{"id":1060,"date":"2013-01-30T13:57:56","date_gmt":"2013-01-30T18:57:56","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1060"},"modified":"2020-02-26T18:56:07","modified_gmt":"2020-02-26T14:56:07","slug":"status-cyber-warfare","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/status-cyber-warfare\/1060\/","title":{"rendered":"The State of Cyber Warfare: Kaspersky Cyber- Security Summit 2013"},"content":{"rendered":"<p>It may not seem like it when you look at the various threats facing consumers online right now, but experts say that we may have reached a point where\u00a0we\u2019ve seen the worst that attackers can throw at us.\u00a0That\u2019s not to say that the bad guys aren\u2019t going to continue wreaking havoc and coming up with new ways to steal money and damage systems, but the worst-case scenarios\u2014rampant online crime, cyberwarfare and cyberterrorism\u2014are now realities and there are signs that security experts and authorities are beginning to turn the tide.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/01\/05114712\/KasperskyHoward.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1054\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/01\/05114712\/KasperskyHoward.jpg\" alt=\"\" width=\"600\" height=\"268\"><\/a><\/p>\n<p>\u201cMaybe we have come to the worst-care scenarios. Cyberterrorism, <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/why-isnt-cybercrime-worse-062212\" target=\"_blank\" rel=\"noopener nofollow\">cybercrime<\/a>, nation-state attacks. These are all happening. I think that\u2019s the end of the story. I think we\u2019ve explored the universe of cyber threats,\u201d said <a href=\"https:\/\/eugene.kaspersky.com\/\" target=\"_blank\" rel=\"noopener\">Eugene Kaspersky<\/a>, CEO of Kaspersky Lab, speaking on a panel at the Kaspersky Cyber-Security Summit in New York on Wednesday.<\/p>\n<p>\u201cThe next thing will be the attacks that continue to follow from these threats.\u201d<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/01\/05114710\/Costin-Raiu-Kaspersky-Lab.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1056\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/01\/05114710\/Costin-Raiu-Kaspersky-Lab.jpg\" alt=\"\" width=\"2440\" height=\"3134\"><\/a><\/p>\n<p>One of the many threats facing consumers right now, of course, is cybercrime, the everyday theft and money laundering that has become almost mundane. It is simply a fact of life on the Internet. Just as there are real-world criminals looking to take advantage of vulnerable people, there are millions of cybercriminals looking to do the same online. The difficult part isn\u2019t determining who is vulnerable to attackers, it\u2019s figuring out who <em>isn\u2019t<\/em>at risk.<\/p>\n<p>Some of the targets that are near the top of the list for attackers these days are large utilities, transportation companies and financial companies. Those may not seem like things that should concern normal users, but any significant attack on one of those targets could have major ramifications for millions of people.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/01\/05114708\/howard-schmidt-NYC.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1057\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/01\/05114708\/howard-schmidt-NYC.jpg\" alt=\"\" width=\"2892\" height=\"2219\"><\/a><\/p>\n<p>\u201cA lot of people don\u2019t think about our tremendous dependencies on transportation,\u201d said <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/howard-schmidt-answered-bell-052212\" target=\"_blank\" rel=\"noopener nofollow\">Howard Schmidt<\/a>, former White House cybersecurity coordinator, who joined Kaspersky on the panel. \u201cIt doesn\u2019t take much. If the ticketing system [for an airline] goes down, people can\u2019t get their tickets, they can\u2019t board the planes and then the planes can\u2019t pull away from the gate. So there\u2019s nowhere for the incoming aircraft to go, so they start stacking up. Within an hour, they have to start diverting traffic to other airports.\u201d<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/01\/05114706\/Costin-Raiu.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1058\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/01\/05114706\/Costin-Raiu.jpg\" alt=\"\" width=\"5610\" height=\"3734\"><\/a><\/p>\n<p>That\u2019s a simple example, but one that could happen easily, given the level of dependence the airlines have on computerized reservation systems. There are other, more complicated, scenarios as well, and Kaspersky said that virtually every industry is at risk for sophisticated attacks now.<\/p>\n<div class=\"pullquote\">\u201cI\u2019m afraid that every industry can be a victim of a high-profile attack.\u201d \u2013Eugene Kaspersky<\/div>\n<p>\u201cI\u2019m afraid that every industry can be a victim of a high-profile attack that can cause not just financial damage,\u201d he said. \u201cAll of them are vulnerable. Communications, transportation, military. Could the military be a victim of an attack? Yes, of course.\u201d<\/p>\n<p>Even with that dire picture, both Kaspersky and Schmidt said that they see some areas that can help improve the situation. Kaspersky said one of the keys to winning this war is education, not just of users, but of students, as well.<\/p>\n<p>\u201cWe need the business schools to teach this to the future CEOs,\u201d Kaspersky said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It may not seem like it when you look at the various threats facing consumers online right now, but experts say that we may have reached a point where\u00a0we\u2019ve seen<\/p>\n","protected":false},"author":32,"featured_media":1073,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[280,279],"class_list":{"0":"post-1060","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cyber-warefare","9":"tag-cyber-security"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/status-cyber-warfare\/1060\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/status-cyber-warfare\/1060\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/status-cyber-warfare\/1060\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/status-cyber-warfare\/1060\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/status-cyber-warfare\/1060\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/status-cyber-warfare\/1060\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/status-cyber-warfare\/1060\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cyber-warefare\/","name":"cyber warefare"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1060"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1060\/revisions"}],"predecessor-version":[{"id":15467,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1060\/revisions\/15467"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1073"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}