Client Login
Username:
Password:
 Quick Contact
Name:
Phone:
Email:
Cybercriminals Shifting Sight on Non-Windows Systems
Category : General 02 Feb 2011 06:15 AM | Industry News
Cisco refers to this as a "tipping point" that cybercriminals have reached in Windows systems. Consequently, attacks are rising on other devices such as Apple platforms like iPhones and iPads, as well as on other smart phones. Cisco also attributes the trend to increased public acceptance and use of such devices.
They’ve shifted their focus from Windows PCs to other operating systems and mobile platforms such as smartphones and tablets. In addition, incidences of “money muling” scams have grown. Users are also still vulnerable to the many ways these cybercriminals attempted to lure them into traps. This is creating new security challenges for CIOs struggling to adapt to the evolving security landscape while dealing with tight budgets.
Spam is down—2010 actually marked the first year of this—and we’re psyched that the decrease in some countries (like Turkey) is due to some high profile smackdowns and ISPs restricting malicious email, and authorities taking the problem more seriously. But don’t get too excited; we did see an increase in spam in developed countries including France, Germany and the United Kingdom. (In the UK, spam volume rose almost 99 percent from 2009 to 2010.)
We’re seeing an increase in money muling—people recruited to set up bank accounts, to help scammers “cash out” or launder money. These operations are becoming more elaborate and international in scope.
What we expect in terms of threats in 2011: Theft Trojans such as Zeus, easy-to-deploy web exploits and money mules will continue to rise, while social networking scams will not be as significant threat.
“Miscreants are continuing to find new and creative ways to exploit network, system, and even human vulnerabilities to steal information or do damage," says said John N. Stewart, vice president and chief security officer of Cisco. "The challenge is that we need to block their exploits 100 percent of the time if we are to protect our networks and information. They can be right once; we have to be right all of the time. We need to be ever-vigilant in our efforts to protect our assets, information, and ourselves online.” Here we take a look at key findings from Cisco’s report to reveal what you need to know about today’s security ecosystem.