- ISC updates critical DoS bug in BIND DNS software
- Android malware that can infiltrate corporate networks is spreading
- Firefox blocks websites with vulnerable encryption keys
- Ransomware spreads through weak remote desktop credentials
- Travis Perkins uses Splunk’s flexible cyber security monitoring to protect against customer data breaches
- 1 March 2012 11:22
Australia’s Cyber War Escalates in 2012 with Tripling of Data Attacks
According to Miller the rise in cybercrime levels and the intended outcome of these attacks in 2012 indicates a trend towards hackers relying on the more familiar penetration methods to achieve a goal of taking an organisation permanently offline.
“We are not identifying extremely complex data attacks that only an elite hacker could attempt. Rather hackers are focusing on the more common SQL Injection attack methods, with a slight move towards DDoS extortion attempts and a recent shift to 0day exploits,” Miller outlined.
“However the success rate for hackers is increasing with the growth of a global hacking community. At times we are seeing the tools necessary for a hack being downloaded by tens of thousands of end users in a very short period of time,” he said.
Miller also disputed the myth that smaller hacks or defacements were less disruptive to day-to-day business operations and Information Technology budgets. “The same actions and risk management procedures must be undertaken for any successful penetration into a corporate network, often resulting in a significant budget impact to IT departments and risk management procedures and solutions. Based on our experience with clients already this year, it is imperative that elements of information security are now moved into the necessary rather than optional category. This particularly applies to any Web Application Firewall device,” he concluded.
Pure Hacking is currently extending its services to meet the needs of its client base to better protect and manage information security events and intends on rolling out a range of new offerings over the coming months.
- 2016 ARN WIICTA awards now open for nominations
- Tassie Govt inaugurates innovation hubs to assist tech start-ups
- Japanese titan issues $350 million ASG Group takeover bid
- Attorney-General to exempt cyber security researchers from Privacy Act changes
- Telstra to cut up to 300 roles from retail business
- We don't need more InfoSec analysts: We need analysts to train AI infrastructures to detect attacks
- Start-up creates iPhone 7 analog headphone adapter, charger
- Evaluating customer engagement cloud solutions: Key questions to ask
- You can now use an iPhone to log into a Windows 10 PC, Microsoft says
- Facebook at Work launching Oct. 10
- Report: Australian ad viewability remains below global par
- CMO's top 10 martech stories for this week - 29 September
- CMO interview: GroupM CEO Mark Lollback on marketing, media, transparency and technology
- Melbourne Fashion Week: Using digital and insight to drive engagement and attendance
- Report: Australians still love a customer loyalty program