Wednesday, December 11, 2019

Word of the Day: crimeware

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | December 11, 2019
crimeware

Crimeware is programming that is designed to facilitate illegal online activity. The use of crimeware is primarily financially motivated.

Crimeware kits enable a person without much technical experience to create, customize and distribute malware. Such kits are readily available for purchase on the dark net and can be used by cybercriminals to engage in malicious activities such as stealing corporate data, launching denial of service attacks, building botnets or distributing malware.

 

Crimeware kits are known by a variety of names, including infection kit, exploit kit, DIY attack kit and malware toolkit. The more sophisticated crimeware programs evade detection by most spyware scanning programs and will not be detected by most firewalls.

 

As of this writing, command-and-control server crimeware is the most popular type of crimeware kit, but recent changes have shown that attackers are increasingly moving toward denial of service (DoS) as an attack vector for cyberextortion. This approach allows the attacker to demand a ransom from the victim in order to restore service.

 

To guard against crimeware, an organization should deploy anti-malware software as well as security programs that continually monitor security controls and evaluate their effectiveness. Enterprises should also install anti-phishing tools because many exploit kits use phishing or compromised websites to penetrate the network.


The most likely infection point in most organizations is through end users, so security awareness training should be provided on a continual basis to prevent crimeware exploits from being successful.

Quote of the Day

 
"New research from Chronicle shows that as crimeware has grown over the last five years, law enforcement efforts have become increasingly ineffective -- and in some cases have produced unintended consequences." - Rob Wright

Learning Center

 

Study reveals sale of SSL/TLS certificates on dark web
Security researchers discovered the availability of SSL/TLS certificates for sale on the dark web, which allow cybercriminals to disguise their malicious activity as legitimate.

Top 10 types of information security threats for IT teams
Common security threats range from insider threats to advanced persistent threats, and they can bring an organization to its knees unless its in-house security team is aware of them and ready to respond.

5 common web application vulnerabilities and how to avoid them
Common web application vulnerabilities continue to confound enterprises. Here's how to defend against them and stop enabling exploits.Common web application vulnerabilities continue to confound enterprises. Here's how to defend against them and stop enabling exploits.

How to track and prevent crimeware attacks
Crimeware is on the rise and enterprises that track attacks can discover malicious software trying to breach the environment.

What security measures can be taken to stop crimeware kits?
Enterprises that don't have thoroughly patched browsers, PDF readers, media players and other client-side software are very likely to get compromised by MPack and similar crimeware tools. Ed Skoudis explains.

Quiz Yourself

 
Pop quiz: Can you identify these top IT trends of 2019?
From serverless and AIOps to a widening tech skills gap, numerous IT trends bring momentum into 2019. See how ready you are for new opportunities and hurdles in IT with this quiz.

Stay in Touch

 

For feedback about any of our definitions or to suggest a new definition, please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: