As I don't like duplication of the post, the detail explanation of the graph can be found at security.org.my here.
Cheers ;]