More targeted cyber attacks likely in 2006

Jan 23, 2006

The latest security report from IBM foresees cybercrime evolving from pervasive global outbreaks to smaller, stealthier attacks targeted at specific organizations for extortion purposes. IBM Global Business Security Index Report summarizes trends in security for last year and maps out what’s on the way in 2006.

"The decrease in pervasive attacks in 2005 is counter-intuitive to what society at large believes is a major threat to their personal data," said Cal Slemp, vice president of IBM's security and privacy services. "IBM believes that the environment has shifted – with increased security protection on most systems and stiffer penalties, we are seeing organized, committed, and tenacious profiteers enter this space. This means that attacks will be more targeted and potentially damaging. Organizations around the world – from the public and private sectors – must move quickly and work together to address this growing challenge."

The report identified several potential security trends for 2006, including:

-- Insider Attacks – As software becomes more secure, computer users will continue to be the weak link for companies and organizations. Criminals will focus their efforts on convincing end users to execute the attack instead of trying to find vulnerabilities in software.

-- Emerging Markets – Because cyber criminals take advantage of poor international cooperation against cybercrime and launch cross border attacks with little personal risk, threat to and from emerging and developing countries is increasing.

-- Blogging – The increased use of collaboration tools, such as blogging, also increases the possibility of leaking confidential business data.

-- Instant Messaging – Botnets, a collection of software robots that allow a system to be controlled without the owner’s knowledge, will continue to represent one of the biggest threats to the Internet.

-- Mobile Devices – Malware affecting mobile phones, PDAs and other wireless devices increased substantially in the last year, but has not yet materialized into pervasive outbreaks since they cannot spread on their own – yet. Therefore, this trend continues to be on the radar for 2006.

Explore further: What's next for the smartphone in a rapidly changing market?

add to favorites email to friend print save as pdf

Related Stories

Sensor network tracks down illegal bomb-making

Oct 01, 2014

Terrorists can manufacture bombs with relative ease, few aids and easily accessible materials such as synthetic fertilizer. Not always do security forces succeed in preventing the attacks and tracking down ...

CloudFlare tackles lost SSL key risk with Keyless SSL

Sep 19, 2014

Organizations looking for and concerned about optimal security protection are the targets of a new service announced by San Francisco-based CloudFlare. The offering is called Keyless SSL. CloudFlare explained ...

Recommended for you

Sweeping air devices for greener planes

17 minutes ago

The large amount of jet fuel required to fly an airplane from point A to point B can have negative impacts on the environment and—as higher fuel costs contribute to rising ticket prices—a traveler's wallet. ...

World record in data transmission with smart circuits

36 minutes ago

Fewer cords, smaller antennas and quicker video transmission. This may be the result of a new type of microwave circuit that was designed at Chalmers University of Technology. The research team behind the ...

Robots recognize humans in disaster environments

1 hour ago

Through a computational algorithm, a team of researchers from the University of Guadalajara (UDG) in Mexico, developed a neural network that allows a small robot to detect different patterns, such as images, ...

Researchers developing algorithms to detect fake reviews

1 hour ago

Anyone who has conducted business online—from booking a hotel to buying a book to finding a new dentist or selling their wares—has come across reviews of said products and services. Chances are they've also encountered ...

User comments : 0