Skip to main content

Cyber Crime Strides In Lockstep With Security


Information Security made great strides last year.

Sadly, so did cyber crime.

In the U.S. ? according to a recent FBI study ? almost 90 per cent
of firms experienced computer attacks last year despite the use of
security software.

So what happened in 2005?

In a year when rootkits went mainstream and malware went criminal,
information security improved.

There was no global pandemic like the Slammer or Blaster worm
juggernaut. There was no malware with a replication magnitude of the
order of Code Red, Slammer, Nimda, or the Iloveyou virus. With the
notable exception of PHP worms, even the Linux side had fewer popular
viruses and worms.

Patching got easier. Not only did more and more sophisticated patch
management tools arrive from every sector, but there were fewer patches
to deploy. Administrators got better at blocking hackers and malware.
And end users don't click on every file attachment they receive.

But security onslaughts attain greater significance as the year saw the
metamorphosis of cyber malice into a highly organized and sophisticated
international crime syndicate, where the likes of ?phishing? and
?spamming? have gone through drastic evolution.

Eighty-seven per cent of the more than 2,000 public and private
enterprises that took part in the FBI survey said that they had
undergone one or the other kind of security attack. Virus, spyware and
adware top the list where a significant amount of businesses faced
systems and data sabotage. One third of the companies detected port
scans of their systems, a method used by attackers to identify
vulnerable PCs to sneak in, the survey said.

A staggering 98 per cent of survey respondents said they used antivirus
software, of which nearly 84 per cent still suffered a virus attack.

According to U.S.?based security and communications software vendor
MicroWorld Technologies Inc. in Farmington Hills, Mich., many antivirus
software products fail to prevent virus attacks because they work in a
reactive way with known virus signatures, and hence cannot take on
newer threats. Enterprises must revaluate the kind of technology and
effectiveness of many leading antivirus and security software they use.

The stuff that is getting by our defenses is more dangerous: Malware
went criminal. Most of today's malware exists to steal confidential
information, send spam, or steal identities. Now, malware is getting
harder to remove, hiding better, and contains more tricks and exploits
than ever.

IT managers and system administrators reported spyware and viruses were
the most common problem, followed by port scans, sabotage of data or
networks, and adult pornography. While not necessarily illegal, adult
pornography is against the policy of most organizations, the study
noted.

More than 50 per cent of hacking attempts came from within the U.S. and
from China, as many organizations were able to trace where intrusion
attempts originated. But hackers are using computers that are under
their control but located in other countries, combined with the use of
proxies to make detection more difficult.

The FBI said a Romanian hacker could use a proxy computer in China to
gain access to a compromised computer in the U.S., leading to a false
conclusion that the attack originated in the U.S.

Antivirus software is widely used, and most organizations also have
firewalls in place, the survey said. But 44 per cent reported that
intrusions came from within their own organizations, and "this is a
strong indicator that internal controls are extremely important and
should not be underemphasized while concentrating efforts on deterring
outside hackers," the FBI said.

Nearly two-thirds of those surveyed had implemented event logging on
their network, a measure the FBI said is a crucial element in tracking
crime. And half of those stored the logs on a remote protected server.

Comments

Popular posts from this blog

How to Hack a Website in Four Easy Steps

Every wondered how Anonymous and other hacktivists manage to steal the data or crash the servers of websites belonging to some of the world biggest organisations? Thanks to freely available online tools, hacking is no long the  preserve of geeks , so we've decided to show you how easy it is to do, in just four easy steps. Step 1: Identify your target While  Anonymous  and other online hacktivists may choose their targets in order to protest against perceived wrong-doing, for a beginner wanting to get the taste of success with their first hack, the best thing to do is to identify a any website which has a vulnerability. Recently a hacker posted a list of 5,000 websites online which were vulnerable to attack. How did he/she identify these websites? Well, the key to creating a list of websites which are likely to be more open to attack, is to carry out a search for what is called a Google Dork. Google Dorking , also known as Google Hacking, enables you find sen

How to Hack Facebook Password in 5 Ways

Check out the following post from  fonelovetz blog  on facebook account hacking. This is one of the most popular questions which I'm asked via my email.And today I'm going to solve this problem one it for all.Even though i have already written a few ways of hacking a facebook password.Looks like i got to tidy up the the stuff here.The first thing i want to tell is.You can not hack or crack a facebook password by a click of a button.That's totally impossible and if you find such tools on the internet then please don't waste your time by looking at them! They are all fake.Ok now let me tell you how to hack a facebook account. I'll be telling you 5 of the basic ways in which a beginner hacker would hack.They are: 1.Social Engineering 2.Keylogging 3.Reverting Password / Password Recovery Through Primary Email 4.Facebook Phishing Page/ Softwares 5.Stealers/RATS/Trojans I'll explain each of these one by one in brief.If you want to know more about them just

How to Hack Someone's Cell Phone to Steal Their Pictures

Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent those "candid" photos to your ex, with a little effort and access to public information, your pictures can be snagged, too. Here's how. Cloud Storage Apple's iCloud service provides a hassle free way to store and transfer photos and other media across multiple devices. While the commercial exemplifies the G-rated community of iPhone users, there are a bunch of non-soccer moms that use their iPhones in a more..."free spirited" mindset. With Photo Stream enabled (requires OS X Lion or later, iOS 5 or later), pictures taken on your iPhone go to directly to your computer and/or tablet, all while being stored in the cloud. If you think the cloud is safe, just ask Gizmodo

How to Hack Samsung Phone Screen Lock

I have discovered  another  security flaw in Samsung Android phones. It is possible to completely disable the lock screen and get access to any app - even when the phone is "securely" locked with a pattern, PIN, password, or face detection. Unlike another recently released flaw, this doesn't rely quite so heavily on ultra-precise timing. Video . Of course, if you are unable to download a screen unlocker, this security vulnerability still allows you to  dial any phone number and run any app ! HOWTO From the lock screen, hit the emergency call button. Dial a non-existent emergency services number - e.g. 0. Press the green dial icon. Dismiss the error message. Press the phone's back button. The app's screen will be briefly displayed. This is just about long enough to interact with the app. Using this, you can run and interact with any app / widget / settings menu. You can also use this to launch the dialler. From there, you can dial any phone