Ministry of Hajj and Umrah Allows All Types of Visas to Perform "Umrah" for Those Coming to Saudi Arabia    Weather Forecast for Saturday    13 Dead, 6 Missing in Heavy Rains in South Korea    WHO plans to rename monkeypox over stigmatization concerns    US Stock Market Closes Higher    In implementation of HRH Crown Prince's Directive, Assistant Minister of Defense for Executive Affairs visits Southern Region    Global Markets    Saudi Arabia delivers medical equipment to Ukrainian refugees in Poland    Children with disabilities disproportionately impacted by war in Ukraine    Benzema, Courtois, De Bruyne on shortlist for UEFA award    Barcelona sells more assets as it hopes to register players    ZATCA thwarts smuggling attempt of narcotic pills hidden in a garment and toys shipment    UN chief appeals for end to military activities at Ukraine nuclear plant    Saudi Arabia issues 90 industrial licenses in June    Donald Trump does not oppose US bid to unseal Mar-a-Lago search warrant    We're not in a hurry to win medals, says CEO of Saudi training center Konya 2022    US actress Anne Heche not expected to survive, says family    Saudi Press: Saudi Arabia Focuses on Crystallizing Visions About Prospects and Challenges of Future Economy    Sate Security warns against donating to unknown foreign entities Terror financing    Saudi Arabia allows holders of tourist, commercial visas to perform Umrah People from 49 countries are eligible for visas on arrival    SAMA announces launch of POS service between Saudi Arabia and Qatar    Ka'aba door bears witness to Saudi rulers' care for the House of God Kaaba' door, repentance' door contain more than 280 KG of pure gold    Ma'aden Delivers Record Q2 2022 Performance    Autohub celebrates 4 years of becoming a leading multi-brand auto care provider    UN trade body calls for halting cryptocurrency rise in developing countries    Buraidah Dates Market Records High sales Figures    Bahrain Two Main Indexes End Trading with Different Directions    Saudi Electricity Company Secures SAR 13.4 Billion Financing Facilities to Finance Long-term Growth, Saudi Arabia-Egypt Electricity Interconnection Project    Saudi Arabia to host Arab Radio & TV Festival in November    Saudi National Beach Soccer Team Arrives in Morocco to Participate in Casablanca Beach Soccer Cup 2022    How Aamir Khan adapted Forrest Gump to Bollywood Laal Singh Chaddha    WHO calls for optimizing brain health to benefit people and society    More breathing devices needed for premature babies born in Ukraine    'Rise of the Witches': Biggest series to be ever made in Saudi Arabia    Victory becomes the sweetest for Al-Marzouki with a warm touch of motherly affection    Saudi team for Special Olympics Unified Football wins gold medal of World Cup    Egyptian U20 Football National Team Beats Algerian Counterpart to Qualify for 2022 U-20 Arab Cup Final Match    Saudi Arabia to Participate in the 5th Islamic Solidarity Games in Turkiye    Association of Culture and Arts in Dammam Announces Winners of "International Video Art Forum"    Slaughterhouses of MEWA received more than 600,000 sacrifices in 3 days of Eid    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    MoH Activates Sign Language to Communicate with Pilgrims with Deafness or Muteness During Hajj    Sheikh Al-Issa at Arafat sermon: Values of Islam foster harmony; eschew hatred and division    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Red Sea Fund Opens Its Third Cycle for Production Funding    SFDA Warns Against Herbal Product "Montalin Jamu" Due to Containing Active Medicinal Ingredients    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    Pilgrims Perform Dhuhr and Asr Prayers at Arafat Holy Site    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Cisco: Global cyber security threats up
By Saudi Gazette Staff
Published in The Saudi Gazette on 24 - 12 - 2008

Cisco has warned that Internet-based attacks are becoming increasingly sophisticated and specialized as profit-driven criminals continue to hone their approach to stealing data from businesses, employees and consumers.
In the 2008 edition of the Cisco Annual Security Report released on Sunday, the company identifies the year's top security threats and offers recommendations for protecting networks against attacks that are propagating more rapidly, becoming increasingly difficult to detect, and exploiting technological and human vulnerabilities.
The report was culled from Cisco security intelligence operations - an aggregation of tightly integrated data and security services derived from multiple Cisco divisions and devices to continuously assess and correlate Internet threats and vulnerabilities.
“Every year we see threats evolve as criminals discover new ways to exploit people, networks and the Internet. This year's trends underscore how important it is to look at all basic elements of security policies and technologies,” said Patrick Peterson, Cisco fellow and chief security researcher. “Organizations can lower their risk of data loss by fine-tuning access controls and patching known vulnerabilities to eliminate the ability for criminals to exploit holes in infrastructures. It is important to upgrade applications, endpoint systems and networking equipment to help ensure that corporate systems run smoothly and minimize risk.”
The Annual Cisco Security Report listed notable trends, among them are:
• The overall number of disclosed vulnerabilities grew by 11.5 percent over 2007.
• Vulnerabilities in virtualization technology nearly tripled from 35 to 103 year over year.
• Attacks are becoming increasingly blended, cross-vector and targeted.
• Cisco researchers saw a 90 percent growth in threats originating from legitimate domains, nearly double what was seen in 2007.
• The volume of malware successfully propagated via e-mail attachments is declining. Over the past two years (2007-2008), the number of attachment-based attacks decreased by 50 percent from the previous two years (2005-2006).
Cisco Report further noted specific threats across the Web, such as:
• Spam. According to Cisco, spam accounts for nearly 200 billion messages each day, approximately 90 percent of worldwide e-mail
• Phishing. While targeted spear-phishing represents about 1 percent of all phishing attacks, it is expected to become more prevalent as criminals personalize spam and make messages appear more credible.
• Botnets. Botnets have become a nexus of criminal activity on the Internet. This year, numerous legitimate Web sites were infected with IFrames, malicious code injected by botnets that redirect visitors to malware-downloading sites.
• Social engineering. The use of social engineering to entice victims to open a file or click links continues to grow. Cisco expects that in 2009, social engineering techniques will increase in number, vectors and sophistication.
• Reputation hijacking. More online criminals are using real e-mail accounts with large, legitimate Web mail providers to send spam. This “reputation hijacking” offers increased deliverability because it makes spam harder to detect and block. Cisco estimates that in 2008 spam resulting from e-mail reputation hijacking of the top three Web mail providers accounted for less than 1 percent of all spam worldwide but constituted 7.6 percent of the providers' mail traffic.
In 2009, researchers from these Cisco security teams will monitorclosely the following trends:
• Insider threats. Negligent or disgruntled employees can threaten corporate security. The global economic downturn may prompt more security incidents involving employees, making it crucial for IT, HR, and other lines of business to collaborate on mitigating threats.
• Data loss. Whether through carelessness, breaches by hackers, or from insiders, data loss is a growing problem that can lead to grave financial consequences. Technology, education and clear, well-enforced data security policies can make compliance easier and reduce incidents.
• Mobility, remote working, and new tools as risk factors. The trend toward remote working and the related use of Web-based tools, mobile devices, virtualization, “cloud computing” and similar technologies to enhance productivity will continue in 2009. It will be a challenge for security personnel. The edge of the network is expanding rapidly, and the increasing number of devices and applications in use can make the expanding network more susceptible to new threats. __


Clic here to read the story from its source.