This statistic represents malware functionality within global industrial cyber espionage incidents in 2014. During the survey period, it was found that 39.9 percent of cyber espionage incidents involving malware could be traced back to e-mail attachments.
Malware installation vectors within global industrial cyber espionage incidents in 2014
Characteristic
Percentage of cyber espionage incidents with malware installations
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
Verizon. (April 14, 2015). Malware installation vectors within global industrial cyber espionage incidents in 2014 [Graph]. In Statista. Retrieved November 22, 2024, from https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/
Verizon. "Malware installation vectors within global industrial cyber espionage incidents in 2014." Chart. April 14, 2015. Statista. Accessed November 22, 2024. https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/
Verizon. (2015). Malware installation vectors within global industrial cyber espionage incidents in 2014. Statista. Statista Inc.. Accessed: November 22, 2024. https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/
Verizon. "Malware Installation Vectors within Global Industrial Cyber Espionage Incidents in 2014." Statista, Statista Inc., 14 Apr 2015, https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/
Verizon, Malware installation vectors within global industrial cyber espionage incidents in 2014 Statista, https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/ (last visited November 22, 2024)
Malware installation vectors within global industrial cyber espionage incidents in 2014 [Graph], Verizon, April 14, 2015. [Online]. Available: https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/