Blogs

More Cyber Criminals Targeting your Identity, Including Bad Guys in China!

02.27.15

According to a recent report groups in “China continue to target Western interests, but there has been a shift in focus from the theft of intellectual property to identity information” according to BusinessInsurance.com which drew these conclusions from a February 23, 2015 recent HP report entitled “HP Security Research, Cyber Risk Report 2015” which also stated:

Activity in the cyber underground primarily consists of cyber crime involving identity theft and other crimes that can be easily monetized.

The 7 key themes of the HP Report are:

Theme #1: Well-known attacks still commonplace – Based on our research into exploit trends in 2014, attackers continue to leverage well-known techniques to successfully compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago—some are even decades old.

Theme #2: Misconfigurations are still a problem – The HP Cyber Risk Report 2013 documented how many vulnerabilities reported were related to server misconfiguration.

Theme #3: Newer technologies, new avenues of attack – As new technologies are introduced into the computing ecosystem, they bring with them new attack surfaces and security challenges.

Theme #4: Gains by determined adversaries – Attackers use both old and new vulnerabilities to penetrate all traditional levels of defenses. They maintain access to victim systems by choosing attack tools that will not show on the radar of anti-malware and other technologies.

Theme #5: Cyber-security legislation on the horizon – Activity in both European and U.S. courts linked information security and data privacy more closely than ever. As legislative and regulatory bodies consider how to raise the general level of security in the public and private spheres, the avalanche of reported retail breaches in 2014 spurred increased concern over how individuals and corporations are affected once private data is exfiltrated and misused.

Theme #6: The challenge of secure coding – The primary causes of commonly exploited software vulnerabilities are consistently defects, bugs, and logic flaws.

Theme #7: Complementary protection technologies – In May 2014, Symantec’s senior vice president Brian Dye declared antivirus dead and the industry responded with a resounding “no, it is not.” Both are right. Mr. Dye’s point is that AV only catches 45 percent of cyber-attacks —a truly abysmal rate.

No surprises in this HP report!

The publications contained in this site do not constitute legal advice. Legal advice can only be given with knowledge of the client's specific facts. By putting these publications on our website we do not intend to create a lawyer-client relationship with the user. Materials may not reflect the most current legal developments, verdicts or settlements. This information should in no way be taken as an indication of future results.

Search Tips:

You may use the wildcard symbol (*) as a root expander.  A search for "anti*" will find not only "anti", but also "anti-trust", "antique", etc.

Entering two terms together in a search field will behave as though an "OR" is being used.  For example, entering "Antique Motorcars" as a Client Name search will find results with either word in the Client Name.

Operators

AND and OR may be used in a search.  Note: they must be capitalized, e.g., "Project AND Finance." 

The + and - sign operators may be used.  The + sign indicates that the term immediately following is required, while the - sign indicates to omit results that contain that term. E.g., "+real -estate" says results must have "real" but not "estate".

To perform an exact phrase search, surround your search phrase with quotation marks.  For example, "Project Finance".

Searches are not case sensitive.

back to top