Sentrigo Announces Data Security Threats for 2010
California-based Sentrigo Inc., a database security company, announced in the end week of December 2009 the most likely data security threats for 2010 from which Internet users need to be careful.
According to the company, organizations believe that attacks emanate either from outside the network or from internal misuse of rights by users. However, Sentrigo states that a previously-unknown danger (external hacks) emanating from inside organizations is expected to rise during 2010.
Actually, the distinction between external and internal attacks is fading due to many new attack vectors. First, well-arranged crime syndicates (gangs) that aim at particular organizations by getting their people to penetrate the companies as contractors or employees. These people acquire access to confidential database and transfer it to their gang leaders. Thus, once stolen, cyber criminals use the database against organizations by holding them for ransom.
Secondly, new kinds of malware, implanted on more-or-less harmless-looking websites, will increasingly emerge to compromise organizations' systems and then strike them from inside during 2010.
Thirdly, as the recession completely depressed the economy and causing increased unemployment, there will be frequent use of monetary lures either as extortions or bribes to make organizations' internal people help outsiders during 2010. The result will be loss of data which will be sold in the underground market to help phishers and spammers gain financial benefits.
According to Sentrigo, 2010 will witness malicious attacks with more sophisticated, fully automatic and easier to execute techniques. Consequently, random assaults will increase, which no longer target any particular organization rather they will hunt for specific security loopholes with which malicious programs could be embedded for malware distributors to retrieve later.
Finally, cloud computing will continuously face obstructions from data security during 2010.
Data protection becomes harder with cloud computing, explained Sentrigo. This happens because of frequent moves of data, which can even be duplicated in the absence of a notification. Another reason cited is the short-lived nature of software, which enable admission to this data. Indeed, researchers think there'll be increased "exploits-as-a-service," especially as Amazon has already been utilized for hosting a command-and-control server for malware.
» SPAMfighter News - 12-01-2010