Security technology lags far behind hacking techniques
The five main security areas to be addressed are botnets, Web 2.0 attacks, fraudulent messages, telecommunications and RFID network attacks.
Hacking technology has now surpassed the development of the security industry. IT departments need to work together more closely to eliminate this gap, a new report from the Georgia IT Security Center (GTISC) warns.
GTISC stands for Georgia Tech Information Security Center, which is a department in Georgia Tech University, specializing in information security issues.
In the annual report on GTISC's online security status, IT experts have recommended that the current security system lags far behind hacking techniques. These hacking techniques are becoming more and more popular and effective. GTISC urges cooperation between the security industry, service providers, ISPs, application developers and Internet users.
The report also said that the five main security areas to be addressed are botnet attacks, Web 2.0 attacks, fraudulent messages, telecommunications network attacks and RFID (radio frequency identification technology).
GTISC estimates that about 10% of the world's computers are now part of the botnet, and the infection rate is increasing. Such networks are fully utilized by scammers, the report suggests security providers need to do more to integrate IP-based firewalls to check their spread.
The development of Web 2.0 also poses new threats to Internet users. Web developers need to be more secure, and have the security technologies needed to better identify suspicious behaviors and boycott them.
Improvements in anti-spam technology have made hackers use the method of spreading messages intended to steal data. When phishing phishing pages are closed, these messages will intentionally install malware permanently on the user's computer to steal information directly.
The increasing convergence of communication systems and VoIP systems also creates new dangers. And finally, RFID attacks are expected to increase sharply in 2008. Reported that existing RFID security is 'extremely limited' and hacking warnings will become a major problem in 2008.
' In the first phase, there was only one type of attack to exploit WiFi devices, but when technology became popular and standardized, the first generation of automated WiFi attack tools would evolve and be sophisticated more ', the report points out. In the near future, GTISC predicts attack tools will allow even less-knowledgeable hackers to attack RFID technologies.
- Google shares its anti-hacking know-how: using physical keys
- Find a security error, reward 10,000 USD
- Microsoft reinforced the security for IE8
- Computers can do this danger to people
- Nuclear techniques help ensure food security
- Will the brain 'hack' device appear?
- Sell equipment to attack Wi-Fi networks
- Korea develops cancer treatment techniques with fluorescent diodes
- Ten current security trends
- Forget your Face ID or iris, and we're about to unlock the phone with sweat
- Stunned with valuable keyboards ...
- USB presence with voice security