website statistics

Cyber espionage is increasingly popular in today's digital world. Security researchers at Dell have now released a detailed report about them.

What is the next Gadget you want?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

Cyber espionage has become a very popular tool in today’s digital world. It is used to steal sensitive information, mint millions through fraud and perform a number of other cheats. It has been accused in the past that certain governments unofficially endorse such groups to serve national interests. Now, researchers seem to affirm this.


This has been revealed in a detailed report titled ‘Chasing APT.’ APT stands for Advanced Persistent Threats and refers to the many online espionage groups who make use of lot of resources and advanced techniques.

Security researchers have revealed that two main groups which are involved in cyber-espionage are based in Beijing and Shanghai. These groups attack notable organizations around the world and try to steal their sensitive information. The most astonishing part is that these groups are very sophisticated and well-organized. They make use of 200 families of custom malware and 1,110 domain names which are used specifically to act as command-and-control servers.

According to Director of malware research at Dell Secureworks Counter Threat Unit, Joe Stewart, “You have to to have that kind of paranoia to know anything you get that is unsolicited is suspicious.” Stewart also reveals how these espionage groups attack anyone, from organizations to government institutions, “Now it’s not just a limited set of targets. It’s anybody who has a competitor.”

Asia-based cyber espionage organization:
Stewart further revealed that during the course of research, they found out that a private security company in Asia, excluding China, was involved in cyber espionage. This company was carrying out a very powerful cyber-espionage operation against the military of another country. Naturally, this couldn’t have been done with the informal support and approval of the country in which the company is based.

Interestingly, another SecureWorks researchers found out that 14 out of 20 Top Fortune 500 firms have their systems infected with Zeus Gameover malware. This makes it one of the largest financial botnets and also shows how many business firms are utterly oblivious to the kind of risks they face in today’s cyber world.

The research further details how malware in today’s world are very sophisticated tools which can steal information, disrupt activities of a system and launch DDoS attacks to take down systems and websites. Moreover, since malware is based on a peer-to-peer structure, it’s really hard to bring it down.

Courtesy: CNET

Buy Cheapest Related Product From Amazon.com


Facebook Introduces New Feature- Recommendations Bar

[Tutorial] How To Protect Yourself Against Keyloggers – Windows Web Browsers
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On July 27, 2012(1 year, 8 months ago.)

Recent Search

Recent Tutorials

At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
So you've been planning on replacing your old hard drive with the new drive? This tutorial helps you with a few simple steps.
Bitcoin is a digital currency that has gained extraordinary momentum in the last few months. This tutorial helps you get started with the basics.
Android lockscreen can be secured in a number of ways, some of which are described in this brief tutorial.
This review of iSkysoft Video Converter tells you everything you want to know about this Win 8/7 compatible video/DVD tool. Check the below to learn more details.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook