- 1 March 2012 11:22
Australia’s Cyber War Escalates in 2012 with Tripling of Data Attacks
According to Miller the rise in cybercrime levels and the intended outcome of these attacks in 2012 indicates a trend towards hackers relying on the more familiar penetration methods to achieve a goal of taking an organisation permanently offline.
“We are not identifying extremely complex data attacks that only an elite hacker could attempt. Rather hackers are focusing on the more common SQL Injection attack methods, with a slight move towards DDoS extortion attempts and a recent shift to 0day exploits,” Miller outlined.
“However the success rate for hackers is increasing with the growth of a global hacking community. At times we are seeing the tools necessary for a hack being downloaded by tens of thousands of end users in a very short period of time,” he said.
Miller also disputed the myth that smaller hacks or defacements were less disruptive to day-to-day business operations and Information Technology budgets. “The same actions and risk management procedures must be undertaken for any successful penetration into a corporate network, often resulting in a significant budget impact to IT departments and risk management procedures and solutions. Based on our experience with clients already this year, it is imperative that elements of information security are now moved into the necessary rather than optional category. This particularly applies to any Web Application Firewall device,” he concluded.
Pure Hacking is currently extending its services to meet the needs of its client base to better protect and manage information security events and intends on rolling out a range of new offerings over the coming months.
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- The Future is Encrypted. Manage It.
- New Destination Gigamon Security Resources IS HERE
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Join ME Bank, Deutsche Bank and Proofpoint (USA) speakers for a discussion on banking trojans. Register now
- Ransomware explosion is the latest security wakeup call for CxOs
- Caution: That SSL Blind Spot is Growing
- Deakin University taps Thomas Duryea for Citrix and AppSense deployment
- UXC Red Rock to leverage NetSuite ecosystem following Oracle merger
- ACCC warns against tax scams as ransomware increases
- Oracle squares up to Cloud rivals with $US9.3 billion NetSuite acquisition
- WA government seeks aid from local integrator on ICT strategy
- Black Hat security conference trims insecure features from its mobile app
- Windows 7 PCs with free OS upgrade are still available, for now
- Microsoft listens and learns, pulls a passing grade for Windows 10's freshman year
- Tech boosts the fan experience at U.S. Bank Stadium
- Meet OPPO, the fastest-growing smartphone brand in the world