Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Category: Trends

Security’s Top Five Priorities

Posted on May 5, 2007December 30, 2021 by admini

1. The Portable Problem
They can be the getaway vehicles for sensitive data, or the unwary carriers of viruses and other malware. It’s no surprise, then, that removable storage is at the top of the list in almost every security professional’s priority list these days. In a survey published yesterday, Centennial Software reported that 38.4 percent of attendees at the recent InfoSecurity Europe conference listed portable media as the number one security issue facing their organization. Viruses finished second at 23.7 percent; spyware garnered 22.3 percent. “It comes up in every conversation I have with a customer,” says Steve Stasiukonis, vice president and founder of Secure Network Technologies, a penetration testing firm. According to a study published two weeks ago by Senforce Technologies, 73 percent of IT professionals say their organization houses critical data on removable devices such as laptops, thumb drives, and iPods. Twenty-three percent of the respondents said their organization had reported a network security breach in the last 12 to 18 months, and another 25 percent said they didn’t know whether such a breach had occurred.

2. Web Two Point Zero-Day?
In tests of some 31,000 Websites last year, the Web Application Security Consortium exposed more than 148,000 vulnerabilities, according to the latest WASC statistics. As with portable devices, the problem with emerging Web applications — sometimes collectively called Web 2.0 — is that the popularity of the technology is rapidly outstripping the IT organization’s ability to secure them. Fortify Software earlier this month reported a new wave of Internet attacks targeting Web 2.0 sites and the Ajax applications that have helped make them so dynamic.

3. Attacker Inside!
Corporations have always been concerned about security leaks and insider attacks.

4. Endpoint End Game
Networks and applications are nice, but most hackers’ favorite target is a nice, blissfully-ignorant end user. Some 25,090 (13 percent) of the corporate PCs surveyed had unauthorized USB devices attached to them. Whether it’s Cisco’s NAC, Microsoft’s NAP, or any one of a dozen other endpoint security strategies, corporations need to find a solution, and fast.

5. Botnet Bugaboo
When attackers crippled two of the Internet’s key Domain Name Service servers in February, it was bad enough. But now experts are telling us that the attack might have been a prologue to a much larger attack, or perhaps even a sales demo for a botnet seller. BBC News today is reporting that some companies have begun hiring hackers to launch botnet attacks on their competitors, creating spam networks or crippling their rivals’ networks with botnet traffic. And with zero-day vulnerabilities discovered in Microsoft’s DNS just a few weeks ago, the botnet threat is greater than ever, experts say. “Botnets are pervasive on the Internet and use zero-day vulnerabilities, such as Microsoft’s DNS vulnerability, to grow their armies,” said Ashar Aziz, CEO of security company FireEye. “Botnets enable theft of enterprises’ customer data and intellectual property, and can be used to commit fraud and crime on a large scale.

http://www.darkreading.com/document.asp?doc_id=123294&WT.svl=news2_3

Read more

Compliance drives security configuration management

Posted on April 26, 2007December 30, 2021 by admini

“Either it’s a vulnerability in software, which we are all familiar with or configuration changes being made day to day by people within the organization that introduce vulnerabilities,” he said.

Colorado Springs, Co.-based Configuresoft Inc. is making itself stand out by trying to capitalize on organizations upgrading systems to a service oriented architecture and those that are using server virtualization.

Companies such as Lexington, Mass.-based Bladelogic Inc. are filling the need for server configuration management, said Mark Nicolett, research vice president at Stamford, Conn.-based Gartner Inc. “This segment is a bit busier than it had been and I expect this segment to be driven harder,” he said. The vendor is using business intelligence to alert management of any configuration changes that can open holes and increase risk, said Andi Mann, a senior analyst at Boulder, Co.-based Enterprise Management Associates.

George Gerchow, Configuresoft’s technology strategist said merchants seeking compliance with PCI DSS, credit card security standards are driving spending on configuration management tools.

http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1252785,00.html

Read more

Malware Spikes in 1Q As Hackers Increasingly Infect Websites

Posted on April 25, 2007December 30, 2021 by admini

With computer users becoming more aware of how to protect against e-mail-based malware, hackers have turned to the Web as their preferred vector of attack. The trojan is typically found in html or ASP files, and can download and execute files from malicious Web sites to infected computers.

The company’s researchers found that 70%, were legitimate Web sites that were vulnerable to attack because they were unpatched, poorly coded, or had not been maintained by their owners. They also found that 12.8% were hosting malicious script, while Windows malware was responsible for infecting 10.7%.

“What’s most worrying is that so many Web sites are falling victim because the owners are failing to properly maintain them and keep up to date with their patches,” said Carole Theriault, a senior security consultant at Sophos, in a written statement.

“The average Internet user assumes sites like the Miami Dolphins homepage are safe to access, but by targeting a whole range of Internet pages, hackers are successfully infecting a larger number of unwary surfers.

http://www.darkreading.com/document.asp?doc_id=122469&f_src=darkreading_section_318

Read more

Goldman Sachs IT spending survey: Winners and losers

Posted on March 14, 2007December 30, 2021 by admini

The report also detailed what hardware and software players were gaining traction.

Surprisingly, Lenovo and Apple were shown to be gaining share of the IT spend, which Dell and HP were losing share.

http://blogs.zdnet.com/BTL/?p=4646

Read more

ID theft forecast: Gloomy today, worse tomorrow

Posted on March 7, 2007December 30, 2021 by admini

“Hackers are exploiting Internet auctions, money transfers like Western Union and PayPal, the ability to impersonate lottery and sweepstake contests, and other types of imaginative scams,” said Litan. “They’re going after the weakest links, the consumers using social engineering tactics, and the U.S.’s payment systems at retail and businesses.” “Banks eat the fraud there,” at least for now, said Litan.

A Massachusetts state lawmaker, however, has proposed a bill that would hold retailers financially responsible for breaches. “The retailers are already paying for fraud” in the form of higher interchange charges, Litan said. She offered up examples of how that might be done, including more sophisticated authentication on debit cards and payment processors relying on identity scoring systems that were able to spot thieves using indicators like physical location.

http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9012483&source=NLT_AM&nlid=1

Read more

Japanese police confirms cybercrime growth trend

Posted on February 22, 2007December 30, 2021 by admini

The majority of cybercriminals in Japan were in their teens and twenties, following the trend from recent years.

The NPA is currently trying to promote public awareness of cybercrime and has so far succeeded in that, which has been highlighted by a significant drop in the number of cybercrime complaints for the first six months of 2006.

http://www.viruslist.com/en/news?id=208274044

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • …
  • 52
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme