1,800 publishing houses showcase their titles as Riyadh International Book Fair kicks off    X scraps tool to report electoral fake news    Trump rivals spar in unruly Republican debate    Haikun: Taiwan unveils new submarine to fend off China    Trial of Vietnam climate activist sparks concern    Justin Trudeau apologizes after Nazi veteran honored in parliament    Lucid introduces exclusive 'Kingdom Dream' Edition: Only 93 cars by year-end 2023    Saudi EXIM Bank, Trafigura sign credit facility agreement    Saudi Fund, AIIB sign $10-mln deal to support infrastructure development in LDCs    Spain fines 'Big Four' consulting firms for 'marathon' working days    Prince Faisal, Sheikh Mohammed chair meeting of Saudi-Qatari political committees    Brussels calls on tech giants to help fight election disinformation    Hollywood writers agree to end five-month strike after studio deal    SMC Launches 'Saudi Football Trouq' initiative to preserve resounding chants of football clubs    Saudi Arabia is successful in whole liver transplant, using a robot for first time in the world    King's Cup: Al-Ittihad advances to round of 16 after thrilling penalty shootout victory    Al-Ahli secures spot in round of 16 in King's Cup    Ban smoking and vaping in schools worldwide urges WHO    Viral Taylor Swift clip leads to 'crazy 24 hours'    Injury sidelines French striker Karim Benzema for one week    This actor is so huge his fans lined up at 4.30 a.m. to watch his new movie    How South Africa's oldest mushaf was saved by Cape Town Muslims    MWL chief delivers Friday discourse and leads worshipers at New Delhi's Jama Masjid Al-Issa first religious figure from outside India to ascend the Great Mosque's pulpit in nearly 400 years    Homosexuality is a heinous crime, says Makkah imam in Friday sermon    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Authority for Survey and Geospatial Information Participates in UN World Data Forum in China    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Cisco: Global cyber security threats up
By Saudi Gazette Staff
Published in The Saudi Gazette on 24 - 12 - 2008

Cisco has warned that Internet-based attacks are becoming increasingly sophisticated and specialized as profit-driven criminals continue to hone their approach to stealing data from businesses, employees and consumers.
In the 2008 edition of the Cisco Annual Security Report released on Sunday, the company identifies the year's top security threats and offers recommendations for protecting networks against attacks that are propagating more rapidly, becoming increasingly difficult to detect, and exploiting technological and human vulnerabilities.
The report was culled from Cisco security intelligence operations - an aggregation of tightly integrated data and security services derived from multiple Cisco divisions and devices to continuously assess and correlate Internet threats and vulnerabilities.
“Every year we see threats evolve as criminals discover new ways to exploit people, networks and the Internet. This year's trends underscore how important it is to look at all basic elements of security policies and technologies,” said Patrick Peterson, Cisco fellow and chief security researcher. “Organizations can lower their risk of data loss by fine-tuning access controls and patching known vulnerabilities to eliminate the ability for criminals to exploit holes in infrastructures. It is important to upgrade applications, endpoint systems and networking equipment to help ensure that corporate systems run smoothly and minimize risk.”
The Annual Cisco Security Report listed notable trends, among them are:
• The overall number of disclosed vulnerabilities grew by 11.5 percent over 2007.
• Vulnerabilities in virtualization technology nearly tripled from 35 to 103 year over year.
• Attacks are becoming increasingly blended, cross-vector and targeted.
• Cisco researchers saw a 90 percent growth in threats originating from legitimate domains, nearly double what was seen in 2007.
• The volume of malware successfully propagated via e-mail attachments is declining. Over the past two years (2007-2008), the number of attachment-based attacks decreased by 50 percent from the previous two years (2005-2006).
Cisco Report further noted specific threats across the Web, such as:
• Spam. According to Cisco, spam accounts for nearly 200 billion messages each day, approximately 90 percent of worldwide e-mail
• Phishing. While targeted spear-phishing represents about 1 percent of all phishing attacks, it is expected to become more prevalent as criminals personalize spam and make messages appear more credible.
• Botnets. Botnets have become a nexus of criminal activity on the Internet. This year, numerous legitimate Web sites were infected with IFrames, malicious code injected by botnets that redirect visitors to malware-downloading sites.
• Social engineering. The use of social engineering to entice victims to open a file or click links continues to grow. Cisco expects that in 2009, social engineering techniques will increase in number, vectors and sophistication.
• Reputation hijacking. More online criminals are using real e-mail accounts with large, legitimate Web mail providers to send spam. This “reputation hijacking” offers increased deliverability because it makes spam harder to detect and block. Cisco estimates that in 2008 spam resulting from e-mail reputation hijacking of the top three Web mail providers accounted for less than 1 percent of all spam worldwide but constituted 7.6 percent of the providers' mail traffic.
In 2009, researchers from these Cisco security teams will monitorclosely the following trends:
• Insider threats. Negligent or disgruntled employees can threaten corporate security. The global economic downturn may prompt more security incidents involving employees, making it crucial for IT, HR, and other lines of business to collaborate on mitigating threats.
• Data loss. Whether through carelessness, breaches by hackers, or from insiders, data loss is a growing problem that can lead to grave financial consequences. Technology, education and clear, well-enforced data security policies can make compliance easier and reduce incidents.
• Mobility, remote working, and new tools as risk factors. The trend toward remote working and the related use of Web-based tools, mobile devices, virtualization, “cloud computing” and similar technologies to enhance productivity will continue in 2009. It will be a challenge for security personnel. The edge of the network is expanding rapidly, and the increasing number of devices and applications in use can make the expanding network more susceptible to new threats. __


Clic here to read the story from its source.