website statistics
Cyber espionage is increasingly popular in today's digital world. Security researchers at Dell have now released a detailed report about them.

Your take on Getting a SmartWatch?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...Loading...

Cyber espionage has become a very popular tool in today’s digital world. It is used to steal sensitive information, mint millions through fraud and perform a number of other cheats. It has been accused in the past that certain governments unofficially endorse such groups to serve national interests. Now, researchers seem to affirm this.


This has been revealed in a detailed report titled ‘Chasing APT.’ APT stands for Advanced Persistent Threats and refers to the many online espionage groups who make use of lot of resources and advanced techniques.

Security researchers have revealed that two main groups which are involved in cyber-espionage are based in Beijing and Shanghai. These groups attack notable organizations around the world and try to steal their sensitive information. The most astonishing part is that these groups are very sophisticated and well-organized. They make use of 200 families of custom malware and 1,110 domain names which are used specifically to act as command-and-control servers.

According to Director of malware research at Dell Secureworks Counter Threat Unit, Joe Stewart, “You have to to have that kind of paranoia to know anything you get that is unsolicited is suspicious.” Stewart also reveals how these espionage groups attack anyone, from organizations to government institutions, “Now it’s not just a limited set of targets. It’s anybody who has a competitor.”

Asia-based cyber espionage organization:
Stewart further revealed that during the course of research, they found out that a private security company in Asia, excluding China, was involved in cyber espionage. This company was carrying out a very powerful cyber-espionage operation against the military of another country. Naturally, this couldn’t have been done with the informal support and approval of the country in which the company is based.

Interestingly, another SecureWorks researchers found out that 14 out of 20 Top Fortune 500 firms have their systems infected with Zeus Gameover malware. This makes it one of the largest financial botnets and also shows how many business firms are utterly oblivious to the kind of risks they face in today’s cyber world.

The research further details how malware in today’s world are very sophisticated tools which can steal information, disrupt activities of a system and launch DDoS attacks to take down systems and websites. Moreover, since malware is based on a peer-to-peer structure, it’s really hard to bring it down.

Courtesy: CNET

Buy Cheapest Related Product From Amazon.com


Facebook Introduces New Feature- Recommendations Bar

[Tutorial] How To Protect Yourself Against Keyloggers – Windows Web Browsers
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On July 27, 2012(2 years, 11 months ago.)

You May Also Like:

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Compare  

What Do You Think?

Loading Disqus Comments ...
Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
For too many people, the realization that they need to back up their photos and videos only comes when they misplace or break their smartphones and lose everything. Here we a report on possible solution and best tools.
Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Our today’s tutorial is about how to change Font on Android.
Here is the tutorial about how to setup MMS on Android device.
In this tutorial I will show you how to enable Instant Upload inside your Google+ app on Android, so that you can sync your photos and videos with Google+ instantly.
Here is another tutorial for the Android lovers. I will show you how to change keyboard on Android.
Here is our new android tutorial on how to change the default launcher on Android.
Here is the tutorial about how to setup Internet settings on Android device.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook