Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

IIA Wants ISPs’ Contribution in iCode Evaluation

IIA, in an effort to strengthen its iCode, has summoned involved security companies and ISPs to make their contributions towards the code's evaluation, published computerworld.com dated April 3, 2012.

It maybe mentioned that the iCode represents certain "industry codes" for voluntary adoption to enable ISPs combat online-crime from malware or botnets, as well as extend co-operation in making disclosures and reporting.

Essentially, the iCode's purpose is to stop 'zombie' PCs, while being part of Australian networks, in transmitting user-data elsewhere devoid of the subscriber's consent, alternatively get included into bigger networks of contaminated PCs with which to wage assaults against other networks worldwide.

Relevant at this juncture is the Data Breach Investigation Report of 2012 by Verizon, according to which, hacking and malware incidences had been the most popular means for carrying out data breaches during 2011. The study paper states that malware at 57% and hacking at 86% happened to be considerable threats since they were involved in one way or another within 99% of overall incidences related to data breaches. The threats' popularity can be attributed to attackers' ability to have a hurdle-free gateway, remote access, as well as automation.

Furthermore, social-engineering tactics too became more-and-more widespread with their association with 50%-or-more of all infringements probed, states Verizon. Other mediums that were most ordinarily utilized to execute breaches during 2011 were exploitation-prone easily-cracked or default passwords (29%); backdoor Trojans (26%); filched credentials (24%); command-and-control servers (23%); spyware and keyloggers (18%), and SQL-insertions (13%).

John Lindsay, Director of IIA says that by using the iCode's protective measures, the total count of impacted ISPs has gone down. Armnet.com.au published this on April 3, 2012.

Lindsay further says that IIA is determined for mitigating the innumerable contaminated systems that are behind nearly all of the global spam, endanger safeguard of personal information as also threaten national security.

However, experts within USA, where there's been a likewise code registration, have commented on the Australian iCode as deficient in metrics.

Meanwhile, IIA is all set to discuss the iCode's evaluation results on June 14, 2012 the starting day of a week-long Cyber Security Awareness Program, sources state.

Related article: IE & Gmail Show Up with Alarming Vulnerabilities

» SPAMfighter News - 4/14/2012

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next