{"id":1762,"date":"2013-04-30T12:20:21","date_gmt":"2013-04-30T16:20:21","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1762"},"modified":"2013-06-25T12:58:35","modified_gmt":"2013-06-25T16:58:35","slug":"infosec-2013-review","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/infosec-2013-review\/1762\/","title":{"rendered":"Infosec 2013: A Review"},"content":{"rendered":"<p>As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year\u2019s event.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113801\/infosec2_title1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1769 aligncenter\" alt=\"Infosec\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113801\/infosec2_title1.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>To coincide with Infosec, Verizon released its much anticipated 2013 Data Breach Investigations <a href=\"http:\/\/www.verizonenterprise.com\/DBIR\/2013\/\" target=\"_blank\" rel=\"noopener nofollow\">report<\/a> this week. According to the report, China is involved in the manufacturing of almost all known advanced persistent threats (APTs), with a whopping 96% of cyber espionage campaigns monitored by Verizon attributed to threat actors in China. The report states that 19% of those breaches were linked to the Chinese government as they attempt to get hold of sensitive foreign intellectual property.<\/p>\n<p>APTs have compromised many high profile media organizations over the last year, including the New York Times last autumn, and last week the Associated Press\u2019 Twitter account was hacked to a dramatic, but short-term, effect (although this wasn\u2019t necessarily an APT). China may be a key player when it comes to APTs and the theft of intellectual property, but it is by no means the only culprit. Many of the most sophisticated \u2018phishing\u2019 attacks with the sole purpose of stealing money emanate from Eastern Europe, Africa and South America. They are no strangers to cybercrime as these regions are experiencing a boom in cyber. And although the US is a frequent target of APTs, it is also a significant perpetrator of malware attacks, with a high number of financially motivated attacks originating from the States.<\/p>\n<div class=\"pullquote\">APTs have compromised many high profile media organizations over the last year, including the New York Times and the Associated Press.<\/div>\n<p>As Eugene Kaspersky reminded the audience during his keynote speech on Tuesday, \u2018we can\u2019t predict what\u2019s next, but we can try and deal with what\u2019s out there.\u2019 It might not be possible to protect against all potential attacks, DDoS or otherwise. But we can do our very utmost to protect ourselves from a large number of them. He divided the motivations of today\u2019s cybercriminals into the following categories: financial, political, reputational damage, military and sabotage\/scare tactics.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113809\/infosec2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1764 aligncenter\" alt=\"Infosec 2013\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113809\/infosec2.jpg\" width=\"576\" height=\"378\"><\/a><\/p>\n<p>Fifteen years ago, the chief sources of attack came from hackers of the stereotypical kind \u2013 spotty, lone students operating from their bedrooms motivated only by the desire to cause mischief. This stereotype is now outdated, as today cybercrime is a multi-million dollar industry that\u2019s growing in profitability as organized gangs rake in millions by extorting money from their online victims. It\u2019s the clever guys that stay in the business, Eugene pointed out. And sadly it\u2019s only a matter of time until cyber terrorists use state-sponsored cyber weapons such as Gauss and Flame to cripple critical infrastructure systems. Scott Cruse, Legal Attach\u00e9, FBI, US Embassy London, underlined Eugene\u2019s comments during a panel discussion on how to battle cybercrime on Wednesday. \u2018Cybercrime is fast emerging as the biggest threat on the horizon\u2019 he explained. \u2018It may even surpass terrorism as we know it in terms of the threat it represents to national security.\u2019<\/p>\n<p>Eugene\u2019s advice is simple. Consumers must protect their PCs. If you don\u2019t, quite simply you are feeding the bad guys. And in a worst case scenario, you could even be funding terrorism. Businesses are on the frontline. The cybercriminals will try and get at corporate data to attack enterprises so it\u2019s essential that they have a robust cyber security strategy and policies in place. And governments need to change their critical IT systems and invest more in IT security education.<\/p>\n<p>As the Verizon report illustrates, every business (and therefore individual) is a potential target for some kind of threat: be it from amateur hackers; hacktivists (political activists trying to make a political statement; organized criminal gangs extorting money; or full-blown state sponsored industrial espionage.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113805\/One-of-the-three-keynote-theatres1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1766 aligncenter\" alt=\"Infosec Keynote Theater\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113805\/One-of-the-three-keynote-theatres1.jpg\" width=\"438\" height=\"550\"><\/a><\/p>\n<p>The 2013 Information Security Breaches Survey stimulated some enlightening discussions at Infosec on Wednesday, highlighting the fact that cyber security needs to be a board-level issue for organizations. 93% of large organizations suffered a security breach within the last year. And 63% of small to medium businesses (SMBs) were attacked by outsiders in same time period, up 41% on last year\u2019s survey. This is a significant jump, illustrating the fact that SMBs have increasingly become attractive targets for hackers. Internal breaches are also on the rise \u2013 and the number of breaches in relation to cloud and mobile services is expected to skyrocket over the next year as organizations increasingly adopt these technologies.<\/p>\n<p>But high profile media organizations or state bodies aren\u2019t the only entities at risk from malicious attack. It\u2019s not all about industry and the corporate enterprise \u2013 we are all at risk of crime. The police in the UK are committed to providing a fit-for-purpose response to industry and individuals. \u2018Cybercrime is a changing and moveable beast\u2019, commented DS Charlie McMurdie, Head of Police Central eCrime Unit, \u2018that needs a contained and measured response\u2019 to all kinds of cyber criminality. To this end, the National Cybercrime unit is due to launch in October 2013 which, it is hoped, will provide just that.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113804\/Visitors-at-the-Kaspersky-stand1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1767 aligncenter\" alt=\"Infosec Kaspersky\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113804\/Visitors-at-the-Kaspersky-stand1.jpg\" width=\"420\" height=\"600\"><\/a><\/p>\n<p>But it\u2019s not all terrifying statistics and worst-case scenarios. As Mikko Hypponem, Chief Research Officer for F-Secure pointed out as he was inducted into the Infosec Hall of Fame, the last ten years have witnessed the biggest improvements in end user IT security we\u2019ve ever known. The buzzwords this week were international collaboration (between governments, industry and academia), IT infrastructure protection, and, above all, education: in schools, universities, and enterprises. Whatever your perspective, this is undoubtedly an exciting time for the IT security sector. If there was one overarching takeaway from this week, it was neatly summed up by Professor Fred Piper from the Information Security Group Royal Holloway, University of London: \u2018Organized crime has organized itself in a way that the good guys haven\u2019t \u2013 it\u2019s time the good guys struck back!\u2019<\/p>\n<p>As Infosec winds down for another year, the stands put away and the conference rooms cleared, the discussions and debates will continue. It will be interesting to see how the cyber security landscape will have changed in the context of many of these discussions a year from now.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year\u2019s event. To coincide with Infosec, Verizon released<\/p>\n","protected":false},"author":200,"featured_media":1770,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[388,97],"class_list":{"0":"post-1762","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-infosec","9":"tag-security-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/infosec-2013-review\/1762\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/infosec-2013-review\/1762\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/infosec-2013-review\/1762\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/infosec-2013-review\/1762\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/infosec-2013-review\/1762\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/infosec-2013-review\/1762\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/infosec-2013-review\/1762\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/infosec\/","name":"Infosec"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/200"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1762"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1762\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1770"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}