Study: Rise In International Cyber Spying Will Pose Biggest Security Threat In 2008

McAfee Inc. recently announced findings from its annual cyber security study in which experts warned that the rise in international cyber spying will pose the single biggest security threat in 2008. Other major trends include an increasing threat to online services such as banking, and the emergence of a complex and sophisticated market for malware.

The annual McAfee Virtual Criminology Report examines emerging global cyber security trends, with input from NATO, the FBI, SOCA and experts from leading groups and universities. The report finds the following conclusions:

  • Governments and allied groups are using the Internet for cyber spying and cyber attacks.
  • Targets include critical national infrastructure network systems such as electricity, air traffic control, financial markets and government computer networks.
  • 120 countries are now using the Internet for Web espionage operations.
  • Many cyber attacks originate from China, and the Chinese government has publicly stated that it is pursuing activities in cyber espionage.
  • Cyber assaults have become more sophisticated in their nature, designed to specifically slip under the radar of government cyber defenses.
  • Attacks have progressed from initial curiosity probes to well-funded and well-organized operations for political, military, economic and technical espionage.

"Cybercrime is now a global issue," said Jeff Green, senior vice president of McAfee Avert Labs and product development. "It has evolved significantly and is no longer just a threat to industry and individuals but increasingly to national security. We're seeing emerging threats from increasingly sophisticated groups attacking organizations around the world. Technology is only part of the solution, and over the next five years we will start to see international governments take action."

There is increasingly sophisticated threats to personal data and online services.

  • Genetically modified 'super' threats: There is a new level of complexity in malware not seen before. These 'super-strength' threats are more resilient, are modified over and over again like recombinant DNA, and contain highly sophisticated functionality such as encryption draw. Nuwar ('Storm Worm') was the first example, and experts say there will be more examples in 2008.
  • New technology, new threats -- vishing and phreaking: A new target for cybercriminals is Voice over IP (Internet Protocol) software. There have been several high-profile 'vishing' (phishing via VoIP) attacks and 'phreaking' (hacking into telephone networks to make long distance phone calls). In Japan, 50 percent of all data breaches have been via peer-to-peer software. Cybercriminals will look for ways to exploit the popularity of applications on social networking sites such as MySpace and Facebook.
  • A run on banks: Experts believe a sustained cyber attack on banks could severely damage public trust in online banking and put the brakes on e-commerce. Critics believe the efforts to address online banking security will not be effective enough or fast enough.

There is a complex and sophisticated market for the tools of cybercrime.

  • Cybercriminals offer customer service: This underground economy already includes specialized auction sites, product advertising and even support services, but now competition is so fierce that 'customer service' has become a specific selling point.
  • Laws of supply and demand apply: The cost of renting a platform for spamming has dropped, and criminals can now buy custom-written Trojans built to steal credit card data.
  • 'White market' fueling thriving black market: The 'white market' that exists to buy and sell software flaws (back-door vulnerabilities with no available patch to fix them) is fueling a virtual arms trade in potentially significant security threats. Software flaws can fetch big money -- up to $75,000, and experts believe that while this white market exists there is an increasing danger of flaws falling into the hands of cybercriminals.

Featured

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.