{"id":1787,"date":"2005-02-21T00:00:00","date_gmt":"2005-02-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/02\/21\/online-dangers-increase\/"},"modified":"2021-12-30T11:39:59","modified_gmt":"2021-12-30T11:39:59","slug":"online-dangers-increase","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/02\/21\/online-dangers-increase\/","title":{"rendered":"Online dangers increase"},"content":{"rendered":"<p>Antivirus firm McAfee has released the results of its study into &#8220;virtual criminology&#8221;, identifying changing patterns of IT crime and weaknesses that criminal gangs can exploit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee security specialist Lee Fisher, author of the report, said the biggest risk for companies is their own apathy.  &#8220;Firms believe (wrongly) that viruses and code are a benign risk, that because they have a firewall they are protected,&#8221; he said, adding that &#8220;about 70 percent&#8221; of internet threats are driven by profit, not a desire for notoriety.<\/p>\n<p>Fisher said that firms face a number of separate dangers.  &#8220;The fast-spreading viruses make all the headlines, but they are not the biggest threats.&#8221;  The biggest dangers include key-logging tools and bot network tools that could be used for distributed denial-of-service attacks.<\/p>\n<p>To help firms protect themselves against these risks, in March McAfee will start updating its virus alerts and tools on a daily basis.  Fisher said that this requirement was unimaginable five years ago, but the firm is now seeing about 50 new threats or viruses each day.<\/p>\n<p>McAfee&#8217;s report emphasises that the internet is global, fast and virtual, adding, &#8220;In the wrong hands, this adds up to the potential to make vast sums of money illegally.&#8221;<\/p>\n<p>Fisher said McAfee worked with enforcement experts and academics for seven months to draw up what he described as &#8220;the first in-depth picture of (the) new invisible threats we face&#8221;.<\/p>\n<p>Online crimes include hacking, and less obvious threats such as the use of zombies and bot-networks to host malicious code or illegal material.  McAfee said that the perpetrators of online crime had matured from being &#8220;geeks in bedrooms&#8221; to organised criminal gangs.<\/p>\n<p>Two years ago the company&#8217;s researchers saw about 300 potentially malicious attacks a month, now that figure has grown to 1,500.<\/p>\n<p>McAfee noted that many traditionally physical crimes, such as extortion and money-laundering, are now carried out online, and the scale of the problem is &#8220;massive&#8221;.<\/p>\n<p>http:\/\/www.vnunet.com\/news\/1161404<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1787","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1787"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1787\/revisions"}],"predecessor-version":[{"id":4274,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1787\/revisions\/4274"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}