. Space Industry and Business News .




.
CYBER WARS
'Hacktivists' biggest data thieves in 2011: Verizon
by Staff Writers
San Francisco (AFP) March 22, 2012


Activists with hacker skills were behind more than half the data stolen in cyber attacks last year, according to findings released on Thursday by Verizon Communications.

While criminal groups accounted for an overwhelmingly majority of cyber strikes on networks, "hacktivists" were the ones who rampantly looted data once inside computers, Verizon said in an annual Data Breach Investigations Report.

"This re-imagined and re-invigorated specter of 'hacktivism' rose to taunt organizations around the world," the US telecom titan said.

"Many, troubled by the shadowy nature of its origins and proclivity to embarrass victims, found this trend more frightening than other threats."

About 98 percent of computer network breaches at companies last year were the work of outsiders, with criminal groups out for profit were figured to be behind 83 percent of those attacks.

However, it was self-described activist organizations such as Anonymous and Lulz Security who stole 58 percent of the data while being involved in far fewer cyber attacks, according to Verizon.

"While good old-fashioned greed and avarice were still the prime movers, ideological dissent and schadenfreude took a more prominent role across the caseload," the report said.

The report cited data provided by the US Secret Service, the Dutch National High Tech Crime Unit, the Australian Federal Police, the Irish Reporting & Information Security Service and the Police Central e-Crime Unit of the London Metropolitan Police.

The Verizon findings were released on the same day that an IBM X-Force 2011 Trend and Risk report indicated that tightened security at companies is forcing cyber crooks to rethink tactics and shift to new fronts such as smartphones.

The X-Force report indicated hackers were increasingly resorting to automated password guessing programs, attacks on mobile gadgets, and "phishing" attacks that trick people into downloading viruses or revealing sensitive information.

"We've seen surprisingly good progress in the fight against computer crime through the IT industry's efforts to improve the quality of software," said X-Force threat intelligence and strategy manager Tom Cross.

"In response, criminals continue to evolve their techniques in an attempt to find new avenues into an organization."

Attack techniques include injected malicious code into legitimate websites or ruses that involve impersonating popular social networking services, X-Force warned.

In a bit of good news, the amount of spam email in 2011 was about half that in 2010, according to IBM.

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues




.
.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries






.

. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
Online rumour fills information void in jittery China
Beijing (AFP) March 22, 2012
Groundless rumours of a coup that have swept Beijing in recent days are a sign of nervousness after the sacking of political star Bo Xilai exposed rifts in China's ruling Communist Party, analysts say. Bo had been tipped to join an elite group of leaders who effectively run China later this year, and his downfall - announced last week in a brief official dispatch - is the biggest drama to ... read more


CYBER WARS
Overheating problem on the new iPad?

More countries start rare-earth mining

Japan, US, and EU to meet on rare earths

Nokia feels out tattoos that vibrate with incoming calls

CYBER WARS
Raytheon to Continue Supporting Coalition Forces' Information-Sharing Computer Network

Northrop Grumman Wins Contract for USAF Command and Control Modernization Program

TacSat-4 Enables Polar Region SatCom Experiment

'See Me' satellites may help ground forces

CYBER WARS
Arianespace's third ATV launch for ISS servicing is given a "go" for liftoff

Astrium and Air Liquide create EuroCryospace

SpaceX, NASA readies for April 30 launch to ISS

North Korea to invite observers to satellite launch

CYBER WARS
GIS Technology Offers New Predictive Analysis to Business

Navigation devices in market woes

Iris: watch how satcoms help pilots

Smartphones can help track diseases

CYBER WARS
Aviation driving growth in Latin America

A biplane to break the sound barrier

HK backs third runway despite environmental fears

Next supersonic plane might be a biplane

CYBER WARS
Solitary waves induce waveguide that can split light beams

Designer lights from the physics lab

Inner workings of magnets may lead to faster computers

Silicon-carbon electrodes snap, swell, don't pop

CYBER WARS
Spotting ancient sites, from space

Google opens Amazon wilds to armchair explorers

Satellite images identify early human settlements

Investigation of Earth Catastrophes From the ISS: Uragan Program

CYBER WARS
UNH research adds to mounting evidence against popular pavement sealcoat

Philippines' Aquino says miners will have to pay

Illegal toxic waste dump sparks anger in Russia

Chevron accused of graft in Indonesian green project


Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement