prevention systems, 37 million of them were unique. That’s a 100% increase from 2013.

3 - Most Common ExploitsMost Common Exploits

The Nuclear, Angler and Magnitude exploit kits together form almost 90% of the “in the wild” exploit kits. The Angler exploit kit is the most prevalent—accounting for approximately 60% of all exploit kits.

4 - Number of Malware AttacksNumber of Malware Attacks

Dell puts the number of malware attacks at 4.2 billion. Dell also reports 88 trillion hits for application traffic and 45 billion hits for post-infection malware activity.

5 - Point-of-Sale Systems Under AttackPoint-of-Sale Systems Under Attack

Dell SonicWALL created 13 POS malware signatures in 2014, compared with just three signatures in 2013, a 333% increase in the number of new POS malware countermeasures developed and deployed.

6 - Embedded Systems Are Being TargetedEmbedded Systems Are Being Targeted

In 2014, Dell saw a twofold increase in SCADA (supervisory control and data acquisition) attacks, compared with 2013. Buffer-flow vulnerabilities continue to be the primary vehicle of attack.

7 - Impact of HeartbleedImpact of Heartbleed

The Heartbleed buffer over-read vulnerability, disclosed in April 2014, potentially affected about 17% (about 500,000) of the secure Web servers on the Internet.

8 - Zero-Day Vulnerabilities DiscoveredZero-Day Vulnerabilities Discovered

Well-known zero-day vulnerabilities were released, with Shellshock vulnerabilities exploited by attackers within hours of the initial disclosure on Sept. 24, 2014. Within a week, millions of attacks and probes per day were observed.

9 - Encrypted Connections on the RiseEncrypted Connections on the Rise

Dell saw a 109% increase in the volume of HTTPS Web connections from the start of 2014 to the start of 2015. Trouble is, hackers are starting to hide malware by embedding it in encrypted connections.

thumbnail Michael Vizard

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a writer for publications including Programmableweb, IT Business Edge, CIOinsight, Channel Insider and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs
Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite
Jordan Smith
Aug 13, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.