2007 To See More Of Spam, Phishing and Rootkit Attacks
The round and round race between security software vendors and malware creators are here to stay in 2007, believes leading IT Management Company CA. The Internet criminals have again rendered ineffective, security advancements of the past year. They have been able to craft new methods to exploit vulnerable PCs.
Malware authors are progressing to erode the distinct divide between worms, viruses, trojans and spyware, remarked Brian Grayek, vice president of malware content research for CA in a company press release. He continued, spyware distributors know how to utilize the stealthy tactics employed by virus and worm creators. As a result, they have learnt how to quickly adapt to exploits and make the most of the slightest weaknesses in computer programs.
PC users must understand that simply visiting a website may put them in trouble. The bad guys do not have to rely only on malicious e-mail attachments to lure people to open them that lead to damage of their machines.
CA lists seven kinds of potential threats for 2007. The savvy Internet users are already familiar with some of them while many could be wholly new to some others. Quite likely some threats are blended with malware and attacks that evolve in 'multi-phased' exploits to strike the systems.
Other cyber crimes like spamming are predicted to rise in 2007. There will, however, be concentration on software and browser exploits. So will there be more of typo squatting, which is the process of linking mistyped domain names to malicious websites.
Phishers will use more of technical means by exploiting social engineering tactics to convince and effectively target even the knowledgeable users. There will also be increase in targeted attacks as criminals or disappointed employees could use malicious code for spying corporate data or stealing intellectual property.
The company predicts a rise in kernel rootkits as well. These are dangerous because standard anti-spyware programs cannot detect them from behind the desktop where they hide. If cyber criminals find it hard to penetrate through security defenses while launching conventional attacks they will turn to exploiting flaws in Web browsers and applications.
Related article: “Loopholes did not cause online banking thefts”: ICBC
» SPAMfighter News - 31-01-2007
We are happy to see you are reading our IT Security News.