Cyber Espionage Needs Strong Dealing By International Community

According to director and chief economist Scott Borg of U.S. Cyber Consequences Unit, a research institute that runs on a no-profit basis, the most extensive cyber crime being conducted today involves stealing of entrepreneurial information. SCMagazine.com published this on January 7, 2008.

The research institute therefore calls for serious consideration to warnings of dreadful consequences of Web spying and the effects they impose on the overall security of United States and the commercial activities of business organizations in the country.

Borg continues to say that the risk of online spying on U.S' critical infrastructure such as the transportation system, the power grid, and the financial systems of the country means just as much risk to the government and military of United States as it is with spying on those institutions. The government departments are not separate any more; they are as well reliant on the nation's infrastructure. SCMagazine reported this.

Following McAfee Avert Labs' recent report warning about the growth of worldwide cyber espionage as the highest level of security in 2008, security research and communications manager Dave Marcus at AvertLabs said spying via the Internet does not have to stretch that far to be in favor of the perpetrators. SCMagazine.com published this.

According to the report, McAfee believes government and groups allied to it are conducting highly sophisticated online spying, with a lot of attacks tracing to China. The report assumes that some 120 nations could be gearing to develop such activities.

McAfee, which compiled its report using inputs from the Serious Organized Crime Agency of U.K., inputs from the FBI and inputs from the NATO, said that NATO officials believed that the Estonian cyber attacks in 2007 was responsible to trigger all international disruptions.

According to NATO, attackers are employing Trojan programs to target specific government departments where 99% of incidents are flying past detection. The coordination and complexity observed in the Estonian attacks was rather new. They were launched in a wave of well-timed strikes using various techniques. The attackers halted their attacks with deliberate moves rather than someone else shutting them down. Mg.co.za published this on January 7, 2008.

Related article: Cyber Child abuser Sentenced To Imprisonment

» SPAMfighter News - 18-01-2008

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next