More malicious attacks on the Threat Horizon warns ISF.
The ISF is already seeing a shift from indiscriminate events to highly targeted and planned attacks by organised crime groups that are developing more sophisticated 'business' models for extorting the e-economy and money laundering. A combination of social engineering and technical attacks are increasingly being used to steal identities and information in order to commit fraud.
The ISF also warns of the proliferation of malware aimed at mobile devices, which do not have the same anti-virus or security controls as traditional networks and PCs. The growing trend of mobile and remote working will inevitably attract new forms of mobile malware designed, for example, to create fraudulent payments or denial of service attacks.
Another area of growing risk is the rise of social networking sites such as Facebook and Bebo. In addition to providing another channel for the accidental leakage of corporate information, the ISF believes that cyber criminals will adapt new methods of attack to target the vulnerabilities of social networking sites. Virtual worlds such as Second Life may also present new risks if brand damage in the virtual world translates back into the real world.
Threat Horizon 2010 is one of over 200 authoritative reports along with information risk methodologies and benchmarking tools that are available free of charge to ISF Members. In addition, the latest ISF Standard of Good Practice for Information Security, which builds on the ISF's real-world research, is also available free to non-members at www.isfstandard.com
|Printer friendly Cite/link Email Feedback|
|Title Annotation:||Security News and Products; Information Security Forum|
|Date:||Jul 1, 2008|
|Previous Article:||Stonesoft IPS 4.3.|
|Next Article:||OSX.Trojan.pokerstealer Trojan horse attempts to take control of Macs.|