Search Box


Advanced search

computer, chips, RFID, Web, viruses, security, internet, SQL, breeches, RIA, Hackers, Botnet, security, infrastructure Areas of concerncomputer, chips, RFID, Web, viruses, security, internet, SQL, breeches, RIA, Hackers, Botnet, security, infrastructure

To my cites     Back to Big brother     Cyberterrorism

A concern is computer chips that "broadcast" information are used Groceries, clothing, swipe-free credit cards, library cards, warehouse inventories, under-skin pet tags, for prisoner and parole tags, in hospital patient wristbands, and in smart passports. Indeed the increasing Radio-frequency identification (RFID) chips is troubling. Eleni Kosta and Jos Dumortier of the Katholieke Universiteit Leuven in Belgium said the benefits from these chips are apparent. But we also must consider personal privacy when designing applications for these chips (1 ).

Web pages themselves may contain viruses. Executive Peter Watkins of internet security firm said "If you look at the levels of protection, 70 to 99 per cent of companies have already deployed security for email because they've learned, but only a small [number] have deployed the technology to scan their pages for malware,"And also said "Around 85 per cent of malware comes in via the web, and businesses have been slow to react to this."(2 ).

The problem of internet of virus exploits is expected to get worse (3 ). Its estimates that between 200,000 300,000 virus laden websites are created everyday. Most of these sites remain on the net for a day or less, but the numbers of these sites are increasing (4 ).

Surfing the Web is the main source of new computer infections and ninety percent of threats purpose was to steal confidential information like user names and passwords (5 ).

Director of Web security firm Symantec's global intelligence network Dean Turner, said "Criminals are increasingly targeting trusted websites,". He explained that hackers can corrupt perfectly legimate websites and hackers collect person information by simply clicking the wrong link, Turner explained "Threats are invisible, they are in the background. Your computer is redirected to another website, usually located in another country, which drops trojans in your system. They capture information and send it to other computers. Data are usually stored in external servers and then sold in the underground economy,". (6 ).

IBM Internet Security Systems found fifty percent more web pages infected in the last quarter of 2008 than the entire year of 2007. they are infected with "SQL injection". Wikipedia, says "SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application.". A now defunct company called CardSystems a third party payment processor was the victim of "SQL injection" this compromised information on 40 million credit cards (7 ).

A virus (trojan) can also come in an e card or just an I email. The virus remains dormant until the PC user goes to their bank site online then it becomes active capturing the users, user name and password. The Internet security firm found 59,177 unique banking Trojans by the end of 2008(8 ).

Hackers compromised 285 million records in 2008, this exceeds total loses for 2004-2007 combined. As much as 93 percent of these breeches occurred at financial institutions 90 percent of attacks were designed to steal names addresses and credit card details, almost ever single American has had their data compromised (9 ).

Also the will be an increased use Rich Internet Applications (RIAs) such as flash for malicious purposes(10 ).

"Botnet is a jargon term for a collection of software robots, or bots, that run autonomously and automatically. The term is often associated with malicious software but it can also refer to the network of computers using distributed computing software. While the term "botnet" can be used to refer to any group of bots, such as IRC bots, this word is generally used to refer to a collection of compromised computers (called Zombie computers) running software, usually installed via worms, Trojan horses, or backdoors, under a common command-and-control infrastructure." (11 ).

Researchers at Georgia Tech Information Security Center said the percentage of online computers infected by botnets will increase from 10 to 15 percent by the end of this year. A few of the malicious uses Botnets spam and malware (12 ).

Computer security experts botnets, will grow in increasing sophistication and be more prevalent (13 ).

Cyber security expert are concerned over the Vulnerability of critical infrastructure like power, transportation and water systems to hackers. a CIA official Tom Donahue revealed that hackers have penetrated several regions outside the US and "in at least one case, caused a power outage affecting multiple cities." (14 ).

computer, chips, RFID, Web, viruses, security, internet, SQL, breeches, RIA, Hackers, Botnet, security, infrastructure