
Security Threat Report 2013
In 2012, we saw attackers extend their reach to more platforms, from social networks and cloud services to Android mobile devices. We saw the most sophisticated malware authors up the stakes with new business models and software paradigms while conventional attackers continued to target thousands of badly-configured websites to deliver malware. What does 2013 hold?
