Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Report: Cybercriminals now more ambitious
by Staff Writers
Washington (UPI) Apr 6, 2011


disclaimer: image is for illustration purposes only

Criminal gangs and criminally minded individuals acting on their own are becoming more ambitious and sophisticated as they target increasing numbers of computer users in homes and offices, data collected for a global survey of trends and risks indicated.

Added to that growing threat was the rise of campaigning hackers who attacked major Web sites including banks that withdrew support to WikiLeaks during the controversy over its publication of U.S. diplomatic cables and subsequent arrest of WikiLeaks founder Julian Assange, said the X-Force 2010 Trend and Risk Report, released by International Business Machines Corp.

The IBM X-Force Report reveals three main threats that demonstrate how attackers increasingly targeted people using the Internet for monetary gain or data theft.

The number of malicious Web links has skyrocketed globally in the past year.

Phishing activity, in which an attacker attempts to acquire sensitive information by masquerading as a legitimate organization, also increased dramatically.

Vulnerability disclosures for document readers and editors continued to soar, specifically with Portable Document Format documents.

The severity of cyberthreats in 2010 was indicated by IBM experts identifying "8,000 new vulnerabilities that did not exist in 2009," said the report.

"From a security standpoint, 2010 is most remembered as a year marked by some of the most high-profile, targeted attacks that the industry has ever witnessed," said the report.

IBM analyzed data from 4.7 trillion security events over the course of 2010 -- about 150,000 every second.

Phishing, involving identity theft mainly for financial gain, gave way to "spear phishing" -- e-mail spoofing fraud attempts that target a specific organization, seeking unauthorized access to confidential data.

As with the e-mail messages used in regular phishing attacks, spear phishing messages appear to come from a trusted source, such as an individual within the recipient's own company or someone in a position of authority.

"The numerous, high-profile targeted attacks in 2010 shed light on a crop of highly sophisticated cybercriminals, who may be well-funded and operating with knowledge of security vulnerabilities that no one else has," Tom Cross, threat intelligence manager for IBM's X-Force, said in a news release.

"From Stuxnet to Zeus Botnets to mobile exploits, a widening variety of attack methodologies is popping up each day," he said.

IBM said the evolving activity of the online underworld had alerted the electronic security industry to the phenomenon of cyber criminals becoming more ambitious with their attacks.

"Cybercriminals are graduating from stealing credit cards and banking credentials to targeting corporate plans and proprietary information," said Graham Titterington in a report for Ovum PLC, which provides consulting, research and analysis services for technology, telecommunications and business sectors.

No longer satisfied with online retail scams and identity theft, hackers are going after data supporting key infrastructures such as stock exchanges and industrial facilities, which tend to be more lucrative targets.

As smartphones and tablets find their way into the hands of virtually every business executive across every industry, hackers are shifting focus to mobile platforms as a way of accessing that data.

IBM said that in 2010 it documented increases in the volume of vulnerabilities disclosed in mobile devices as well as the disclosure of exploits that target them.

IBM said nearly 44 percent of all vulnerabilities remain unpatched and continue to be exploited long after their existence has been made public.

"Even if those security holes are promptly closed, the rapidly evolving state of cybercrime means hackers will simply make new holes and gain access through them," the report warned.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Cyberwar Between US And China In 2020
Houston TX (SPX) Mar 29, 2011
As Iran's nuclear plant attack and Chinese-based hackers attacking Morgan Stanley demonstrate how the Internet can wreak havoc on business and governments, a new paper by a fellow at Rice University's Baker Institute for Public Policy hypothesizes what an all-out cyberwar between the U.S. and China might look like. To date, the cyberattacks in East Asia have been relatively benign, said Ch ... read more


CYBER WARS
84 Teams To Compete In NASA Great Moonbuggy Race

A New View Of Moon

Super Full Moon

LRO Delivers Treasure Trove Of Data

CYBER WARS
Mars In Spain

Study Of 'Ruiz Garcia' Rock Completed

Next Mars Rover Gets A Test Taste Of Mars Conditions

Alternatives Have Begun In Bid To Hear From Spirit

CYBER WARS
Branson unveils 'flying' sub to plumb ocean depths

Russia And US To Discuss Nuke-Powered Spaceship Project

Getting To Mars Means Stopping And Landing

Aerojet Propulsion Assists Voyager 1 Precision Maneuver At The Edge Of The Solar System

CYBER WARS
What Future for Chang'e-2

China setting up new rocket production base

China's Tiangong-1 To Be Launched By Modified Long March II-F Rocket

China Expects To Launch Fifth Lunar Probe Chang'e-5 In 2017

CYBER WARS
Space Debris No Threat To ISS

Astronauts head to ISS on spaceship Gagarin

Station Fires Engines To Avoid Orbital Debris

Successful First Mission For Aerospace Breakup Recorder

CYBER WARS
SpaceX Antes Up With Falcon Heavy

India's GSAT-8 Delivered To French Guiana

SpaceX unveils heavy launcher

ILS And Melco Announce Contract For Launch Of Turksat Satellites

CYBER WARS
White Dwarfs Could Be Fertile Ground For Other Earths

NASA Announces 2011 Carl Sagan Fellows

Report Identifies Priorities For Planetary Science 2013-2022

Planetary Society Statement On Planetary Science Decadal Survey For 2013-2022

CYBER WARS
Japan stems uncontrolled leak from nuclear plant

Facebook launches page for journalists

Radioactive water leak into sea stops at Fukushima: Jiji

Reppler helps Facebook users look good online




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement