One Article Review

Accueil - L'article:
Source NetworkWorld.webp Network World
Identifiant 349028
Date de publication 2017-03-29 08:35:00 (vue: 2017-03-29 08:35:00)
Titre IBM on the state of network security: Abysmal
Texte The state of online security is darn dreadful. At least if you look at the results from the IBM Security's 2017 IBM X-Force Threat Intelligence Index released today which contains myriad depressing nuggets such as: The number of records compromised grew a historic 566% in 2016 from 600 million to more than 4 billion -- more than the combined total from the two previous years. In one case, a single source leaked more than 1.5 billion records [see Yahoo breach]. In the first three months of 2016, the FBI estimated cybercriminals were paid a reported $209 million via ransomware. This would put criminals on pace to make nearly $1 billion from their use of the malware just last year. In 2016, many significant breaches related to unstructured data such as email archives, business documents, intellectual property and source code were also compromised. The most popular types of malcode we observed in 2016 were Android malware, banking Trojans, ransomware offerings and DDoS-as-a-service vendors. Since DDoS tools are mostly sold as a service and not as malware per se, we will focus here on banking Trojans, Android malware and ransomware. In December 2016, a malware developer with an ongoing banking Trojan project showed up in underground forums, aspiring to sell some licenses as he worked on completing the development of all its modules. The actor promised to deliver future capabilities, such as a Socket Secure (SOCKS) proxy and hidden virtual network computing alongside technical support and free bug fixes. The malware was named Nuclear Bot, or NukeBot, at the time. IBM wrote it has yet to see NukeBot/Micro Bot active in the wild, analyses performed by X-Force and other vendors found that it has the potential to rise in 2017 and bring back commercial Trojan sales in the underground. In 2015, Healthcare was the most attacked industry with Financial Services falling to third, however, attackers in 2016 refocused back on Financial Services. IBM did note that while the healthcare industry continued to be beleaguered by a high number of incidents, attackers hit on smaller targets resulting in a lower number of leaked records. In 2016, only 12 million records were compromised in healthcare - keeping it out of the top 5 most-breached industries. For perspective, nearly 100 million healthcare records were compromised in 2015 resulting in an 88% drop in 2016, IBM stated.To read this article in full or to leave a comment, please click here
Envoyé Oui
Condensat $209 100 2015 2016 2017 566 600 abysmal active actor all alongside also analyses android archives are article as: aspiring attacked attackers back banking beleaguered billion bot breach breached breaches bring bug business capabilities case click code combined comment commercial completing compromised computing contains continued criminals cybercriminals darn data ddos december deliver depressing developer development did documents dreadful drop email estimated falling fbi financial first fixes focus force forums found free from full future grew has healthcare here hidden high historic hit however ibm incidents index industries industry intellectual intelligence its just keeping last leaked least leave licenses look lower make malcode malware many million modules months more most mostly myriad named nearly network not note nuclear nuggets nukebot nukebot/micro number observed offerings one ongoing online only other out pace paid per performed perspective please popular potential previous project promised property proxy put ransomware read records refocused related released reported resulting results rise sales secure security security: see sell service services showed significant since single smaller socket socks sold some source state stated such support targets technical than third threat three time today tools top total trojan trojans two types underground unstructured use vendors virtual which wild will worked would wrote yahoo year years yet
Tags
Stories Yahoo
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: