The report comes from Specops Software, which analyzed the CSIS data as part of a study on global cyber crime. According to the report, the techniques most commonly used for these attacks include DoS, SQL Injection, MitM and Phishing. It’s not immediately clear as to how many of them were state-sponsored and how many related to corporate espionage.
Passionate techie. Professional tech writer. Proud geek.