Attempt to Promote 1,016,000 Amphetamine Pills Thwarted in Taif    Saudi Fund for Development CEO Receives Sierra Leone's Foreign Minister    Public Investment Fund Launches "Savvy Gaming Group"    KSrelief Signs USD 10 Million Worth Agreement with UNICEF to Provide Basic Health Services for Mothers, Children in Yemen    Diriyah E-Prix 2-Time Champion Sam Bird Sets His Sight on More Triumph in 2022 Diriyah E-Prix    Asian Shares Mixed    [email protected]: Set to become world's technological and economic powerhouse    Royal Commission in Yanbu Achieves Arab Award for Operation and Maintenance    Minister of Islamic Affairs sponsors closing ceremony of 34th Virtual International Conference for Muslims of Latin America and Caribbean    IPA organizes 'Innovation and the Future of Government Work' conference on February 9    NDMC clears 43% of debts due for payment in 2022    Flying car cleared for takeoff, but you'll need a pilot's license    15% jump in number of Saudis working in private healthcare sector    Crown Prince, Chan-o-cha reaffirm need to open a new chapter in Saudi-Thai relations    Dozens feared lost as 'smuggling' boat capsizes off Florida    Netherlands to ease Covid restrictions despite rising case numbers    What the grand Republic Day parade means to India    Unvaccinated man denied heart transplant by Boston hospital    Deputy Ruler of Sharjah witnesses premiere of 'Narratives of the Place'    Sir Elton John postpones US shows after positive Covid-19 test    Bollywood's Shilpa Shetty cleared of obscenity over Richard Gere kiss    Egypt Records 1809 New Cases of COVID-19    Commerce Minister: Prime Minister of Thailand visit comes within Saudi Arabia's keenness to strengthen relations with countries of world    Minister of Justice Meets with His British Counterpart    Non-oil exports in Saudi Arabia increase by 26.1%    At least six killed in Cameroon stadium stampede    Al Hilal pays tribute to departing star striker Bafetimbi Gomis    Saudi Stock Exchange Main Index Ends Trading Higher at 12,108 Points    General Court of Audit President Inaugurates 8th Conference for Internal Audit with Int'l Participation    UN chief calls for Olympic Truce to build 'culture of peace' through power of sport    Taylor Swift slams Damon Albarn over songwriting comments    Australian Open: Peng Shuai T-shirt ban reversed after outcry    Cirque du Soleil to establish an academy and regional office in Saudi Arabia    Omani National Football Team Arrives in Jeddah to Meet Saudi National Team    'Bab Al Hara' Director Bassam AlMulla passes away at 65    Saudi Handball Team Loses to Qatar in Main Round of 2022 Asian Men's Handball Championship    Eighth Season of ABB FIA Formula E World Championship to kick off in Diriyah    Riyadh's Qualitative Events Enrich its Winter, Attract World Attention    SFDA: Fat is a Source of Energy and Its Abundance is Linked to Chronic Diseases    Reflections on celebration of Christmas    Royal Commission for AlUla to Hold Custodian of the Two Holy Mosques Endurance Cup 2022, Richard Mille AlUla Desert Polo    Saudi Arabia's Pavilion at Expo 2020 Dubai Organizes a Dance Theatrical Show for Children    Saudi Arabia rebuffs UN resolution on 'sexual orientation'    Kabir Khan eyes on joint Indian – Saudi film projects    Pilgrims Perform Dhuhr and Asr Prayers at Arafat Holy Site    Council of Senior Scholars: Muslim Brothers' Group Don't Represent Method of Islam, rather only Follows its Partisan Objectives, Violating our Graceful Religion    Eid Al-Adha Prayer Performed at the Grand Holy Mosque    Pilgrims Perform Dhuhr and Asr Prayers in Arafat Holy Site    

Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.

Security threats mean business
By Saudi Gazette Staff
Published in The Saudi Gazette on 29 - 07 - 2009

Internet criminals are increasingly operating like successful businesses, Cisco said in its 2009 mid-year security report.
The assessment found that those who are intent on pursuing illegal on-line activities are borrowing some of the best strategies from legitimate companies and forming partnerships and alliances with one another to help make their pursuits more lucrative.
In outlining some of the most common technical and business strategies that criminals use to breach corporate networks, compromise Web sites and steal personal information and money, Cisco offers recommendations for protecting against some of the newer types of attacks that have surfaced recently; recommendations that incorporate people, processes and technology as an overall holistic risk management solution. The organization also advises heightened vigilance against some ‘old school' approaches that are just as sophisticated and prevalent as the newer threats.
“Securing the Internet has long been a moving target, as criminals develop increasingly sophisticated ways to breach corporate networks and obtain valuable personal data,” said Patrick Peterson, Cisco fellow and chief security researcher. “What is striking in our latest findings is how - in addition to using their technical skills to cast a wide net and avoid detection - these criminals are also demonstrating some strong business acumen,” he added. “
Last Tuesday, Cisco security executives utilized a live interactive IPTV broadcast to evaluate the report's findings and to discuss best practices to effectively counteract increased criminal sophistication. Among the threats included in the talk were those presented by worms, with the rise in social networking meaning that it is now easier for worm attacks to be launched. The proliferation of online communities has made it much more likely for users to click links and download content they believe are sent by people they know and trust, spreading worm attacks throughout the Net. An example of the havoc that can be wrought from such an attack was demonstrated by the Conficker worm, which began infecting computer systems late last year. The combination of advanced malware techniques exploited a Windows operating system vulnerability and continues to spread, with several million computer systems being under its control as of June 2009.
The tendency of criminals to co-operate in order to enhance the effectiveness of their illegal activities was also highlighted during the discussion. Botnets, networks of compromised computers, serve as efficient means of launching attacks and increasingly, botnet owners are renting out these networks to fellow criminals, effectively using these compromised resources to deliver spam and malware via the software-as-a-service (SaaS) model. Peterson acknowledges the increasing propensity for on-line criminals to work together. “They are collaborating with each other, preying on individuals' greatest fears and interests, and increasingly making use of legitimate Internet tools, like search engines and the software-as-a-service model, he said. “Some also continue to succeed using well-documented methods that in recent years have been downplayed as threats, given the preponderance of new tactics,” he added.
During the session there was also discussion about on-line criminals launching attacks off the back of major news stories; something that was highlighted by the illegal activities reported in April after the outbreak of H1N1 influenza, or ‘swine flu.' Following this event, cyber criminals quickly blanketed the Web with spam that advertised preventive drugs and links to fake pharmacies. In fact, spam continues to be one of the most established ways to reach millions of computers with legitimate sales pitches or links to malicious Web sites. A staggering 180 billion spam messages are sent each day, representing about 90 percent of the world's e-mail traffic. Spam messaging remains a major vehicle for spreading worms and malware, as well as for clogging Internet traffic.
Of the newer threats to merge, text message scams were seized upon as being a significant development. Since the start of this year, at least two or three new campaigns have surfaced every week targeting handheld mobile devices. Cisco describes the rapidly growing mobile device audience as a “new frontier for fraud irresistible to criminals.” With some 4.1 billion mobile phone subscriptions worldwide, a criminal may cast an extraordinarily wide net and still walk away with a nice profit, even if the attack yields only a small fraction of victims.
To guard against the evolving on-line threats to personal users, small businesses, larger corporations and even governmental institutions, Peterson stresses the importance of keeping up-to-date on the nature of Internet attacks. “With criminals being so quick to identify weaknesses both in online networks and in consumers' psyches, businesses need to adopt ever more advanced ways to fight cybercrime and remain vigilant across all attack vectors,” he said. __

Clic here to read the story from its source.