1. Symantec, 2014 Internet Security Threat Report, Volume 19 (2014). https://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf . Accessed 13 Apr 2015.
2. Cisco, 2014 Annual Security Report (2014). http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf . Accessed 13 Apr 2015.
3. Sophos, Security Threat Report 2014 (2014). http://www.sophos.com/en-us/medialibrary/pdfs/other/sophos-security-threat-report-2014.pdf . Accessed 13 Apr 2015.
4. Symantec, 2014 Internet Security Threat Report, Volume 19, Appendix (2014). https://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_appendices_v19_221284438.en-us.pdf . Accessed 13 Apr 2015.
5. Symantec, 2015 Internet Security Threat Report, Volume 20 (2015). http://know.symantec.com/LP=1123 . Accessed 15 Apr 2015.