Top 10 Cyber Security Threats of 2011 and Beyond - Slide 8

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Cyber Security Threats of 2011 and Beyond-8 Next

The dramatic rise in phishing and identity theft attacks includes a well-organized offline component — the not-so-innocent "money mules" recruited by fraudsters to launder stolen money across the globe. These are active attempts to enlist people to transfer illegal funds from credit card thieves. The number of money mule sites is increasing exponentially each year.

The cyber threat landscape has matured over the past 10 years, due in part to the proliferation of new technologies and an increasing reliance on the Internet for personal, business and governmental needs. Wielding their keyboards, cyber criminals exploit new and existing technologies for financial gain, to exact revenge or to carry out political coups. In their wake, they leave behind the tattered remains of unsuspecting individuals' life savings or companies' intellectual property, or the potential for disruption of national infrastructures.

Narus, Inc., a leader in real-time traffic intelligence for protecting governments, service providers and enterprises against cyber threats and the risks of doing business in cyber space, recently compiled a top 10 list of the latest cyber threat trends that will likely pop up over the next few years. Many on the list originated in the last decade, and have been fine-tuned to create more chaos in the years ahead.

More Slideshows:

Eight Telling Changes in Consumer Attitudes and Behaviors Factors such as loyalty programs and the use of technology are influencing consumers' decision to stay with or leave their providers.

10 Hot New Tech Gadgets Hot new gadgets you may want to consider adding to your collection.

Seven Critical Questions to Ask Before Developing a Social Media Policy Increase project success rates by providing well-defined guidance for social media initiatives.


Related Topics : Application Security, IT Process Management, Six Sigma

More Slideshows

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.