Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11:03 AM
Dark Reading
Dark Reading
Products and Releases

Frost & Sullivan: Criminal Hackers Run Huge Markets Of Information For Sale Upon Request

You may think you have never been hacked. . .you just have not realized it yet

LONDON, June 25, 2013 /PRNewswire/ -- Frost & Sullivan has published an insight which discusses a number of recent hacks which could have disturbing consequences far into the future. Criminal hackers run huge markets of information for sale upon request, and that most people whose confidential information is on sale do not realise that they have been hacked in the first place.

It is shockingly easy for hackers to compromise someone's website. Businesses have been slow to realise that websites are not just websites. Businesses depend on them for survival. SMEs are just as vulnerable as large organisations, but they have often lacked the resources - and the focus - to protect themselves.

"However unpleasant the thought, we should never forget that criminal hackers are all about money," says Alexander Michael, Director of Consulting at Frost & Sullivan. "They are highly skilled and trained, and highly motivated by profit."

Fortunately, the information security industry is waking up to the particular challenge of providing, cost-effective and accurate solutions allowing SMEs to protect themselves against web vulnerabilities. Despite these very positive moves by the security vendors, cyber crime will always exist. Security needs to be an integrated part of everything we do - not an afterthought - and everybody must understand risk and change their behaviour accordingly.

"I have every reason to believe that criminal hackers are also skilled librarians, able to cash in on the seemingly worthless information stolen years ago, which becomes priceless when a person becomes famous," says Alexander Michael.

To read the insight, click here.

If you are interested in Frost & Sullivan's information security coverage, please contact [email protected], with your full contact details.

About Frost & Sullivan

Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today's market participants. For more than 50 years, we have been developing growth strategies for the global 1000, emerging businesses, the public sector and the investment community. Contact us: Start the discussion

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...