Cyber Crime Black Market Exploding Worldwide
August 13, 2012 8:08 PM
comment(s) - last by
Infographic explaining cyber crime and security
(Source: Rasmussen College)
Governments and police authorities are scrambling to try and catch up to global demand of stolen information from cyber criminals
Growing up in the United States, children are continually warned about potential “real-world” crime that plagues only a small number of the population each year. However, more people are now becoming victims of cyber crimes, and there is very little being done to help protect Internet users – and companies routinely targeted.
Increasingly, the looming threat of cyber crime is hitting us at a rapid pace –researchers estimate organized crime groups collected more than $388 billion from identity theft and other crimes in 2011. Amazingly, cyber crimes are quickly approaching the $411 billion industry involving the trafficking and selling of illegal narcotics, according to Rasmussen College researchers.
Criminals are developing their cyber crime skills that include phishing, internet scams, identity theft, and other sophisticated attempts to steal personal information.
For internet users looking to protect themselves, researchers have a few basic tips: not using a single password for all online accounts, avoid clicking unsafe links, connecting to secure Wi-Fi accounts, keep security software updated, and be careful about what you’re posting on the Internet.
That’s all fine and dandy for casual Internet users, but what if the problem is a structural issue from corporations and the government?
The U.S. government is now making its own cyber security a more pressing matter, though very few people seem to know what to do.
Senators Jay Rockefeller (D-W. Va) and Joseph Lieberman (I-Conn.), the Senate Homeland Security Committee Chairman, believe the Pres. Obama administration should utilize an executive order for cyber security. Lieberman and Rockefeller haven’t had success with efforts in Washington because certain industries aren’t happy they’d be forced to adhere to stricter digital standards.
Obama is interested in
seeking longer prison sentences
for digital criminals, and Defense Secretary Leon Panetta has
a cyber operation plan
to standardize military cyber operations.
Even with all of this talk regarding U.S. vulnerabilities, the U.S. government has found success launching coordinated attacks. In addition to temporarily
crippling Al Qaeda
, the U.S. has used Stuxnet and Flame to
target Iranian computer networks
In the long term, government legislation will not help protect the US government – and its citizens – from cyber attacks, but elected officials trying to ignore the problem won’t do any good.
This article is over a month old, voting and posting comments is disabled
8/18/2012 8:51:55 AM
we need to root out the deficiencies that enable cybercrime rather than "treating the symptoms" -- as noted by another writer on this blog.
study the methodology used by cyber-criminals:
1. impersonation: assuming a false identity. Proper deployment of public key encryption (PGP,GnuPG) on e/mails, transactions, and software transmittals is the place to start
2. injection: (un-authorized updates) -- SQL, iFrame, "Man in the Browser", root kits, ...
3. executable documents: most modern documents -- html, flash, spreadsheets, word, jpeg, pdf -- can conatin executable code -- java, vbs, byte code, C#, .net, php ...
as a result all modern documents must be handled as though they were .exe files
this means we have to take a step back and re-examine the construction of our operating software
the operating software must never run an un-known program in "real" mode -- such programs must be run in "user mode"
in "user mode" programs are not allowed to actually run: we only allow simulation: testing to see what the program wants to do
to accomplish this, in user mode a program is not allowed to execute any privileged instruction.
privileged instructions include input/output, and memory allocation or access. these operations must be requested by the application program and the operating system will check these for proper permissions ( remember authentications above ) before performing such requests for the application
now we need to examine the security features of the x86/x64 chips to see how this could be done -- and whether it is actually being sufficiently implemented
the x86/x64 chips provide 4 privilege levels -- "ring0,1,2,3 as well as both memory protection and virtual memory
are these all being used properly?
read all the hacker reports
also Root Kit arsenal
then think about switching to Linux. I'm building my 2d "nix" box now. there's a lot of good software; maybe not every favorite from the earlier system but anyone interested in security is going to want to take a look. grab an older PC and put Ubuntu in; check it out.
"My sex life is pretty good" -- Steve Jobs' random musings during the 2010 D8 conference
Latest By Michael Hatamoto
Report: Increase in Pope Spam Hits Internet Users
March 19, 2013, 3:38 PM
Microsoft Takes a Closer Look at Cyber Security and Malware
February 11, 2013, 1:02 PM
Tech Sector Recovering, IT Needs Expanding
February 7, 2013, 8:48 AM
'BYOD' Issues Creating Headaches in the Enterprise
January 23, 2013, 8:12 AM
City of Fremont is Silicon Valley's Hidden Gem
December 2, 2012, 8:38 PM
Mobile Apps Used as In-Car Convenience, Necessity
August 30, 2012, 2:19 AM
The Evolution of Connected TVs Leading to Second Screen Applications
August 15, 2012, 9:31 AM
Cyber Crime Black Market Exploding Worldwide
August 13, 2012, 8:08 PM
ITC Judge Recommends U.S. Xbox 360 Ban
May 25, 2012, 11:06 AM
Dish Network In Trouble Over Ad-Skipping DVR
May 25, 2012, 4:06 AM
FTC Targets Google Again for Advertising Practices
May 24, 2013, 1:17 PM
Google Engineer Finds Microsoft Security Flaw, Says Company is Hostile About It
May 23, 2013, 10:51 AM
Survey: 94 Percent of Teens Use Facebook
May 22, 2013, 2:53 PM
Congress Looks to Force Extra Protection on Utilities to Combat Cyberattacks
May 22, 2013, 2:24 PM
U.S. Military Cuts Guantanamo Bay Wi-Fi After Alleged Threat by Anonymous
May 21, 2013, 11:00 AM
Yahoo Acquires Tumblr for $1.1 Billion
May 20, 2013, 11:12 AM
Most Popular Articles
High School Student Creates Storage Device that Can Charge in 20 Seconds
May 20, 2013, 6:51 AM
Apples Tries to Use Decade-Old Patents to Ban Samsung Galaxy S IV
May 22, 2013, 3:00 PM
NASA Awards $125,000 Grant for 3D Printed Food on Long-Term Space Travels
May 21, 2013, 1:32 PM
Microsoft Announces Voice-Controlled "Xbox One"
May 21, 2013, 12:55 AM
Seawater Cooling Saves Data Center Big Bucks, Energy, Despite Jellyfish Issues
May 17, 2013, 3:23 PM
Latest Blog Posts
Lumosity: Does it Work?
May 22, 2013, 8:20 PM
Quick Note: Sony "Teases" PS4 Ahead of Xbox Reveal in New Video
May 20, 2013, 12:33 PM
Nokia Introduces Instagram-Like App of Its Own to Help Lumia Sales
May 20, 2013, 7:10 AM
Parents of Pre-Teen Drivers Commonly Practice Distracted Driving Says Study
May 9, 2013, 7:16 AM
Apple's iOS 7 Running Into Internal Delays Due to Massive Overhaul
May 1, 2013, 4:26 PM
More Blog Posts
Copyright 2013 DailyTech LLC. -
Terms, Conditions & Privacy Information