- RadioShack update: User data is safe for now, while Sprint co-branding is in the works
- Over 100,000 devices can be used to amplify DDoS attacks via multicast DNS
- Palo Alto service to flag particularly evil security attacks
- Obama authorizes sanctions against hackers
- Middle-Eastern 'Volatile Cedar' cyberattack breached western defence firms
- 1 March 2012 11:22
Australia’s Cyber War Escalates in 2012 with Tripling of Data Attacks
According to Miller the rise in cybercrime levels and the intended outcome of these attacks in 2012 indicates a trend towards hackers relying on the more familiar penetration methods to achieve a goal of taking an organisation permanently offline.
“We are not identifying extremely complex data attacks that only an elite hacker could attempt. Rather hackers are focusing on the more common SQL Injection attack methods, with a slight move towards DDoS extortion attempts and a recent shift to 0day exploits,” Miller outlined.
“However the success rate for hackers is increasing with the growth of a global hacking community. At times we are seeing the tools necessary for a hack being downloaded by tens of thousands of end users in a very short period of time,” he said.
Miller also disputed the myth that smaller hacks or defacements were less disruptive to day-to-day business operations and Information Technology budgets. “The same actions and risk management procedures must be undertaken for any successful penetration into a corporate network, often resulting in a significant budget impact to IT departments and risk management procedures and solutions. Based on our experience with clients already this year, it is imperative that elements of information security are now moved into the necessary rather than optional category. This particularly applies to any Web Application Firewall device,” he concluded.
Pure Hacking is currently extending its services to meet the needs of its client base to better protect and manage information security events and intends on rolling out a range of new offerings over the coming months.
- Transition to the Agile Data Centre. Partnering with innovators to drive business and IT forward.
- AusCERT2015 | st-5th June 2015 | Hear from Brian Krebs, Eva Galperin and Bruce Schneier - New registration packages
- Check out the NEW f5 Resource centre | New content, infographics, white papers and research
- Maximise Your Negotiation Power Over Big Storage - LEARN HOW
- 5 for 15: Sumal Karunanayake, ForgeRock senior vice-president Asia-Pacific and Japan
- 5 for 15: Todd Parsons, Avaya Australia and New Zealand channel director
- Aussie appetite for fast broadband proves to be insatiable
- Dicker Data partners NEXTDC to provide "affordable" Cloud solutions
- There should be a ‘when, not if’ approach to security issues in the channel: LogRhythm
- Target: Emotional social vital to customer experience management
- CMO Interview: What it takes to be a smart marketing chief
- How NPS has helped NIB keep customers
- Report reveals obstacle to better customer service is organisational, not technical
- Stackla and Hootsuite partner to launch new social media integration