|By Marc Fossi||
|June 7, 2010 11:15 AM EDT||
Cybercrime saw significant growth in 2009. It increased in prevalence and geographic spread. The only thing that didn't grow was the skill level required to participate. It was easier for non-skilled attackers to conduct sophisticated attacks because of the availability of toolkits. The increase in manpower has led to an increase in most areas of cybercrime.
The growth of cybercrime has come despite a global recession that has stunted the growth of almost every other industry. The growth of cybercrime has been fueled by an increase in Internet users, especially those in developing countries.
However, businesses can protect their information from these pervasive dangers. Understanding the threat landscape is the first step. The following highlights from the Symantec Internet Security Threat Report XV can help organizations understand just what they're up against.
Cybercrime Keeps Growing
Malicious code is as prominent as ever. In 2009, Symantec identified more than 240 million distinct new malicious programs - a 100 percent increase over 2008. Last year Symantec blocked an average of 100 potential attacks per second.
Compromised confidential information continues to be an issue. Sixty percent of all data breaches that exposed identities were the result of hacking. This problem is not limited to a few larger enterprises. According to the Symantec State of Enterprise Security Report, 75 percent of all companies surveyed experienced some sort of cyber attack during the last year.
Cybercrime is a universal problem. Attackers have moved from using simple scams to launching highly sophisticated campaigns targeting some of the world's largest corporations and government entities. The scale of these attacks and the fact that they come from all over the world makes this an international problem requiring the cooperation of the private sector and global governments.
Less Skill Is Required to Engage in Cybercrime
The emergence of attack toolkits has made cybercrime available to anyone regardless of their computer knowledge and expertise. Novice computer users can purchase a kit and almost immediately begin deploying sophisticated and varied threats. Toolkits such as Zeus can be purchased for as little as $700. Some toolkits allow customization, resulting in many variants being created. Because there are an increasing number of cybercriminals entering the space, the number of threats is increasing and the number of people being affected is increasing as well.
Underground Economy a Bull
Credit cards and bank accounts continued to be the most advertised items on the underground economy in 2009 - illustrated in part by a notable increase in credit card dumps. Such dumps, which are sometimes referred to as cloned credit cards, increased by 150 percent from 2008 to 2009.
Social engineering tactics have changed to take advantage of the evolving financial landscape. More malicious messages incorporate themes such as refinancing loans, consolidating debt, reducing credit card interest rates, etc.
Enterprises Subject to More, Targeted Attacks
Cyber attacks are not just more sophisticated, they're also much more targeted. Many of them are full-fledged yet subtle campaigns. Cyber attacks remain undetected to penetrate deeply into the corporate network. While these targeted attacks have been occurring for several years, they have taken center stage recently, with incidents such as Hydraq.
Targeted attacks use zero-day vulnerabilities and spear-phishing type attacks. Attackers usually research a company and its employees by gathering information from corporate websites, news articles, social networks and other sites. Many targeted attacks aim to steal information about the organization's customers and employees, but other information - like intellectual property and corporate strategies - are also targeted.
Web-Based Attacks Are the Biggest Threat - and Are Getting Bigger
Four out of the top five attacks in 2009 targeted client-side vulnerabilities in widely used applications such as Internet Explorer and PDF readers. Suspicious PDF file downloads were the largest threat and accounted for 49 percent of all Web-based attacks, up from 11 percent in 2008.
Web browsers are also vulnerable - of the 374 vulnerabilities documented in Web browsers in 2009, 14 percent of them remain unpatched by the vendors. Firefox had the most vulnerabilities, but Internet Explorer was the most attacked. That difference illustrates cybercriminals' infatuation with market share.
What It Means
This data, as well as other information in the Symantec Internet Security Threat Report, offers a perspective that can change the way users and businesses operate. It is a framework for understanding what's out there and how to navigate it.
For businesses, such navigation includes employing strategies designed to give in-depth defense, including multiple, overlapping and mutually supportive defensive systems to guard against single-point failures in any specific technology or protection methodology. Security provided by solutions such as antivirus software, firewalls and intrusion detection are crucial if an organization wants to protect its assets and its employees.
Besides ensuring personal computers and networks are protected, individual users also need to use good judgment. If websites are untested or seem questionable, users need to be alert and perhaps even stay away from those sites. Another precaution to consider is disabling scripting and active content when casually browsing the Web.
Cybercriminals are getting more sophisticated, but knowing what they are up to allows businesses and individuals to place themselves strategically in the safest position possible. If you implement the right policies within your organization and use the tools that exist, you can help guard against malicious software and keep your organization's infrastructure, and the information within, safe from cybercriminals.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
Jul. 29, 2016 03:15 PM EDT Reads: 598
On Dice.com, the number of job postings asking for skill in Amazon Web Services increased 76 percent between June 2015 and June 2016. Salesforce.com saw its own skill mentions increase 37 percent, while DevOps and Cloud rose 35 percent and 28 percent, respectively. Even as they expand their presence in the cloud, companies are also looking for tech professionals who can manage projects, crunch data, and figure out how to make systems run more autonomously. Mentions of ‘data science’ as a skill ...
Jul. 29, 2016 03:00 PM EDT Reads: 360
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Jul. 29, 2016 02:00 PM EDT Reads: 1,200
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 29, 2016 01:00 PM EDT Reads: 2,090
ReadyTalk has expanded the capabilities of the FoxDen collaboration platform announced late last year to include FoxDen Connect, an in-room video collaboration experience that launches with a single touch. With FoxDen Connect, users can now not only engage in HD video conferencing between iOS and Android mobile devices or Chrome browsers, but also set up in-person meeting rooms for video interactions. A host’s mobile device automatically recognizes the presence of a meeting room via beacon tech...
Jul. 29, 2016 12:15 PM EDT Reads: 309
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Jul. 29, 2016 11:15 AM EDT Reads: 678
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Jul. 29, 2016 11:15 AM EDT Reads: 1,340
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jul. 29, 2016 09:45 AM EDT Reads: 2,135
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Jul. 29, 2016 09:45 AM EDT Reads: 1,032
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
Jul. 29, 2016 09:45 AM EDT Reads: 1,474
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
Jul. 29, 2016 07:15 AM EDT Reads: 1,647
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Jul. 29, 2016 06:45 AM EDT Reads: 2,374
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Jul. 29, 2016 04:45 AM EDT Reads: 2,577
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
Jul. 29, 2016 04:15 AM EDT Reads: 2,689
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
Jul. 29, 2016 02:45 AM EDT Reads: 1,625
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
Jul. 29, 2016 02:30 AM EDT Reads: 1,471
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, Senior Director and a founding member of Incenergy, will discuss some of the key tactics to ensure delivery success based on his experience of the last two years deploying Industrial IoT systems across four continents.
Jul. 29, 2016 02:00 AM EDT Reads: 1,703
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Jul. 29, 2016 12:15 AM EDT Reads: 2,018
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Jul. 28, 2016 11:45 PM EDT Reads: 1,283
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 28, 2016 10:15 PM EDT Reads: 1,456