{"id":12810,"date":"2011-05-17T17:48:05","date_gmt":"2011-05-17T07:48:05","guid":{"rendered":"http:\/\/power-up.space\/?p=12810"},"modified":"2011-05-17T17:48:05","modified_gmt":"2011-05-17T07:48:05","slug":"cyber-vigilantes-how-security-researchers-are-hurting-the-business-of-hacking","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=12810","title":{"rendered":"Cyber Vigilantes: How Security Researchers are Hurting the Business of Hacking"},"content":{"rendered":"<p>Imperva outlines how hacking has become industrialized, details monitoring processes to forecast and disrupt future hacking targets<\/p>\n<p>AUSCERT: Gold Coast, 17 May 2011 &#8211; Imperva, the leader in data security, today presented \u201cCyber Vigilantes: How Security Researchers are Hurting the Business of Hacking\u201d at this year\u2019s AUSCERT Conference. The presentation detailed how developments in hacker attack techniques are overwhelming organisations today, increasingly innovative and bypassing security protocols due to insufficient time and internal corporate resources needed to defend ongoing attacks. Imperva detailed industry vulnerabilities how to best protect against these data intrusions in the future.<\/p>\n<p>In 2010 Imperva launched its Hacker Intelligence Initiative to investigate the anatomy of attacks as well as key hacking trends by exploring the cybercrime industry utilizing techniques including hack-back, forum monitoring and internet traffic surveillance. The HII\u2019s purpose was to help the industry better tune their defences and understand the nature and focus of cyber attacks.<\/p>\n<p>Imperva\u2019s Web Research Team Leader, Tal Be\u2019ery confirmed: \u201cHacking has become extremely industrialised. Attack techniques, vectors, tools and platforms continue to evolve very rapidly, even for those of us working in the data security sector. Each industry faces a varying list of vulnerability possibilities for intrusion. For example the financial services sector is not exposed to authorization vulnerabilities in the same way the telecommunications sector is. This makes it very difficult for organisations to understand and provide the unique resources and time they need to manage these issues as they happen.\u201d<\/p>\n<p>Be\u2019ery also outlined the drivers for the most recent attacks and areas of interest noting, \u201cfor example hacker interest in mobile has increased. There was almost a ten-fold hacker interest in mobile last year, and we have seen nothing that refutes its continued growth this year.\u201d<\/p>\n<p>The presentation detailed the methodology employed by Imperva research labs to measure both quantitative and qualitative analysis of information being disclosed. Be\u2019ery said: \u201cWe monitor the communications of hacker forums and rate the most popular topics being discussed today. By understanding the business of hacking we can look at activity including: the discovery of full-fledged Cross Site Scripting (XSS) attack campaigns, server-generated Distributed Denial of Service (DDoS) attacks, a data collection containing millions of users passwords, and cloud-based technologies used by hackers.\u201d<\/p>\n<p>The Imperva research team is also responsible for monitoring the growing range of tools and kits for every attack type, known automated attacks and the emerging automated attacks.<\/p>\n<p>In order to help the audience gain an understanding of which controls they should apply to secure their systems against the evolving hacking industry Be\u2019ery summarised his recommendations for protecting corporate data:<\/p>\n<p>\u00b7 Introduce proactive detection into your security environment<\/p>\n<p>\u00b7 Assess what is sensitive data and apply the necessary controls on that data<\/p>\n<p>\u00b7 Stop attacks before they even enter your application<\/p>\n<p>\u00b7 Ensure guards are updated in real-time<\/p>\n<p>\u00b7 Follow up on trending attack techniques and models<\/p>\n<p>\u00b7 Irrelevant controls are not necessarily old controls<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imperva outlines how hacking has become industrialized, details monitoring processes to forecast and disrupt future hacking targets AUSCERT: Gold Coast, 17 May 2011 &#8211; Imperva, the leader in data security, today presented \u201cCyber Vigilantes: How Security Researchers are Hurting the Business of Hacking\u201d at this year\u2019s AUSCERT Conference. The presentation detailed how developments in hacker<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=12810\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-12810","post","type-post","status-publish","format-standard","hentry","category-game-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/12810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12810"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/12810\/revisions"}],"predecessor-version":[{"id":12811,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/12810\/revisions\/12811"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}