Protect your corporate IT network from hackers and other unwanted intruders with Proxy Sentinel™. Click here for all the details and get the peace of mind you deserve.
Back to our Homepage Proxy Sentinel™ high performance Internet proxy server and secure firewall solution Firewall Sentinel™ secure & powerful Internet firewall solution About Internet Security.ca and GCIS Frequently Asked Questions on Internet security issues Internet Security Industry News - Stay informed of what's happening Contact Internet Security.ca today and order your Proxy Sentinel™ or Firewall Sentinel™ server now!


Cyber crime increased a lot in 2005

Google
Save your company's valuable data with Proxy Sentinel™ from Internet Security. Click here for all the details.

January 25, 2006

2005 was a year where so-called rootkits went mainstream. It was also a year that saw malware transform itself into criminal activity. Despite all of this, Internet security still improved nevertheless. Last year, there was no global pandemic like the Slammer or Blaster worm juggernaut of 2004.

Also, there was no malware with a replication magnitude of the order of Code Red, Slammer, Nimda or even the ILoveYou virus that showed its ugly head at the end of 2003.

With the notable exception of PHP worms or a few of its variants, even the Linux side had fewer popular viruses and worms in 2005.

What's more, patching certainly got a lot easier too. Not only did more and more sophisticated patch management tools arrive from every sector, but there were fewer security patches to deploy.

Network administrators got better at blocking hackers and malware. And end users don't click on every file attachment they receive either.

But security onslaughts attain greater significance as the year saw the metamorphosis of cyber malice into a highly organized and sophisticated international crime syndicate, where the likes of ‘phishing’ and ‘spamming’ have gone through drastic evolution.

Eighty-seven per cent of the more than 2,000 public and private enterprises that took part in the FBI survey said that they had undergone one or the other kind of security attack.

Virus, spyware and adware top the list where a significant amount of businesses faced systems and data sabotage. One third of the companies detected port scans of their systems, a method used by attackers to identify vulnerable PCs to sneak in, the survey said.

A staggering 98 per cent of survey respondents said they used antivirus software, of which nearly 84 per cent still suffered a virus attack.

According to U.S.–based security and communications software vendor MicroWorld Technologies Inc. in Farmington Hills, Mich., many antivirus software products fail to prevent virus attacks because they work in a reactive way with known virus signatures, and hence cannot take on newer threats.

Enterprises must revaluate the kind of technology and effectiveness of many leading antivirus and security software they use.

The stuff that is getting by our defenses is more dangerous: Malware went criminal. Most of today's malware exists to steal confidential information, send spam, or steal identities. Now, malware is getting harder to remove, hiding better, and contains more tricks and exploits than ever.

IT managers and system administrators reported spyware and viruses were the most common problem, followed by port scans, sabotage of data or networks, and adult pornography. While not necessarily illegal, adult pornography is against the policy of most organizations, the study noted.

Get the best Linux or Windows Web hosting plan for your website.
Get the lowest rate and the best tech support on any Linux or Windows hosting plan. Learn more by clicking here.

More than 50 per cent of hacking attempts came from within the U.S. and from China, as many organizations were able to trace where intrusion attempts originated. But hackers are using computers that are under their control but located in other countries, combined with the use of proxies to make detection more difficult.

The FBI said a Romanian hacker could use a proxy computer in China to gain access to a compromised computer in the U.S., leading to a false conclusion that the attack originated in the U.S.

Antivirus software is widely used, and most organizations also have firewalls in place, the survey said. But 44 per cent reported that intrusions came from within their own organizations, and "this is a strong indicator that internal controls are extremely important and should not be underemphasized while concentrating efforts on deterring outside hackers," the FBI said.

Nearly two-thirds of those surveyed had implemented event logging on their network, a measure the FBI said is a crucial element in tracking crime. And half of those stored the logs on a remote protected server.

Source: IT World Canada

Google


Save Internet Security.ca's URL to the list of your favorite web sites in your Web browser by clicking here.

Become an authorized reseller of Proxy Sentinel™ and Firewall Sentinel™. Do like the rest of our authorized resellers and have your clients benefit the important security features of our products and solutions, while increasing your sales at the same time. Click here for all the details.


You can link to the Internet Security web site as much as you like. Read our section on how your company can participate in our reciprocal link exchange program and increase your rankings in the major search engines such as
Google and all the others.

Click here to order your Proxy Sentinel™ Internet security server today!

Proxy Sentinel™ is the most secure Internet proxy server on the market today. Click here for more information.
Site optimized by Pagina+™
Powered by Sun Hosting
Search engine keywords by Rank for Sales
Development platform by My Web Services
Internet Security.ca is listed in
Global Business Listing

| Home | Proxy Sentinel™ | Firewall Sentinel™ | FAQ | News | Sitemap | Contact |
Copyright © Internet Security.ca    Terms of use    Privacy agreement    Legal disclaimer