SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
akamai’s [state of the internet] / security
Q1 2015 State of the Internet Security Report — Website Defacement
Selected excerpts
Akamai’s Q1 2015 State of the Internet Security Reports highlights one type of attack
notably observed this year – forms of website defacement and hijacking. By exploiting
vulnerabilities in website hosting, attackers can replace the content normally shown on a
website, or redirect users to other websites, to show the attackers’ content – for a wide
array of malicious intent. However, these attacks can be defended against or avoided.
Website Defacement
Hundreds of companies sell server hosting, where many accounts pay to host websites on
that company's servers. With many domains and sites being hosted on the same server, the
chance that at least one of those sites is vulnerable to file uploading attacks is very high -
and if the server is not properly secure in preventing accounts from accessing files outside
of their assigned directory, then an attacker can leverage that one compromised website to
gain access to other accounts
on the host server.
First, an attacker gains a
foothold on the server,
searching for sites with
vulnerable software through
tools as simple as Google
search. Once they find
software with vulnerabilities
that they can exploit for file
uploading, the attacker can
install scripts that allow
them to view and traverse the server's directory structure, looking for lists of account
names and passwords they can use to gain access to other websites. Once the attacker has
acquired a large quantity of account credentials, a mass defacement script is used to
automatically gain access to each account, replace the target files with their own, and move
on to the next website - systematically defacing potentially hundreds of websites in a single
stroke.
Domain Hijacking
These attacks can often be prevented by using better protections for web server security.
However, early in Q1, Akamai observed a form of attack that could bypass server security
entirely. Domain hijacking allows malicious actors to alter the DNS records for a website, so
that requests to look up that website point to a server of the attacker's choice.
Figure 1: One defaced website served up pro-ISIS materials
akamai’s [state of the internet] / security
The attack works through spear-phishing attempts on IT, finance, human resources, and
other staff who may have access to domain registration accounts. Very often, access is
gained by phishing email credentials from the site's domain administrator. With these
credentials, the attacker can perform a password reset on the registrar's site, thereby
obtaining administrative access and a password. The malicious actor can then log in to the
registrar and make changes to name server (NS) records for both web and email servers,
redirecting traffic from this domain to an IP address the attackers control. NS record
updates may often take 24 to 48 hours to go through, so the effects of this attack can last
for a considerable time before site administrators are able to revert the changes.
Get the full Q1 2015 State of the Internet — Security Report with all the details,
including defense and protective measures
Each quarter Akamai produces a quarterly Internet security report. Download the Q1 2015
State of the Internet —Security Report for:
• Analysis of DDoS and web application attack trends
• Bandwidth (Gbps) and volume (Mpps) statistics
• Year-over-year and quarter-by-quarter analysis
• Attack frequency, size, types and sources
• Security implcations of the transition to IPV6
• Mitigating the risk of website defacement and domain hijacking
• DDoS techniques that maximize bandwidth, including booter/stresser sites
• Analysis of SQL injection attacks as a persistent and emerging threat
The more you know about web security, the better you can protect your network against
cybercrime. Download the free the Q1 2015 State of the Internet — Security Report
at http://www.stateoftheinternet.com/security-reports today.
About stateoftheinternet.com
StateoftheInternet.com, brought to you by Akamai, serves as the home for content and
information intended to provide an informed view into online connectivity and
cybersecurity trends as well as related metrics, including Internet connection speeds,
broadband adoption, mobile usage, outages, and cyber-attacks and threats. Visitors
to stateoftheinternet.com can find current and archived versions of Akamai’s State of the
Internet (Connectivity and Security) reports, the company’s data visualizations, and other
resources designed to help put context around the ever-changing Internet landscape.

Más contenido relacionado

Destacado

Cyber Crime, Norton Cybercrime Report 2011, Hacktivism, Anonymous
Cyber Crime, Norton Cybercrime Report 2011, Hacktivism, AnonymousCyber Crime, Norton Cybercrime Report 2011, Hacktivism, Anonymous
Cyber Crime, Norton Cybercrime Report 2011, Hacktivism, AnonymousMelvin Jáquez
 
Intelligent automated malware analysis
Intelligent automated malware analysisIntelligent automated malware analysis
Intelligent automated malware analysistxalin
 
ithink 2009 - O fim do digital que eu vi em Cannes (e vejo todos os dias)
ithink 2009 - O fim do digital que eu vi em Cannes (e vejo todos os dias)ithink 2009 - O fim do digital que eu vi em Cannes (e vejo todos os dias)
ithink 2009 - O fim do digital que eu vi em Cannes (e vejo todos os dias)Marcelo Tripoli
 
ELISHA 2 - 4PM AFTERNOON SERVICE - PTR. RICHARD NILLO
ELISHA 2 - 4PM AFTERNOON SERVICE - PTR. RICHARD NILLOELISHA 2 - 4PM AFTERNOON SERVICE - PTR. RICHARD NILLO
ELISHA 2 - 4PM AFTERNOON SERVICE - PTR. RICHARD NILLOFaithworks Christian Church
 
Crédit immobilier perspectives 2016
Crédit immobilier   perspectives 2016Crédit immobilier   perspectives 2016
Crédit immobilier perspectives 2016Empruntis
 
Tugas etika presentasi
Tugas etika presentasiTugas etika presentasi
Tugas etika presentasiadityaikhsan
 
la 2° presentación de power point
la 2° presentación de power pointla 2° presentación de power point
la 2° presentación de power pointsolanamartinicorena
 

Destacado (9)

Cyber Crime, Norton Cybercrime Report 2011, Hacktivism, Anonymous
Cyber Crime, Norton Cybercrime Report 2011, Hacktivism, AnonymousCyber Crime, Norton Cybercrime Report 2011, Hacktivism, Anonymous
Cyber Crime, Norton Cybercrime Report 2011, Hacktivism, Anonymous
 
Intelligent automated malware analysis
Intelligent automated malware analysisIntelligent automated malware analysis
Intelligent automated malware analysis
 
ithink 2009 - O fim do digital que eu vi em Cannes (e vejo todos os dias)
ithink 2009 - O fim do digital que eu vi em Cannes (e vejo todos os dias)ithink 2009 - O fim do digital que eu vi em Cannes (e vejo todos os dias)
ithink 2009 - O fim do digital que eu vi em Cannes (e vejo todos os dias)
 
ELISHA 2 - 4PM AFTERNOON SERVICE - PTR. RICHARD NILLO
ELISHA 2 - 4PM AFTERNOON SERVICE - PTR. RICHARD NILLOELISHA 2 - 4PM AFTERNOON SERVICE - PTR. RICHARD NILLO
ELISHA 2 - 4PM AFTERNOON SERVICE - PTR. RICHARD NILLO
 
Vernetzte, selbstorganisierte und flexible Personaleinsatzplanung für eine ef...
Vernetzte, selbstorganisierte und flexible Personaleinsatzplanung für eine ef...Vernetzte, selbstorganisierte und flexible Personaleinsatzplanung für eine ef...
Vernetzte, selbstorganisierte und flexible Personaleinsatzplanung für eine ef...
 
Crédit immobilier perspectives 2016
Crédit immobilier   perspectives 2016Crédit immobilier   perspectives 2016
Crédit immobilier perspectives 2016
 
Tugas etika presentasi
Tugas etika presentasiTugas etika presentasi
Tugas etika presentasi
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
la 2° presentación de power point
la 2° presentación de power pointla 2° presentación de power point
la 2° presentación de power point
 

Último

NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...Amil Baba Dawood bangali
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...Amil baba
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作f3774p8b
 
萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程1k98h0e1
 
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 
the cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxthe cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxLeaMaePahinagGarciaV
 
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一C SSS
 
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证gwhohjj
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)861c7ca49a02
 
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
Hindu amil baba kala jadu expert in pakistan islamabad lahore karachi atar ...
Hindu amil baba kala jadu expert  in pakistan islamabad lahore karachi atar  ...Hindu amil baba kala jadu expert  in pakistan islamabad lahore karachi atar  ...
Hindu amil baba kala jadu expert in pakistan islamabad lahore karachi atar ...amilabibi1
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一C SSS
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubaikojalkojal131
 
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree z zzz
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作ss846v0c
 
existing product research b2 Sunderland Culture
existing product research b2 Sunderland Cultureexisting product research b2 Sunderland Culture
existing product research b2 Sunderland CultureChloeMeadows1
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一diploma 1
 

Último (20)

NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作
 
萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程
 
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 
the cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxthe cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptx
 
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
 
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
 
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
Hindu amil baba kala jadu expert in pakistan islamabad lahore karachi atar ...
Hindu amil baba kala jadu expert  in pakistan islamabad lahore karachi atar  ...Hindu amil baba kala jadu expert  in pakistan islamabad lahore karachi atar  ...
Hindu amil baba kala jadu expert in pakistan islamabad lahore karachi atar ...
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一
 
young call girls in Khanpur,🔝 9953056974 🔝 escort Service
young call girls in  Khanpur,🔝 9953056974 🔝 escort Serviceyoung call girls in  Khanpur,🔝 9953056974 🔝 escort Service
young call girls in Khanpur,🔝 9953056974 🔝 escort Service
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
 
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
 
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Serviceyoung call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
 
existing product research b2 Sunderland Culture
existing product research b2 Sunderland Cultureexisting product research b2 Sunderland Culture
existing product research b2 Sunderland Culture
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
 

Website Defacement & Domain Hijacking on the Rise: Cloud Security Threat – State of the Internet

  • 1. akamai’s [state of the internet] / security Q1 2015 State of the Internet Security Report — Website Defacement Selected excerpts Akamai’s Q1 2015 State of the Internet Security Reports highlights one type of attack notably observed this year – forms of website defacement and hijacking. By exploiting vulnerabilities in website hosting, attackers can replace the content normally shown on a website, or redirect users to other websites, to show the attackers’ content – for a wide array of malicious intent. However, these attacks can be defended against or avoided. Website Defacement Hundreds of companies sell server hosting, where many accounts pay to host websites on that company's servers. With many domains and sites being hosted on the same server, the chance that at least one of those sites is vulnerable to file uploading attacks is very high - and if the server is not properly secure in preventing accounts from accessing files outside of their assigned directory, then an attacker can leverage that one compromised website to gain access to other accounts on the host server. First, an attacker gains a foothold on the server, searching for sites with vulnerable software through tools as simple as Google search. Once they find software with vulnerabilities that they can exploit for file uploading, the attacker can install scripts that allow them to view and traverse the server's directory structure, looking for lists of account names and passwords they can use to gain access to other websites. Once the attacker has acquired a large quantity of account credentials, a mass defacement script is used to automatically gain access to each account, replace the target files with their own, and move on to the next website - systematically defacing potentially hundreds of websites in a single stroke. Domain Hijacking These attacks can often be prevented by using better protections for web server security. However, early in Q1, Akamai observed a form of attack that could bypass server security entirely. Domain hijacking allows malicious actors to alter the DNS records for a website, so that requests to look up that website point to a server of the attacker's choice. Figure 1: One defaced website served up pro-ISIS materials
  • 2. akamai’s [state of the internet] / security The attack works through spear-phishing attempts on IT, finance, human resources, and other staff who may have access to domain registration accounts. Very often, access is gained by phishing email credentials from the site's domain administrator. With these credentials, the attacker can perform a password reset on the registrar's site, thereby obtaining administrative access and a password. The malicious actor can then log in to the registrar and make changes to name server (NS) records for both web and email servers, redirecting traffic from this domain to an IP address the attackers control. NS record updates may often take 24 to 48 hours to go through, so the effects of this attack can last for a considerable time before site administrators are able to revert the changes. Get the full Q1 2015 State of the Internet — Security Report with all the details, including defense and protective measures Each quarter Akamai produces a quarterly Internet security report. Download the Q1 2015 State of the Internet —Security Report for: • Analysis of DDoS and web application attack trends • Bandwidth (Gbps) and volume (Mpps) statistics • Year-over-year and quarter-by-quarter analysis • Attack frequency, size, types and sources • Security implcations of the transition to IPV6 • Mitigating the risk of website defacement and domain hijacking • DDoS techniques that maximize bandwidth, including booter/stresser sites • Analysis of SQL injection attacks as a persistent and emerging threat The more you know about web security, the better you can protect your network against cybercrime. Download the free the Q1 2015 State of the Internet — Security Report at http://www.stateoftheinternet.com/security-reports today. About stateoftheinternet.com StateoftheInternet.com, brought to you by Akamai, serves as the home for content and information intended to provide an informed view into online connectivity and cybersecurity trends as well as related metrics, including Internet connection speeds, broadband adoption, mobile usage, outages, and cyber-attacks and threats. Visitors to stateoftheinternet.com can find current and archived versions of Akamai’s State of the Internet (Connectivity and Security) reports, the company’s data visualizations, and other resources designed to help put context around the ever-changing Internet landscape.