Executive Summary'Key Findings -In 2012, software vulnerabilities were reported publicly by research organizations. -Software vulnerabilities form the basis of cyber attacks that resulted in more than major security breaches reported in 2012. -Furthermore, million new malicious software programs (also called 'malware') were identified in 2012. Malware also benefits from vulnerable computing systems. -Vulnerability research represents an invaluable security service considering the billions of dollars lost in data security breaches. -Hackers targeting media applications, business applications, and content management platforms accounted for % of reported vulnerabilities. -Individuals were responsible for % of vulnerabilities reported in 2012. This group was followed by security vendors, government entities, education institutions, and manufacturers, respectively. -The top targeted applications in 2012 were Mozilla Firefox, Apple QuickTime, and Microsoft Internet Explorer. -In 2012, Th...