More security breaches hit midsize companies

October 29, 2009

More midsize companies are being attacked by cybercriminals at the same time they're spending less on security, says a McAfee report released Wednesday.

Across the world, more than half of the 900 midsize businesses (51 to 1,000 employees) surveyed by McAfee for its report, The Security Paradox, said they've seen an increase in security breaches over the past year. Despite the threat, the recession has caused most of these companies to freeze their IT security budgets.

Midsize organizations have seen an increase in cyberthreats in 2009. (Credit: McAfee)

McAfee found that the costs of dealing with a security attack can be high. Over the last year, one of five midsize companies surveyed lost $41,000 in sales on average as a result of a breach. In China alone, 38 percent of the businesses questioned lost an average of $85,000 due to an attack. And more than 70 percent believe a serious data breach could put them out of business, noted the report.

Organizations think a breach could put them out of business. (Credit: McAfee)

But as the recession has grown, IT budgets have dropped. Almost 40 percent of the companies trimming their IT security budget plan to limit the purchase of new security products. And more than a third are switching to cheaper security software to cut expenses, even though they realize that may put them at greater risk.

"An organization's level of worry and awareness about increasing threats has not overcome the downward pressure on budgets and resources," said Darrell Rodenbaugh, senior vice president of global midmarket for McAfee, in a statement. "But this creates a vicious cycle of breach and repair that costs far more than prevention."

Midsize companies also may underestimate their risk, according to McAfee. Among companies with fewer than 500 employees, more than 90 percent believe they're protected from cybercriminals and feel they don't face the same threats that larger firms do.

But McAfee discovered that businesses with 101 to 500 people had on average 24 security breaches over the past three years, compared to 15 breaches for those with 501 to 1,000 employees.

In the long run, dealing with the aftermath of a security attack eats up a company's time and expenses. The study found that 65 percent of firms spend less than four hours a week on IT security, but around the same percentage have spent more than a day recovering from security breaches.

"Our research shows that organizations that put more effort on preventing attacks can end up spending less than a third as much as those that allow themselves to be at risk," said Rodenbaugh.

The study was conducted by research firm MSI International, which surveyed 100 midsize businesses in each of the following countries: U.S., U.K., Australia, Canada, China, France, Germany, India, and Spain. The results were compared with prior studies done in North America and Europe.

 

Bank Trojan botnet targets Facebook users

October 29, 2009

On the heels of one fake Facebook e-mail scam, a researcher warned on Wednesday of another such campaign in which users of the popular social network are being tricked into revealing their passwords and downloading a Trojan that steals financial data.

In the latest scam being blasted to e-mail in-boxes, a legitimate-looking Facebook notice asks people to provide information to help the social network update its log-in system, said Fred Touchette, a senior security analyst at AppRiver. When the user clicks the "update" button in the e-mail, they are directed to a fake Facebook log-in screen where their user name is filled in and they are prompted to provide their password.

This is a screen shot of the message in the body of the fake Facebook e-mail.

(Credit: AppRiver)

When they provider that information, victims are taken to a page that offers an "Update Tool," but that is actually the Zeus bank Trojan that is designed to steal financial and personal data, Touchette said.

Users of smart phones that have the Facebook app installed can also easily be duped because the phishing e-mail appears as an actual Facebook notification complete with Facebook icon, he said. The message is received in the e-mail in-box on the phone as well as under the Facebook notification section in the app itself, he added.

There are likely to be a lot of victims given how many e-mails the scammers are sending. AppRiver has captured about 6 million e-mails in its filters and noticed that the messages were coming in at a rate of 30,000 a minute at one point, according to Touchette. That's about 10 times the usual botnet e-mail message rate, he said.

More details are on the AppRiver blog.

On Tuesday, researchers reported that a different botnet, Bredolab, was distributing fake "Facebook Password Reset Confirmation" e-mails that included a Trojan. As of late Wednesday night, security provider Cloudmark said it had seen more than 730,000 of the Bredolab-related e-mails.

To protect against such phishing attacks, people should be extremely cautious about clicking on links in e-mails and they can mouse over the link to see if the domain is a legitimate domain, Touchette said.

Meanwhile, Facebook users should easily be tipped off that the latest scam is just that, a scam, he said. "Facebook doesn't need all of its users to update their accounts in order for them to make changes to their site," he added.

If there is any question about the legitimacy of the e-mail or the link, users should close the e-mail and go directly to the site to check for important notices to customers, he said.

This is the prompt Facebook users get as part of the latest phishing scam. Downloading the "update tool" installs a Trojan.

(Credit: AppRiver)
 

Adobe demos next-gen erase tool in Photoshop

October 21, 2009
The content fill tool can replace a complicated background when objects are erased. This example shows the removal of a U-shaped white hair.

The content fill tool can replace a complicated background when objects are erased. This example shows the removal of a U-shaped white hair.

t looks as if Photoshop, already famous for its ability to make people look thinner and skies look bluer, could take digital erasure of unsightly objects to an entirely new level.

A feature called "content-aware fill" described in an Adobe video published Tuesday shows the technology used to remove buffalo, telephone wires, and a tree from various images and to clean up stray hairs from an imperfect scan of a print. Photoshop's existing cloning and spot-healing tools can take care of this to some extent, but the new version adds a lot of smarts to the process.

Specifically, instead of using one nearby patch of the image to fill the area that's being erased, it draws on multiple areas--and it uses image analysis to make informed guesses about how to reproduce complicated background. For example, the technology can reproduce the window frames, architectural patterns, a river shoreline, and clouds.

"What this algorithm is doing is copying multiple patches from the surrounding background to try to fit them inside the hole, unlike the old spot healing proximity match that was trying to find one match for each of these holes," said Dan Goldman, researcher in Adobe's Creative Technologies Lab, in the video. "This generally results in a very convincing fill for these holes."

Adobe developed the technology in collaboration with Princeton University and the University of Washington.

Every time Photoshop gets something like this, some folks--not without some reason in my opinion--get concerned that we can't trust the veracity of the images we see. But let's be clear: although the ease and sophistication of editing is increasing, photo manipulation has been going on for more than a century. And the way I see it, the profusion of digital cameras and ease of posting photos online probably means reality is being documented in unretouched form more comprehensively than ever.

Adobe touted other Photoshop features from the labs, too, in an earlier video released after the recent Photoshop World conference.

One of those new features aims to bring some realism to painting processes. Paint can be spread out and blended, and 3D models of various brushes simulate the behavior of actual brushes with different bristle configurations.

The other was a more sophisticated warping technology in which anchor points determine what parts of the image is fixed and other movable points are used to bend and stretch other parts of the image.

In addition, hinge points can make it possible to anchor the point of a person's elbow, for example, while moving the forearm.

Want more lifelike painting? Adobe is simulating actual brushes and paint behavior.

Want more lifelike painting? Adobe is simulating actual brushes and paint behavior.

 



Best Communitation Website
Which communication website is best?

Myspace
Facebook
Twitter
Furry-paws
Youtube


Make a free website with Yola