Printer Friendly

More malicious attacks on the Threat Horizon warns ISF.

The Information Security Forum (ISF) is warning of an increase in malicious threats including attacks from organised crime and industrial espionage, along with a rise in mobile malware and Web 2.0 vulnerabilities. These are just some of the predictions that will heighten information security challenges over the next few years, highlighted in an ISF report entitled Threat Horizon 2010. The report draws on the knowledge and practical experiences of ISF Members, comprising some 300 of the world's largest business and public sector organisations.

The ISF is already seeing a shift from indiscriminate events to highly targeted and planned attacks by organised crime groups that are developing more sophisticated 'business' models for extorting the e-economy and money laundering. A combination of social engineering and technical attacks are increasingly being used to steal identities and information in order to commit fraud.

The ISF also warns of the proliferation of malware aimed at mobile devices, which do not have the same anti-virus or security controls as traditional networks and PCs. The growing trend of mobile and remote working will inevitably attract new forms of mobile malware designed, for example, to create fraudulent payments or denial of service attacks.

Another area of growing risk is the rise of social networking sites such as Facebook and Bebo. In addition to providing another channel for the accidental leakage of corporate information, the ISF believes that cyber criminals will adapt new methods of attack to target the vulnerabilities of social networking sites. Virtual worlds such as Second Life may also present new risks if brand damage in the virtual world translates back into the real world.

Threat Horizon 2010 is one of over 200 authoritative reports along with information risk methodologies and benchmarking tools that are available free of charge to ISF Members. In addition, the latest ISF Standard of Good Practice for Information Security, which builds on the ISF's real-world research, is also available free to non-members at www.isfstandard.com
COPYRIGHT 2008 A.P. Publications Ltd.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2008 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:Security News and Products; Information Security Forum
Publication:Software World
Geographic Code:1USA
Date:Jul 1, 2008
Words:326
Previous Article:Stonesoft IPS 4.3.
Next Article:OSX.Trojan.pokerstealer Trojan horse attempts to take control of Macs.
Topics:


Related Articles
Information Security--new standard for 2005.
"Malware evolution: January - March 2005".
Spit and other new security threats from VoIP.
VoIP security is a concern.
Spyware--the hidden threat to business security.
Security and products; Webroot cautions online 'lovers'.
Sarbanes-Oxley at cost of other security spending.
Information Security Forum spreads the word.

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |