. Military Space News .
China top target for computer attacks: Microsoft

by Staff Writers
San Francisco (AFP) Nov 3, 2008
Chinese computer users have become chief targets for online criminals, according to a security report released Monday by Microsoft.

The global software giant's latest assessment of threats and vulnerabilities reveals that attackers favor hiding malicious programs in seemingly innocent Web browser applications and that China is their preferred target.

"The majority of (exploits) we are finding is where the local language is set to Chinese," said Microsoft malware protection center general manager Vinny Gullotto.

"It reflects a lot of what is happening in the Chinese market. There is so much going on out there with the Internet today that it seems to be somewhat natural that we might see this happen there."

Approximately 47 percent of software "exploits" found stalking the Internet in the first half of 2008 were in Chinese while 23 percent were in English, the second most common language for attack programs.

These include programs which can record a user's keystrokes or steal passwords and credit card and banking information.

Microsoft security watchdogs say they find higher computer-infection rates in developing countries where fledgling Internet users aren't savvy to tricks and traps used by hackers and online criminals.

"They are exploring this whole new world and not thinking about what problems they might face," Gullotto said.

The weapons of choice for online attacks are "Trojan Horses," software applications hidden inside programs that computer users are duped or coaxed into downloading, according to the Microsoft report.

"The area of concern specifically is browser-based exploits," Gullotto said.

"If you are out surfing the Web, good or bad, there is the possibility some exploit on that page is going to take advantage of you and compromise some information on your computer."

Overall, the number of computer vulnerabilities was down 19 percent in the first half of this year as compared to the same period in 2007. A higher amount of the vulnerabilities that do exist are ranked "high severity."

"Updating is vitally important," Gullotto said of protecting computers by keeping operating systems and other software current.

"The newer technology you have in the environment the more secure situation you are going to be in -- infection rates come down dramatically."

Community
Email This Article
Comment On This Article

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Analysis: New Army cyber task force
Washington (UPI) Oct 27, 2008
The U.S. Army has set up a special task force to counter the theft of sensitive data about cutting-edge defense technology by hackers who are breaking into the computer networks of military contractors.







  • Africa Command Headquarters To Remain In Stuttgart
  • A New Summit In Helsinki Part Two
  • Russian navy to hold war games in Indian Ocean
  • Analysis: Georgia leaves the CIS

  • Outside View: Russia boosts nuclear punch
  • Robert Gates Shows Nuclear Impatience
  • NKorea's nuclear drive seen dogging next US leader
  • New US president to maintain nuclear talks with NKorea

  • NKorean base could handle longer-range missile: SKorean minister
  • US Navy, Raytheon Achieve Program Milestone On JSOW C-1
  • Taiwan to produce 300 cruise missiles: report
  • LockMart's JASSM-ER Successful In Latest Flight Test

  • Bahrain in joint missile defence drill with US
  • Thompson Files: Missile defense realities
  • Russia Conducts CIS Wide Integrated Air Defense Exercise
  • US missile chief concerned by delays to Polish base accord

  • China plane-makers take first steps to rival global giants
  • Aviation giants look to China amid global turbulence
  • Boeing sees China buying 3,710 planes over next 20 years
  • New EU CO2 caps anger airlines

  • Aurora Wins USAF Contract On Vision-Based MAV Guidance
  • Successful Live-Fire Testing Of Shadow TUAS
  • DCNS Achieves Automatic UAV Landing On Frigate
  • AAI Receives Contract For Additional Shadow TUAS

  • Analysis: U.S., Iraq wrangle over troops
  • Outside View: Iraq-U.S. troop deal
  • No US bases in northern Iraq without Baghdad nod: Talabani
  • Only Iraqis who fled Gulf war suffer stress disorder: study

  • Eurofighter Air-to-Air Refuelling From Airbus A310 MRTT
  • Lockheed Martin Delivers 500th Arrowhead System To US Army
  • AESA And Other Developments Drive Radar Production
  • New Technology To Neutralise IEDs

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement