Global Threat Report, March 2012
Sizing Up the BYOD Security Challenge. Java Holes and Targeted Attacks. Gender and the Success of Suspicious Links. AMTSO, Testing, and ESET’s Dutch Treat. The Top Ten Threats. Top Ten Threats at a Glance (graph).
Global_Threat_Trends_March_2012.pdf