123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Others >> View Article

Information Security Conference To Discuss Rise In Targeted Cyber Attacks

Profile Picture
By Author: Ec Council
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

According to Symantec’s February 2011 MessageLabs Intelligence report, there has been a significant increase in the number of collaborative attacks that make use of well-timed and carefully crafted targeted techniques.

As February began, the attacks increased in number and multiple malware families were used aggressively to conduct simultaneous attacks via propagation techniques, signaling the likelihood of a common origin for these infected emails.

Interestingly, Symantec notes that the malicious code used in the different waves of attack also shared some common techniques.

For example, one day would be dedicated to propagating mainly Zeus (aka. Zbot) variants, while another day was dedicated to distributing SpyEye variants. Not long ago, when SpyEye was installed, it sometimes contained a “Kill Zeus” capability. Interestingly, the two sides seem to have changed course. Towards the end of October 2010, the bot code developers of SpyEye and Zeus bots showed signs of a merger as reported by Brian Krebs. By February 10, these attacks had multiplied further and were being propagated simultaneously ...
... with each malware family using its own polymorphic packer to further evade traditional antivirus detection.

Information security attacks are predicted to worsen and it is necessary for information security professionals to understand the latest threat methodologies. EC-Council provides a platform for information security professionals to discuss and exchange ideas on information security training solutions. EC-Council’s Information Security Conference, officially named “Hacker Halted” is also dubbed the Hacker Conference.

Total Views: 384Word Count: 254See All articles From Author

Add Comment

Others Articles

1. Understanding China’s Role In The Global Ocean Freight Network
Author: Atlantic Shipping LLC

2. How To Create An Epic Pirate Adventure For Your Little Buccaneer’s Birthday
Author: Scott Adams

3. How Bim Is Making Drafting More Efficient And Accurate
Author: Gsource Technologies LLC

4. Asbestos Removal Near Me: What Homeowners Need To Know Before Hiring
Author: Bryson Kaleb

5. Asbestos Abatement Companies Near Me: Why Local Professionals Matter
Author: Bryson Kaleb

6. The Real Reason Small Businesses Fail With Facebook Ads — And How To Succeed
Author: Apple And Oranges Digital Marketing agency

7. Why Dpboss Is The Best Choice For Matka Players
Author: Dpboss

8. Mejorando Las Operaciones Con Las Cuchillas Para Montacargas De Hs Montacargas
Author: HS Montacargas MTY

9. Why Entrepreneurs Are Choosing Ready-made Crypto Exchange Scripts?
Author: Lyra Bennett

10. Dubai’s Leading Corporate Gift Suppliers: Elevate Your Brand With Premium Gifts
Author: Motivators

11. Bridget O'sullivan Joins Johnson Brunetti
Author: Steven Dubin

12. Usa’s Trusted Source For Wholesale Bags And Wallets Since 2025
Author: rays creations

13. How To Choose The Best Wholesale Gummies Supplier For Your Brand
Author: KitWilkins

14. Why Inconel 625 And Monel 400 Remain Unbeatable In Refinery Applications?
Author: Online Fittings

15. Reddybook: Transforming The Future Of Online Gaming And Betting In India
Author: abc

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: