This article can also be found in the Premium Editorial Download "Information Security magazine: Five crucial virtualization do's and don'ts."
Download it now to read this article plus other related content.
Sandra Vaughan, VP of marketing and products for Proofpoint, sees these attacks frequently: "For example, a realty/property management customer of ours received a 'government agency compliant'-type phish which listed a lot of detail about the target organization, including the addresses of properties that they no longer manage."
This problem is going to get worse because the bad guys are building replicable business processes to continue leveraging information.
"Some of the more sophisticated criminal organizations now have the power and data to build their own ChoicePoint-like databases of millions of victims for whom they have been able to obtain Social Security numbers, mail/email addresses, phone numbers and other personal information," says Dmitri Alperovitch, director of intelligence analysis for Secure Computing.
| OPENING NEW FRONTS|
We will continue to see new attacks targeted at the increasingly soft underbelly of today's information systems, such as voice over IP, mobile devices, blogs and other social networks. Here is a brief overview of some of these emerging attacks:
This was first published in June 2008