Motherboard Forums


Reply
Thread Tools Display Modes

Cyber Crime Evolution

 
 
Ann.Gibson.group.com@gmail.com
Guest
Posts: n/a
 
      01-01-2008, 05:42 AM
Chances are high that you have received a phish in your e-mail within
the few months or even last week. By the time this book is published
and into your hands, the operations that involve phishing scams will
have accelerated due to aggressive malware propagation (trojans,
viruses), automated botnets, and the overall infrastructure that has
been established by these cyber-scammers.

So let's step back for a moment. Our world has changed significantly
since I was a kid. Just 10 years ago, the sophistication of hackers
and the tools available to them were somewhat limited from both the
national and international security perspective.Yes, there was cyber-
crime, no denying that, but not at the audacious level we are
experiencing today. Breaking into computer systems was motivated by
the need for exploration, information, and education.That was the
world of the late-night, for-fun hackers, which are now but a memory
(who would have thought we would be nostalgic for them one day!).

The hackers of the past are likely now working as information security
professionals, attempting to close the very same Pandora's box they
contributed to opening not too long ago.The knowledge contributed by
hackers today, also known as security researchers, are molded by
ethics and discipline; they are reticent to release their findings,
not because of "controversial" activity but because of the
responsibilities required to protect this double-edged sword. People
hackers and researchers call script kiddies are the principal breed of
criminals on the Internet today.They are usually young and not
terribly creative or skilled at hacking, but they have three
attributes that make them extremely dangerous: time, persistence, and
proof-of-concept code written by the creative and skilled security
researcher. These "kids" can and will scan the entire Internet,
breaking into computers (also known as owning a system) and using your
personal machines inappropriately and arbitrarily for their own
purposes.

Ten years ago, most hackers were not looking at breaking into Windows
desktops (since most of them ran on a 14.4kbps modem); they were
usually targeting Windows NT and various flavors of UNIX
systems.Typically targeting corporate and government computers,
libraries, and universities, most cyber acts were usually performed
with benign intentions and curiosity as the primary motives.

With the recent proliferation of broadband, the targets have shifted
to literally anything and everything that is vulnerable. According to
the Internet Storm Center (http://isc.sans.org), the average time for
a default unpatched Windows box to survive uncompromised on the
Internet is 20 minutes. But why break into my Windows computer if I
have nothing valuable on there? The intentions behind of most "break-
ins" today are utilitarian in nature, ranging from something as dense
as using your machine for hard drive space and bandwidth to store and
trade music files (MP3s) to supporting spammers' and phishers'
activities (most of these compromises are in the form of automated
malware).

--- Thank You ---

http://www.fx-vista.com
 
Reply With Quote
 
 
 
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
OT: It would be a crime not to share this with you: HOT HOT HOT ! ;) =D FUN FUN =D Skybuck Flying Asus 0 12-06-2009 04:17 AM
Cyber Crime Evolution Aravind.Adler.group.com@gmail.com Packard Bell 0 01-01-2008 11:36 AM
Cyber Crime Evolution Anna.Banks.group.com@gmail.com AMD Overclocking 0 01-01-2008 05:46 AM
Cyber Crime Evolution Ann.Anderson.group.com@gmail.com Intel 0 01-01-2008 05:39 AM
How Dare Could America Industrial Property Office Be In Conspiracy With Jungang International Patent Office To Make An Extravagant International Crime ? Yeongja_Choi@yahoo.com Laptops 2 06-08-2005 12:07 AM


All times are GMT. The time now is 10:07 PM.


Welcome!
Welcome to Motherboard Point
 

Advertisment