. | . |
China top target for computer attacks: Microsoft San Francisco (AFP) Nov 3, 2008 Chinese computer users have become chief targets for online criminals, according to a security report released Monday by Microsoft. The global software giant's latest assessment of threats and vulnerabilities reveals that attackers favor hiding malicious programs in seemingly innocent Web browser applications and that China is their preferred target. "The majority of (exploits) we are finding is where the local language is set to Chinese," said Microsoft malware protection center general manager Vinny Gullotto. "It reflects a lot of what is happening in the Chinese market. There is so much going on out there with the Internet today that it seems to be somewhat natural that we might see this happen there." Approximately 47 percent of software "exploits" found stalking the Internet in the first half of 2008 were in Chinese while 23 percent were in English, the second most common language for attack programs. These include programs which can record a user's keystrokes or steal passwords and credit card and banking information. Microsoft security watchdogs say they find higher computer-infection rates in developing countries where fledgling Internet users aren't savvy to tricks and traps used by hackers and online criminals. "They are exploring this whole new world and not thinking about what problems they might face," Gullotto said. The weapons of choice for online attacks are "Trojan Horses," software applications hidden inside programs that computer users are duped or coaxed into downloading, according to the Microsoft report. "The area of concern specifically is browser-based exploits," Gullotto said. "If you are out surfing the Web, good or bad, there is the possibility some exploit on that page is going to take advantage of you and compromise some information on your computer." Overall, the number of computer vulnerabilities was down 19 percent in the first half of this year as compared to the same period in 2007. A higher amount of the vulnerabilities that do exist are ranked "high severity." "Updating is vitally important," Gullotto said of protecting computers by keeping operating systems and other software current. "The newer technology you have in the environment the more secure situation you are going to be in -- infection rates come down dramatically." Community Email This Article Comment On This Article Share This Article With Planet Earth
Related Links Cyberwar - Internet Security News - Systems and Policy Issues
Analysis: New Army cyber task force Washington (UPI) Oct 27, 2008 The U.S. Army has set up a special task force to counter the theft of sensitive data about cutting-edge defense technology by hackers who are breaking into the computer networks of military contractors. |
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement |