AplusWebMaster
2011-01-18, 23:54
FYI...
Web attack toolkits...
- http://www.symantec.com/tv/news/details.jsp?vid=750972922001
Video: 90 seconds
Web attack toolkits and Malicious Websites ...
- http://www.symantec.com/business/theme.jsp?themeid=threatreport&om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2011Jan_worldwide_attacktoolkits
Jan. 2011 - "Launching widespread attacks on networked computers used to be a task reserved for a rare few hackers – those with an extensive knowledge of programming. This is no longer the case. The advent of attack toolkits has lowered the bar significantly, opening the doors for anyone with a basic understanding of networking and computers to produce threats that exploit vulnerabilities. These toolkits are used to enable the theft of sensitive information or to convert compromised computers into a network of botnets in order to mount additional attacks. They are advertised and sold in the online underground economy. Symantec believes that attack kits play a significant role in the continuing evolution of cybercrime into a self-sustaining, profitable, and increasingly organized economic model worth millions of dollars. This report provides an in-depth look at the evolution of attack kits, their features and how hackers use them to lure in victims, especially online..."
(More detail and links at the URL above.)
- http://www.symantec.com/business/popup.jsp?popupid=attack_kit_evolution_timeline
Careful What You Search For ...
- http://www.symantec.com/connect/blogs/careful-what-you-search
18 Jan 2011
> http://www.symantec.com/connect/sites/default/files/images/24_searchpie_sml.jpg
:fear::mad::fear:
Web attack toolkits...
- http://www.symantec.com/tv/news/details.jsp?vid=750972922001
Video: 90 seconds
Web attack toolkits and Malicious Websites ...
- http://www.symantec.com/business/theme.jsp?themeid=threatreport&om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2011Jan_worldwide_attacktoolkits
Jan. 2011 - "Launching widespread attacks on networked computers used to be a task reserved for a rare few hackers – those with an extensive knowledge of programming. This is no longer the case. The advent of attack toolkits has lowered the bar significantly, opening the doors for anyone with a basic understanding of networking and computers to produce threats that exploit vulnerabilities. These toolkits are used to enable the theft of sensitive information or to convert compromised computers into a network of botnets in order to mount additional attacks. They are advertised and sold in the online underground economy. Symantec believes that attack kits play a significant role in the continuing evolution of cybercrime into a self-sustaining, profitable, and increasingly organized economic model worth millions of dollars. This report provides an in-depth look at the evolution of attack kits, their features and how hackers use them to lure in victims, especially online..."
(More detail and links at the URL above.)
- http://www.symantec.com/business/popup.jsp?popupid=attack_kit_evolution_timeline
Careful What You Search For ...
- http://www.symantec.com/connect/blogs/careful-what-you-search
18 Jan 2011
> http://www.symantec.com/connect/sites/default/files/images/24_searchpie_sml.jpg
:fear::mad::fear: