• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security Experts Say Botnets, Web Extortion Threats on the Rise

    January 22, 2007 Timothy Prickett Morgan

    Some days, the Internet doesn’t feel like a very safe place. Two reports issued recently are predicting some pretty ugly weather conditions out there in cyberspace looking ahead into third year.

    A report by Trend Micro, which provides security software for servers and PCs, indicated that 2006 saw a “resurgence in malware” and that the “botnet became the hacker’s best friend.” For 2007, Trend Micro is predicting that hackers will continue to ramp up their efforts on these fronts while targeting popular social networking sites.

    What did not happen in 2006, by the way, was widespread virus outbreaks, which we have seen in prior years. Now, hackers are doing more targeted or regional attacks. This is both comforting and alarming at the same time–comforting because you don’t have to cope with a virus outbreak, but alarming if you happen to be the target of the attack. In many cases, these targeted attacks use various pieces of malware and distributed denial of service (DDOS) approaches to try to bring down the systems at a specific company or user group, according to Trend Micro.

    Organized crime is using identity theft and the threat of attacks to conduct corporate espionage, and extortion, and hackers have adopted botnets–remote robots created by viruses and other malware that sit unsuspected on Internet-connected PCs that can do a DDOS–to do havoc.

    The company said that digital threats have increased by an average of 163 percent per year over the past several years. Web-based threats grew 15 percent from 2005, with nearly a half million reports into TrendLabs, the analysis and tracking side of Trend Micro. More than 2 million unique pieces of spam per month and 140,000 unique bots per month flood the Internet.

    “Computer crime has evolved into organized crime, it is no longer the game of individual attackers,” said Jamz Yaneza, the senior threat research analyst at Trend Micro who put together the 2007 threat report. “With money as their main driver, our research has tracked how attacks have moved from being fast and large scale to being cleverly crafted to attack very specific groups under the radar. The unseen Web threat is maturing, and users should be ever-more careful about what they download and install, as blended threats are ever-more cunning in their attempt to steal corporate and personal data or money.”

    Risk Bloggers, a federation of blogs put together by computer and network security experts, released a similar warning report last week, called Ready or Not, Here Comes 2007. “What do you call billions of spam messages, millions of lost customer records, thousands of new viruses, and hundreds of governments asleep at the wheel?” asked the report’s author, Jim Reavis rhetorically. “In our business, we call it 2006, just a normal year in the information security industry.”

    Reavis offers a pretty sobering outlook for security in 2007. “Increasingly, sophisticated criminal organizations are able to exploit technology to stay ahead of corporate and consumer defenses and steal billions of dollars and disrupt whole economies. Botnets, Web application holes and uncontrolled mobility loom large as villains in this tale. Skepticism about the government’s ability to be relevant in face of these challenges abounds.” Reavis is president of Reavis Consulting, which as the name suggests does consulting on security issues and which hosts the RiskBlogger site.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 3 -- January 22, 2007

    Sponsored by
    DRV Technologies, Inc.

    Get More from Your IBM i

    Many users today struggle to get at the data they need on the IBM i. When users get reports, they look like they were formatted some time last century.

    Some organizations are still printing pre-printed forms and checks on impact printers.

    How often do operators log on to their system to look for messages they hope they don’t find?

    All of these scenarios can affect users’ perception of the IBM platform negatively, but there are simple solutions.

    DRV Technologies Inc. develops innovative solutions that help customers get more from their IBM i systems.

    Solutions include:

    • SpoolFlex spool conversion & distribution
    • FormFlex electronic forms
    • SecureChex MICR laser check printing
    • MessageFlex system monitoring

    FlexTools streamline resources, improve efficiency and enable pro-active system management.

    Better software, better service, DRV Tech.

    Learn how you can get more from your IBM i at www.drvtech.com

    Call 866 378-3366 for a Free Demonstration

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Ending Subsystems Properly IBM Lotus Adds Handles to Information Overload

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 3

This Issue Sponsored By

    Table of Contents

    • New Congress, AT&T Revive the Net Neutrality Issue
    • Security Experts Say Botnets, Web Extortion Threats on the Rise
    • Big Blue Readies Revamped Storage for the System i
    • Study Weighs Building Data Centers Against Colocation for SMBs
    • IBM Closes Out 2006 With a Strong Fourth Quarter
    • Sun Patches Security Holes in Java Runtime Environment
    • Zend Describes Multiple Instances on i5/OS, Previews RPG Wrapper
    • Big Blue Readies Revamped Storage for the System i
    • Ask TPM: The Economics of Open Source Software
    • IBM Closes Out 2006 With a Strong Fourth Quarter

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • LANSA Developing Business Intelligence Tool
    • Blazing The Trail For VTL In The Cloud
    • Data De-Dupe Gives VTL Customers More Options
    • Four Hundred Monitor, March 29
    • The Big Spending On IT Security Is Only Going To Get Bigger
    • IBM Tweaks Some Power Systems Prices Down, Others Up
    • Disaster Recovery: From OS/400 V5R3 To IBM i 7.4 In 36 Hours
    • The Disconnect In Modernization Planning And Execution
    • Superior Support: One Of The Reasons You Pay The Power Systems Premium
    • IBM i PTF Guide, Volume 25, Number 13

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2023 IT Jungle