{"id":15,"date":"2011-01-21T17:58:14","date_gmt":"2011-01-21T17:58:14","guid":{"rendered":"http:\/\/www.digitalundercurrents.com\/blog\/?p=15"},"modified":"2011-01-21T17:58:14","modified_gmt":"2011-01-21T17:58:14","slug":"ciscos-2010-report","status":"publish","type":"post","link":"http:\/\/www.digitalundercurrents.com\/blog\/?p=15","title":{"rendered":"Cisco&#8217;s 2010 Report"},"content":{"rendered":"<p>Cisco&#8217;s <a href=\"http:\/\/www.cisco.com\/en\/US\/prod\/collateral\/vpndevc\/security_annual_report_2010.pdf\">report on security trends from last calendar year<\/a> [Warning: PDF File] has been released, and it&#8217;s an interesting read. Among the highlights:<\/p>\n<ul>\n<li>An increase in attacks targeting iOS and other mobile platforms. In the past, desktop and server Windows operating systems were the main target of attackers; it appears that they are now after the sensitive information on mobile devices as well.<\/li>\n<li>An uptick in the use of Java as a mechanism for exploits, both as a language for writing tools and the JRE as a target.<\/li>\n<li>For the first time in memory, global spam volumes were actually down this year (though the volume did increase in Europe)<\/li>\n<\/ul>\n<p>If you&#8217;re interested in the current global landscape in information security, this report is definitely worth a quick read.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco&#8217;s report on security trends from last calendar year [Warning: PDF File] has been released, and it&#8217;s an interesting read. Among the highlights: An increase in attacks targeting iOS and other mobile platforms. In the past, desktop and server Windows operating systems were the main target of attackers; it appears that they are now after [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/15","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15"}],"version-history":[{"count":0,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/15\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}