Statistics about Internet in Worldwide
Statistics
- Global human cyber security pressures 2018
- Leading BEC e-mail providers worldwide H2 2020
- Cybersquatting: WIPO domain name case dispute filings 2000-2024 YTD
- Adults worldwide letting friends/family to use their work device 2022, by activity
- Top TLDs for domains selling counterfeit goods 2018
- Malicious e-mail rates worldwide 2018, by country
- Share of countries with national CIRT 2018
- Monthly cyber attacks on global mobile users worldwide 2020-2022
- Volume of detected mobile malware packages as of Q3 2023
- Number of new web vulnerabilities 2006-2015
- Leading Windows malware strains 2019
- TLDs used for phishing 2012-2016
- Countries with the highest malware infection rate 2016
- Countries with the lowest malware infection rate 2016
- Leading macOS malware strains 2019
- Percentage of spam with ransomware attachments 2015-2016
- Malware: encounter and detection rate in selected markets 2016
- Ransomware families encrypting business-related files in 2016, by type
- Impacts of device theft or loss worldwide 2015
- Distribution of malware detections Q1 2020, by OS
- Common IT vulnerabilities and exposures worldwide 2009-2024
- Global average information security tenure 2013-2015, by gender
- Average age of information security workforce 2013-2015, by gender
- Global information security workforce 2013-2015, by gender
- Share of countries with government cyber security training 2018
- Global opinion on groups that hacktivists hold accountable 2015
- Small-to-medium business (SMB) IT security threat defense 2014-2016
- Development of Android malware worldwide 2016-2020
- Most prevalent malware file extensions worldwide 2017
- Likelihood of using key cyber threat defenses worldwide 2017, by organization size
- Daily spam volume worldwide 2012-2014
- Distribution of malware types worldwide 2019
- Number of unique malware variants added per year 2014-2018
- Effects of harmful online contact worldwide 2022, by gender
- Global personal cyber security pressures 2017
- Opinions on online abuse directed at women worldwide 2022
- Global malicious e-mail rate 2018, by industry
- Distribution of mobile malware worldwide Q2 2023 - Q3 2023, by type
- Share of firms transferring data from the EU 2021
- Share of global adults who trust public Wi-Fi networks to keep info safe 2019
- Leading malicious spam types worldwide 2017
- Distribution of Android malware 2019
- Spam: share of global e-mail traffic monthly 2014-2023
- Opinions on women's reactions to online messages worldwide February 2022, by country
- Global opinion on role of business and government in cyber security 2018
- Success factors to strengthen an organization's cyber security posture worldwide 2018
- Factors that could weaken an organization's cyber security posture worldwide 2018
- Frequency of cyber threats according to IT practitioners worldwide 2017, by type
- Greatest cyber threat risks according to IT practitioners worldwide 2017
- Cybersquatting: parties with most domain name case dispute filings 2018
- Leading e-mail malware worldwide in 2018
- Global CEO fraud volume 2017-2020
- Countries most targeted by Russian cyber attacks 2021-2022
- Most common subject lines in BEC e-mails worldwide Q1 2019
- Distribution of botnet spam 2014
- Leading countries based on global cyber security ranking (GCI) 2020
- Global spam categories 2020
- Leading cause of ransomware infection 2020
- Cybersquatting: most domain name case dispute filings 2018, by country
- Distribution of spoofed positions in BEC attempts detected in 2020
- Spam: share of global email traffic 2011-2023
- Global opinion on cyber security vulnerability 2018
- Countries most targeted by malicious mailshots 2023
- Internet threats to children 2015
- Internet threats to older relatives 2015
- Distribution of Windows malware 2019
- Factors of concern for global smartphone users 2020
- Most pressing cyber security issues according to infosec professionals worldwide 2018
- E-mail spam rate worldwide 2012-2018
- Harmful experiences of global smartphone users on mobile messaging platforms 2021
- Share of countries with cyber security legislation 2018
- Spam: most commonly filtered types 2013
- Dark web market price for stolen credentials 2019
- Share of companies collecting personal data 2021, by data subject region
- Top 10 countries for visits to piracy sites worldwide 2020-2021, per quarter
- Leading methods used for data transfer outside EU 2021
- Outcomes for organizations after ransom payments worldwide 2023
- Global opinions on cyber stalking 2021, by age group
- Business investment in select areas of cyber risk management worldwide 2019
- Global enterprise cyber attacks resulting in a breach 2021, by resilience level
- Failure rate in phishing simulations worldwide 2023, by type
- Global industries most targeted by phishing attempts 2021
- Global working adults understanding of basic e-mail security concepts 2022
- Global working adults understanding of advanced e-mail security concepts 2022
- Apps that should have the highest security for global consumers 2022, by category
- Password habits of online adults managing personal accounts 2021, by country
- Global users who would stop using apps when faced with selected cyber threats 2021
- Mobile users attitudes towards cyber security in mobile apps 2021
- Key cyberthreats related to the COVID-19 pandemic in 2020
- Effectiveness of cybersecurity-related actions in global organizations 2022
- Typical methods for storage of internet passwords 2015
- Password habits at work and at home of online adults worldwide 2022
- Password habits of online adults managing business accounts 2021, by country
- Internet accounts which need a secure password 2016
- Global industries most targeted by business email compromise (BEC) attempts 2021
- Likelihood of suffering a hacker attack 2021, by country
- Reaction of enterprises to data breaches worldwide 2021, by resilience level
- Global organizations affected by outsider cyber incidents 2021
- Global firms cyber insurance experiences after ransomware attacks 2022
- Global risky actions in cyber threat situations 2022