More targeted cyber attacks likely in 2006

Jan 23, 2006

The latest security report from IBM foresees cybercrime evolving from pervasive global outbreaks to smaller, stealthier attacks targeted at specific organizations for extortion purposes. IBM Global Business Security Index Report summarizes trends in security for last year and maps out what’s on the way in 2006.

"The decrease in pervasive attacks in 2005 is counter-intuitive to what society at large believes is a major threat to their personal data," said Cal Slemp, vice president of IBM's security and privacy services. "IBM believes that the environment has shifted – with increased security protection on most systems and stiffer penalties, we are seeing organized, committed, and tenacious profiteers enter this space. This means that attacks will be more targeted and potentially damaging. Organizations around the world – from the public and private sectors – must move quickly and work together to address this growing challenge."

The report identified several potential security trends for 2006, including:

-- Insider Attacks – As software becomes more secure, computer users will continue to be the weak link for companies and organizations. Criminals will focus their efforts on convincing end users to execute the attack instead of trying to find vulnerabilities in software.

-- Emerging Markets – Because cyber criminals take advantage of poor international cooperation against cybercrime and launch cross border attacks with little personal risk, threat to and from emerging and developing countries is increasing.

-- Blogging – The increased use of collaboration tools, such as blogging, also increases the possibility of leaking confidential business data.

-- Instant Messaging – Botnets, a collection of software robots that allow a system to be controlled without the owner’s knowledge, will continue to represent one of the biggest threats to the Internet.

-- Mobile Devices – Malware affecting mobile phones, PDAs and other wireless devices increased substantially in the last year, but has not yet materialized into pervasive outbreaks since they cannot spread on their own – yet. Therefore, this trend continues to be on the radar for 2006.

Explore further: Cool alternative to electric kettle avoids excess water

Related Stories

Rombertik malware: evasive, layered, out to steal

May 06, 2015

By now, you can at least compose some of the story line for a made-for-Hollywood script. Ten times over. Researchers at XYZ discover malware that steals login credentials and data. The malware du jour is ...

US cyber commander says hackers to 'pay a price'

May 11, 2015

The US strategy of "deterrence" for cyber-attacks could involve a wide range or responses, potentially including the use of conventional weapons, the nation's top cyber-warrior said Monday.

Hawaii telescope website taken down in apparent cyberattack

Apr 27, 2015

An apparent cyberattack Sunday temporarily disrupted the main website of Thirty Meter Telescope, the organization trying to construct one of the world's largest telescopes near the summit of Mauna Kea on Hawaii's Big Island.

Recommended for you

'Deep web search' may help scientists

5 hours ago

When you do a simple Web search on a topic, the results that pop up aren't the whole story. The Internet contains a vast trove of information—sometimes called the "Deep Web"—that isn't indexed by search ...

Finger gestures will tell your smartwatch what to do

7 hours ago

Gesture control for smartwatches is the key mission for a startup called Deus Ex Technology. They have devised a module which can fit into a smartwatch band and behave as a gesture controller for your timepiece. ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.