Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Beware the 'Shadow Economy': Page 2 of 3

“Cybercriminals operate their profitable businesses utilizing easy-to-use sophisticated attacks while focusing on the management side of data handling,” says the report. “It makes them highly effective in stealing data while avoiding detection – it also makes any organization using the Web vulnerable.”

As a preventative measure, Finjan urges organizations to review their security practices, recommending a “layered” security approach and techniques such as real-time content inspection.

“A new security paradigm is needed to deal with the new and emerging threats,” adds Finjan, explaining that the security sector must also evolve to meet the need of businesses. “It has to learn from current events, predict future events based on current development, and act upon this information.”

Clearly the modern cybercriminal uses a laptop and a string of code (as opposed to a horse’s head) to strike fear into the heart of corporate America.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Byte and Switch's editors directly, send us a message.

  • Finjan Software Inc.