Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Dell EMC Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM PartnerWorld Newsroom HPE Zone Tech Provider Zone

5 Most Dangerous New Hacking Techniques

From scrubbing memory of data to leaving a phony trail in malware code, some attackers are upping the ante when it comes to hacking into systems and stealing corporate data or controlling processes, say security experts who outlined the threat trends at the 2013 RSA Conference.

Back 1 ... 3   4   5   6   Next

photo

Computer Attacks Resulting In Kinetic Impact

Historically we have worked to protect PII and PHI, bank records and trade secrets, but companies haven't had a good track record, Skoudis said. But, attackers are now targeting physical infrastructure such as industrial control systems and SCADA systems.

"Some of it is just mischief, but it could be a harbinger of much bigger things to come," Skoudis said. "We are rapidly moving into the area where cyberattacks cause kinetic impact."

Smaller systems are now at risk, such as automobiles, water distribution systems and traffic light control systems, which have buffer overflows, SQL injection flaws and other coding problems that can be exploited, he said. Attackers can infiltrate the devices and gain command and control of the infrastructure.

 
 
Back 1 ... 3   4   5   6   Next

sponsored resources