More targeted cyber attacks likely in 2006

Jan 23, 2006

The latest security report from IBM foresees cybercrime evolving from pervasive global outbreaks to smaller, stealthier attacks targeted at specific organizations for extortion purposes. IBM Global Business Security Index Report summarizes trends in security for last year and maps out what’s on the way in 2006.

"The decrease in pervasive attacks in 2005 is counter-intuitive to what society at large believes is a major threat to their personal data," said Cal Slemp, vice president of IBM's security and privacy services. "IBM believes that the environment has shifted – with increased security protection on most systems and stiffer penalties, we are seeing organized, committed, and tenacious profiteers enter this space. This means that attacks will be more targeted and potentially damaging. Organizations around the world – from the public and private sectors – must move quickly and work together to address this growing challenge."

The report identified several potential security trends for 2006, including:

-- Insider Attacks – As software becomes more secure, computer users will continue to be the weak link for companies and organizations. Criminals will focus their efforts on convincing end users to execute the attack instead of trying to find vulnerabilities in software.

-- Emerging Markets – Because cyber criminals take advantage of poor international cooperation against cybercrime and launch cross border attacks with little personal risk, threat to and from emerging and developing countries is increasing.

-- Blogging – The increased use of collaboration tools, such as blogging, also increases the possibility of leaking confidential business data.

-- Instant Messaging – Botnets, a collection of software robots that allow a system to be controlled without the owner’s knowledge, will continue to represent one of the biggest threats to the Internet.

-- Mobile Devices – Malware affecting mobile phones, PDAs and other wireless devices increased substantially in the last year, but has not yet materialized into pervasive outbreaks since they cannot spread on their own – yet. Therefore, this trend continues to be on the radar for 2006.

Explore further: Analyzing gold and steel – rapidly and precisely

add to favorites email to friend print save as pdf

Related Stories

CloudFlare tackles lost SSL key risk with Keyless SSL

Sep 19, 2014

Organizations looking for and concerned about optimal security protection are the targets of a new service announced by San Francisco-based CloudFlare. The offering is called Keyless SSL. CloudFlare explained ...

IBM and Intel bring new security features to the cloud

Sep 09, 2014

IBM today announced that SoftLayer it will be the first cloud platform to offer its customers bare metal servers powered by Intel Cloud Technology that provides monitoring and security down to the microchip level.

Sony attack shows shifting online security threat

Sep 04, 2014

The boundary between the online and physical worlds got blurry last week when Sony's PlayStation Network was disabled by an online attack, while simultaneously an American Airlines passenger jet carrying ...

100,000 elephants killed in Africa, study finds

Aug 18, 2014

Poachers killed an estimated 100,000 elephants across Africa between 2010 and 2012, a huge spike in the continent's death rate of the world's largest mammals because of an increased demand for ivory in China ...

Recommended for you

Modi wields broom in new 'Clean India' push

1 hour ago

Prime Minister Narendra Modi wielded a broom in a New Delhi slum on Thursday as he pledged to sweep away India's reputation for poor public hygiene and rudimentary sanitation.

Desktop device to make key gun part goes on sale in US

11 hours ago

The creator of the world's first 3D plastic handgun unveiled Wednesday his latest invention: a pre-programmed milling machine that enables anyone to easily make the core component of a semi-automatic rifle.

Twitter-funded lab to seek social media insights

11 hours ago

A new Twitter-funded research project unveiled Wednesday, with access to every tweet ever sent, will look for patterns and insights from the billions of messages sent on social media.

User comments : 0