Read Bennett Gold LLP's privacy policies and practices regarding this web site.
LINK TO: Bennett Gold LLP's Privacy Policies and Practices. E-CommerceALERT.com is part of the Bennett Gold LLP web site network.
LINK TO: Bennett Gold LLP, Chartered Accountants, home page.
LINK TO: E-CommerceALERT.com Home Page.
CLICK to GO BACK to Main Page.

Research and retrieval of news articles by Bennett Gold LLP, Chartered Accountants


SPECIAL NOTE TO ALL VISITORS:
Effective December 31, 2012, articles are no longer being updated on this web site.
The site is now maintained as an historical archive, covering articles from the period 1999 to 2012.


HACKERS TO TAKE AIM AT THE CLOUD, VIRTUALIZATION

Source: InternetNews.com

Posted on January 19, 2009

      The booming popularity of virtualization, cloud computing and other new technologies may prove too tempting for malware authors to resist - and could prompt a wave of attacks in 2009, according to security vendor AppRiver.

      Businesses may be especially at risk because they're looking to such technology to help them cut costs during the recession, Fred Touchette, senior security analyst at AppRiver, told InternetNews.com.

      While these technologies will see strong growth this year, despite the grim outlook for overall IT spending, they also could mean better potential paydays for the hackers.

      "The threat against virtualization will be a factor simply because more and more enterprises are going virtual," Touchette said. "I see viruses being able to crack into virtual machines and getting past their shells."

      Concerns about cybercrime's growth peaked in recent months, following several recent, high-profile data breaches at large corporations or targeting public figures. Worries about the trend led senior California Sen. Dianne Feinstein (D-Calif.), who is the incoming Senate Intelligence Committee chair, to re-introduce legislation on data breaches and protection of individual privacy last week. These measures seek to ensure victims of security breaches are informed promptly when these breaches occur.

      Meanwhile, malware authors are creating ever more sophisticated attacks, Touchette said. Some viruses are already showing signs of being able to detect when they're in virtualized environments, he added, but they then either refuse to run or remove themselves completely so they cannot be tracked. That's because research analysts use virtual machines when they analyze viruses - and the malware authors are aware of this, he said.

      Likewise, as more enterprises begin moving into the cloud, they will also begin to encounter security vulnerabilities because it will be a new area for them, Touchette said.

      The same may hold true for the proliferation of advanced smartphones, which make it simple for developers to create new applications that users can download to their devices.

      Touchette said the Apple iPhone and Android-based devices may emerge as significant targets, given the popularity of the iPhone - which is increasingly being adopted in the enterprise - and the ease of developing on the Google-backed Android platform.

      "The code is readily available so you can write your own applications, whether they are useful or malicious," he said.

      While corporate databases have long been eyed by hackers seeking users' personal information, career sites and social networking sites are also emerging as potential targets. That's not surprising, considering the vast amount of data they may contain about their members, Touchette said - and the trend will accelerate in 2009.

      Already, hackers have begun targeting Facebook and LinkedIn to get that information. And in the coming year, hackers will gun for more targets, Touchette predicted.

      "I've already seen people phishing accounts on Monster.com, and I think more attacks will be coming as more people go to job sites during the recession," he said.

      Hackers will also continue to compromise legitimate Web sites to deliver their attacks. A survey conducted by messaging- and data-protection firm Websense found that more than 75 percent of Web sites containing malicious code are legitimate sites that have been infected.

      Touchette expects this trend to continue. "Malware authors are at a pretty high level of professionalism and, in certain areas, they're pretty well organized," he said.




CLICK to GO BACK to Main Page.

E-Commerce Alerts are issued by Bennett Gold LLP, Chartered Accountants as situations develop. Bookmark this site and check back often. Our e-mail address is: info@BennettGold.ca

In accordance with United States Code, Title 17, Section 107 and Article 10 of The Berne Convention on Literary and Artistic Works, the news clippings on this web site are made available without profit for research and educational purposes.


ALERT
ARCHIVES
Final Entries
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999


LINK TO: Bennett Gold Chartered Accountants: A Licensed Provider of WebTrust Services.

WebTrust Is Your
Best Defense
Against
Privacy Breaches.

Get WebTrust
Working For
Your Site.