Phishing Attacks in May Jumped More Than 200 Percent

June 30, 2005

The phishing season is officially open. Phishing – using fraudulent emails to try to dupe recipients into revealing personal or financial information -- reached its highest level in May, according to IBM. The month Global Business Security Index saw phishing attacks increase 226 percent that month.

IBM security experts blame the rise in phishing attacks to burgeoning zombie botnets – networks of computers used to send spam and nefarious emails without their owners’ knowledge. The May report also found that more than 30 percent of emails contain some form of virus.

On the good news side, spam leveled off in May, although it still accounted for almost 70 percent of inbound email traffic.

"IT systems have become so crucial to today's business operations, work productivity, and customer service, that even a small disruption can have serious impact on business operations, and loss of data integrity or confidentiality can lose a customer base that took years to build," said Cal Slemp, vice president, security and privacy services, IBM Global Services. "Security is now something that companies can no longer afford to be without. IBM's approach offers companies a way to reduce overall business risk while helping them comply with legislations, regulations and build better business intelligence."

Source: IBM

Explore further: Report links hacking scheme to Iran (Update)

Related Stories

Cyber-defense and forensic tool turns 20

August 5, 2015

Sometimes a new idea or product can burst into the world fully-formed, but more often than not it takes time for things of value to evolve, improve, emerge and find an audience.

Corporate accounts targeted in Dyre Wolf campaign

April 5, 2015

A sophisticated and brazen theft operation has been brought to attention this month by IBM Security, which refers to it as the "Dyre Wolf Campaign." It has been active and successful, having stolen over $1 million from targeted ...

Microsoft beefs up security protection in Windows 10

October 25, 2014

What Microsoft users in business care deeply about—-a system architecture that supports efforts to get their work done efficiently; a work-centric menu to quickly access projects rather than weather readings and movie trailers; ...

BYOD mobile attack prevention app uses machine learning

January 24, 2014

(Phys.org) —Mobile security company Zimperium is introducing attack-protection software for mobile devices and they have designed the product to go where other malware-sniffing apps might not. They aim to attract today's ...

Recommended for you

Seeing quantum motion

August 28, 2015

Consider the pendulum of a grandfather clock. If you forget to wind it, you will eventually find the pendulum at rest, unmoving. However, this simple observation is only valid at the level of classical physics—the laws ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.