Security events recorded between July and September this year are up 150 per cent on those recorded by security company VeriSign in the same period last year
Published:
17 November 2004 y., Wednesday
VeriSign's Internet Security Intelligence Briefing, published today, concludes that increased financial rewards and the greater sophistication of the computer underworld and making the internet a more dangerous environment. In particular the firm warns on the growth of hybrid attacks - such as computer worms that use a variety of techniques in attempts to compromise user systems or attacks that use system exploits in order to steal sensitive information through secondary assaults.
VeriSign's figures come via its security monitoring services business. This division handles more than 250 million daily security events from firewall, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Virtual Private Networks (VPN) and endpoint systems on behalf of VeriSign's various clients.
VeriSign's Payment Services currently process more than 35 per cent of North American ecommerce transaction. From this data, VeriSign estimates ecommerce spending in Q3 2004 is up 25 per cent from Q3 2003. The volume of SSL certs in use increased 19 per cent over the same period.
According to VeriSign, fraud losses grew faster than could be explained by the growth in ecommerce alone. The US topped the ranking for countries with the highest volume of fraudulent transactions in Q3 2004, followed by Vietnam and Indonesia. The UK came fourth in this roll-call of shame. VeriSign doesn't quote raw figures on financial losses in making this comparison.
Šaltinis:
theregister.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
Moto 360, Motorola's upcoming entry into the smartwatch industry, is rumored to be preparing for a July release.
more »
Unisys Corporation has announced Choreographer, a cloud management platform designed to direct and optimise key IT services and processes. Choreographer automates the lifecycle management of data centre and public infrastructure resources to help more efficiently deploy applications in both private and public cloud environments.
more »
This February 24-27, the world’s largest mobile technology exhibition “Mobile World Congress 2014” shall take place in Barcelona.
more »
Unisys Corporation reported a third-quarter 2013 net loss of $11.6 million, or a loss of 26 cents per diluted share, which included $22.6 million of pension expense. In the third quarter of 2012, the company reported a net loss of $12.4 million, or a loss of 28 cents per diluted share, which included $28.9 million of pension expense and $23.1 million of debt reduction charges.
more »
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced plans for future integration of Akamai Unified Performance technology into the Cisco® ISR-AX series of routers.
more »
Microsoft is to allow independent games developers to self-publish on its Xbox One games console. "Indies" will be able to create their own games, publish to the Xbox when they like, and set their own pricing, the computer giant has confirmed.
more »
Nokia has unveiled the Lumia 625, the largest Lumia Windows Phone yet, with a 4.7-inch screen and 4G.
more »
Unisys Corporation (NYSE: UIS) announced the availability of its Unisys Stealth Solution for Amazon Web Services (AWS) designed to enhance security for clients moving data into the cloud.
more »
The Open IPTV Forum (OIPF) has published a profile of HTML5, CSS, DOM3 and other related web technologies aimed at connected TV services and devices that implement a browser-based application environment.
more »
According to new research conducted by Unisys Corporation (NYSE: UIS), a majority of Americans are concerned about data breaches involving large organizations, but are evenly mixed on whether legislation should require private businesses to share cyber attack information with the government.
more »