. Military Space News .
CYBER WARS
Report: Cybercriminals now more ambitious

disclaimer: image is for illustration purposes only
by Staff Writers
Washington (UPI) Apr 6, 2011
Criminal gangs and criminally minded individuals acting on their own are becoming more ambitious and sophisticated as they target increasing numbers of computer users in homes and offices, data collected for a global survey of trends and risks indicated.

Added to that growing threat was the rise of campaigning hackers who attacked major Web sites including banks that withdrew support to WikiLeaks during the controversy over its publication of U.S. diplomatic cables and subsequent arrest of WikiLeaks founder Julian Assange, said the X-Force 2010 Trend and Risk Report, released by International Business Machines Corp.

The IBM X-Force Report reveals three main threats that demonstrate how attackers increasingly targeted people using the Internet for monetary gain or data theft.

The number of malicious Web links has skyrocketed globally in the past year.

Phishing activity, in which an attacker attempts to acquire sensitive information by masquerading as a legitimate organization, also increased dramatically.

Vulnerability disclosures for document readers and editors continued to soar, specifically with Portable Document Format documents.

The severity of cyberthreats in 2010 was indicated by IBM experts identifying "8,000 new vulnerabilities that did not exist in 2009," said the report.

"From a security standpoint, 2010 is most remembered as a year marked by some of the most high-profile, targeted attacks that the industry has ever witnessed," said the report.

IBM analyzed data from 4.7 trillion security events over the course of 2010 -- about 150,000 every second.

Phishing, involving identity theft mainly for financial gain, gave way to "spear phishing" -- e-mail spoofing fraud attempts that target a specific organization, seeking unauthorized access to confidential data.

As with the e-mail messages used in regular phishing attacks, spear phishing messages appear to come from a trusted source, such as an individual within the recipient's own company or someone in a position of authority.

"The numerous, high-profile targeted attacks in 2010 shed light on a crop of highly sophisticated cybercriminals, who may be well-funded and operating with knowledge of security vulnerabilities that no one else has," Tom Cross, threat intelligence manager for IBM's X-Force, said in a news release.

"From Stuxnet to Zeus Botnets to mobile exploits, a widening variety of attack methodologies is popping up each day," he said.

IBM said the evolving activity of the online underworld had alerted the electronic security industry to the phenomenon of cyber criminals becoming more ambitious with their attacks.

"Cybercriminals are graduating from stealing credit cards and banking credentials to targeting corporate plans and proprietary information," said Graham Titterington in a report for Ovum PLC, which provides consulting, research and analysis services for technology, telecommunications and business sectors.

No longer satisfied with online retail scams and identity theft, hackers are going after data supporting key infrastructures such as stock exchanges and industrial facilities, which tend to be more lucrative targets.

As smartphones and tablets find their way into the hands of virtually every business executive across every industry, hackers are shifting focus to mobile platforms as a way of accessing that data.

IBM said that in 2010 it documented increases in the volume of vulnerabilities disclosed in mobile devices as well as the disclosure of exploits that target them.

IBM said nearly 44 percent of all vulnerabilities remain unpatched and continue to be exploited long after their existence has been made public.

"Even if those security holes are promptly closed, the rapidly evolving state of cybercrime means hackers will simply make new holes and gain access through them," the report warned.



Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


CYBER WARS
Google accuses China of blocking Gmail
Beijing (AFP) March 21, 2011
Google accused the Chinese government on Monday of interfering with its Gmail service, after weeks of online disruptions that have coincided with calls for protests emulating those in the Middle East. "There is no technical issue on our side - we have checked extensively. This is a government blockage carefully designed to look like the problem is with Gmail," Google said in a statement to ... read more







CYBER WARS
Israeli system intercepts Gaza rocket for first time

Netanyahu praises Israeli system intercepting Gaza rocket

Israel to deploy four more 'Iron Dome' anti-rocket defences

Israeli port city gets Iron Dome anti-rocket system

CYBER WARS
Taiwan inaugurates missile ships amid buildup vow

SLAMRAAM Intercepts Targets In Two Test Firings

US Navy Accomplishes Several Firsts During Operation Odyssey Dawn

Boeing Supports First Hellfire Test Launch From Avenger System

CYBER WARS
Northrop Grumman Ships First Broad Area Maritime Surveillance Fuselage

AeroVironment Global Observer Experiences Mishap During Extended Duration Flight Testing

Euro Hawk Undergoes Testing At Edwards AFB

Northrop Grumman Submits Final Proposal For NATO Alliance Ground Surveillance

CYBER WARS
Preparations Underway As US Army Gears Up For Large-Scale Network Evaluations

Global Military Communications Market In 2010

Raytheon BBN Technologies To Protect Internet Comms For Military Abroad

Gilat Announces New Military Modem For Robust Tactical Satcom-On-The-Move

CYBER WARS
US Army Selects AAI's Man-Portable Aircraft Survivability Trainer

Argon ST Awarded Joint Precision Air Drop System Ultra Light Weight Contract

F-35C CF-1 Catapult Hookup

Pilots dead in California F/A-18 fighter crash: report

CYBER WARS
Budget impasse means no pay for US troops:officials

Armoured Vehicle Worth Over 10 Billion Dollars

Eurofighter back in Danish jet competition

India inches closer to major aircraft deal

CYBER WARS
In shutdown, US troops will stay on duty: Pentagon

Outside View: Chaotic world consequences

China: Peaceful military development

Commentary: Celebrity diplomacy

CYBER WARS
Scientists Build World's First Anti-Laser

Yale scientists build 'anti-laser'

'Air laser' could find bombs at a distance

ONR Achieves Milestone In Free Electron Laser Program


The content herein, unless otherwise known to be public domain, are Copyright 1995-2010 - SpaceDaily. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement