Look for Attacks on Global Social Networks this Year

March 2010
Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p22
Trade Publication
The article reports on the possible attacks of cybercriminals as stated by the McAfee Labs Threat Predictions which highlights their criminal toolkits using new technologies and third-party applications to exploit the internet such as the online social networks.


Related Articles

  • Preparing for a Black Swan Cyberattack. Herbolzheimer, Claus // Harvard Business Review Digital Articles;9/14/2016, p2 

    The article discusses ways companies should prepare for a "black swan" cyber-attack that can occur with widespread ramifications, including establishing cyber pool funds and creating "SWAT" teams to regularly monitor and address common cyber threats.

  • Untitled.  // Electronics Weekly;4/18/2012, Issue 2504, p21 

    The article presents the views of Plextek Ltd. on the need for Cyber Attack Prevention Agency in Great Britain. It states that the company accepts that protection of critical national infrastructure (CNI) is a high priority for the government, but points out that influence over non-British...

  • Impact of Alleged Russian Cyber Attacks. Ashmore, William C. // Baltic Security & Defence Review;2009, Vol. 11 Issue 1, p4 

    The article discusses the possible Russian cyber strategy against Estonia and the counter measures that can be used to prevent or mitigate cyber attacks. It explores the social tensions between Estonians and Estonia's Russian minority. According to the article, the reality of the attacks shows...

  • Fighting Cyber-Crime. TOWNS, STEVE // Government Technology;Apr2009, Vol. 22 Issue 4, p42 

    The article discusses a report on what the U.S. government can do to prevent the occurrence of dangerous cyber-attacks. According to SANS Institute director of research, Allan Paller, implementing new procurement policies that make vendors responsible for vulnerable software may be the best...

  • Global Security Outlook.  // Poland Defence & Security Report;Q1 2011, Issue 1, p29 

    The article presents information on the global security outlook in Poland that involves cyber warfare. It provides an overview of cyber warfare including its political risks and implications and several notable cases of cyber attacks. Information on a massive cyber attack that would cripple...

  • Sharing Security. Batey, Angus // Defense Technology International;Apr2012, Vol. 6 Issue 4, p18 

    The article reports that countries and companies are increasingly sharing cyberthreat information. The Advanced Persistent Threat (APT), which is widely attributed to China, is engaged in industrial espionage, specifically on military targets. In response to the problem, informal...

  • CYBERCRIME PREVENTION IN THE KINGDOM OF BAHRAIN VIA IT SECURITY AUDIT PLANS. ALMADHOOB, AMNA; VALVERDE, RAUL // Journal of Theoretical & Applied Information Technology;7/10/2014, Vol. 65 Issue 1, p274 

    Implementing cybercrime preventing technologies is critical in today's connected world. As companies continue to rely on critical infrastructure, they should also address the risk and threats imposed by the use of these technologies. Bahrain is no different from anywhere else in the world when...

  • Smart devices prey for cybercrime. HAMID, TRISKA // MEED: Middle East Economic Digest;1/14/2011, Vol. 55 Issue 2, p25 

    The article discusses the need of a unified, multi-tiered approach to fight against malicious cyber attack in the Middle East. It has been stated that as use of mobile devices are overtaking personal computers, cyber criminals are also changing their target from personal computers (PCs) to...

  • Catching the cyber worm.  // New Scientist;1/5/2013, Vol. 217 Issue 2898, p3 

    An introduction is presented to an article within the issue about research into tracing the origins of cyberattacks such as malware to identify their perpetrators and predict their actions.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics