Tuesday, February 12, 2008

Predicting the Main Internet Threats for 2008 - How Safe Is It to Click on the Keyboard?

Internet security company BitDefender has identified mobile malware, botnets, phishing and identify theft as the main IT threats for 2008. Defending against this virtual onslaught requires a joined-up approach between security managers, IT staff and users, especially those who use PDAs, laptops or who dial in from home PCs.

In summary the key threats are:

- Targeted expoits of malware and money driven actions (because of a significant rise in organised criminal activity on the internet).

- Attempts to target private databases, financial information and internet banking details. The use of SSL authentication by phishing websites to get the 'lock icon' look in the victim's browser is expected to increase.

- An increase in filter-circumventing spam.

- Mobile devices, largely because connectivity via channels like Wi-Fi, GPRS and Bluetooth will continue to allow opportunities for malware applications to steal sensitive data.

- Botnets, which remotely take control of computers. Would you know if your home PC was already a victim?

- Worms, Trojans and viruses. The new and improved backdoor Zlob Trojan is predicted to become one of the major threats over the next year.

The company warns that while traditional antivirus and other security providers are focused on protecting computer applications, today's biggest threats and most prominent emerging threats are targeted at the online lifestyle, employing subterfuge and social engineering to deceive users into becoming victims. For more click here.

IT Security is addressed in detail on Security Management Stages 1, 2 and 3. Forthcoming courses are as follows:

18-29 February 2008 – Security Management Stage 2 – Kuala Lumpur
31 March – 11 April – Security Management Stage 1 – UK
12 – 23 May - Security Management Stage 3 – UK

Last year ARC produced a comprehensive 40-page handout to enable security managers to better understand IT security. If you have previously attended any of Security Management Stages 1, 2 or 3, and wish to obtain a copy of this handout, contact David.