Security technology lags far behind hacking techniques

The five main security areas to be addressed are botnets, Web 2.0 attacks, fraudulent messages, telecommunications and RFID network attacks.

Hacking technology has now surpassed the development of the security industry. IT departments need to work together more closely to eliminate this gap, a new report from the Georgia IT Security Center (GTISC) warns.

GTISC stands for Georgia Tech Information Security Center, which is a department in Georgia Tech University, specializing in information security issues.

Picture 1 of Security technology lags far behind hacking techniques In the annual report on GTISC's online security status, IT experts have recommended that the current security system lags far behind hacking techniques. These hacking techniques are becoming more and more popular and effective. GTISC urges cooperation between the security industry, service providers, ISPs, application developers and Internet users.

The report also said that the five main security areas to be addressed are botnet attacks, Web 2.0 attacks, fraudulent messages, telecommunications network attacks and RFID (radio frequency identification technology).

GTISC estimates that about 10% of the world's computers are now part of the botnet, and the infection rate is increasing. Such networks are fully utilized by scammers, the report suggests security providers need to do more to integrate IP-based firewalls to check their spread.

The development of Web 2.0 also poses new threats to Internet users. Web developers need to be more secure, and have the security technologies needed to better identify suspicious behaviors and boycott them.

Improvements in anti-spam technology have made hackers use the method of spreading messages intended to steal data. When phishing phishing pages are closed, these messages will intentionally install malware permanently on the user's computer to steal information directly.

The increasing convergence of communication systems and VoIP systems also creates new dangers. And finally, RFID attacks are expected to increase sharply in 2008. Reported that existing RFID security is 'extremely limited' and hacking warnings will become a major problem in 2008.

' In the first phase, there was only one type of attack to exploit WiFi devices, but when technology became popular and standardized, the first generation of automated WiFi attack tools would evolve and be sophisticated more ', the report points out. In the near future, GTISC predicts attack tools will allow even less-knowledgeable hackers to attack RFID technologies.