Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity

    Malicious Spam, Targeted Attacks Among Top Threats of 2014: Cisco

    By
    Nathan Eddy
    -
    January 23, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Malicious Spam, Targeted Attacks Among Top Threats of 2014: Cisco

      1 - Malicious Spam, Targeted Attacks Among Top Threats of 2014: Cisco

      by Nathan Eddy

      2Managing Compliance Is a Top Concern

      2 - Managing Compliance Is a Top Concern

      The most pervasive concern among chief information security officers (CISOs) may be the need to protect data that resides throughout an increasingly porous network, while spending precious resources on compliance. The report notes compliance alone is not equal to being secure—it is simply a minimum baseline focusing on the needs of a special regulated environment. Security, meanwhile, is an all-encompassing approach that covers all business activities.

      3Threat Alerts on the Rise

      3 - Threat Alerts on the Rise

      Technology vendors and researchers are finding an increasing number of new vulnerabilities; the discoveries result from the greater emphasis on highly secure development lifecycle use, as well as improvements in the security of their own products. The higher number of new vulnerabilities may also be a sign that vendors are examining their product code and fixing vulnerabilities before products are released and their vulnerabilities exploited, the report said.

      4Speedy Spam Is Still a Threat

      4 - Speedy Spam Is Still a Threat

      Spammers use speed as a tool to abuse email users’ trust by delivering massive amounts of spam when news events or trends lower recipients’ resistance to scams. For instance, Cisco found in the aftermath of the Boston Marathon bombing on April 15, 2013, two large-scale spam campaigns commenced—one on April 16 and another on April 17—designed to attract email users hungry for news of the event’s impact.

      5Java Leads the Web Exploits Pack

      5 - Java Leads the Web Exploits Pack

      Data from Sourcefire, now part of Cisco, shows that Java exploits make up 91 percent of indicators of compromise (IoCs) that are monitored by Sourcefire’s FireAMP solution for advanced malware analysis and protection. Java exploits far outstrip those detected in Adobe Flash or PDF documents, which are also popular vectors for criminal activity.

      6Maturation of BYOD Spurs Cyber-Crime

      6 - Maturation of BYOD Spurs Cyber-Crime

      Cisco security experts note that the more smartphones, tablets and other devices perform like traditional desktop and laptop computers, the easier it is to design malware for them. Apps are another area of concern; many users download mobile apps regularly without any thought of security, and mobility offers new ways for users and data to be compromised.

      7Targeted Attacks Continue to Persist

      7 - Targeted Attacks Continue to Persist

      Criminals go to great lengths to make sure targeted attacks go undetected, using methods that result in nearly imperceptible IoCs. Their methodical approach to gain entry into networks and carry out their mission involves an “attack chain”—the chain of events that leads up to and through the phases of an attack. Once these targeted attacks find a place in the network to hide, they efficiently carry out their tasks and usually conduct them without being noticed.

      8Pharmaceutical, Electronics Industries Are Prime Targets

      8 - Pharmaceutical, Electronics Industries Are Prime Targets

      Cisco security experts report that malware targeting these two industry verticals typically is designed to help actors gain access to intellectual property, which they, in turn, use for competitive advantage or sell to the highest bidder. Protecting users against these attacks involves keeping machines and Web browsers fully patched to minimize the number of vulnerabilities that an attacker can exploit.

      9Exploiting a Fragile, Expansive Ecosystem

      9 - Exploiting a Fragile, Expansive Ecosystem

      The newest twist in malicious exploits is to gain access to Web hosting servers, name servers and data centers—with the goal of taking advantage of the tremendous processing power and bandwidth they provide. Through this approach, exploits can reach many more unsuspecting computer users and have a far greater impact on the organizations targeted, whether the goal is to make a political statement, undermine an adversary or generate revenue. The report warns that one compromised hosting server can infect thousands of Websites and site owners around the world.

      10Malicious Traffic Detected in All Corporate Networks

      10 - Malicious Traffic Detected in All Corporate Networks

      In a recent project reviewing Domain Name System (DNS) lookups originating from inside corporate networks, Cisco threat intelligence experts found that in every case, organizations showed evidence that their networks had been misused or compromised. For example, 100 percent of the business networks analyzed by Cisco had traffic going to Websites that host malware, while 92 percent show traffic to Web pages without content that typically host malicious activity. In addition, 96 percent of the networks reviewed showed traffic to hijacked servers.

      11DDoS Attacks Increasing in Volume, Severity

      11 - DDoS Attacks Increasing in Volume, Severity

      “DDoS attacks should be a top security concern for organizations in the public and private sector in 2014,” John Stewart, senior vice president and chief security officer at Cisco, wrote in the report. “Expect future campaigns to be even more extensive and to last for extended periods. Organizations, particularly those that operate or have interests in industries that are already prime targets, such as financial services and energy, need to ask themselves, ‘Can we be resilient against a DDoS attack?'”

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×