Online Thieves Strike Again
A recent update on online theft created waves all over the internet. A Trojan called ‘Pony’ allegedly stolen crypto currencies worth around $220,000 from users’ online wallets. The Trojan worked as an advanced botnet from September 2013 to January of this year. The thieves stole around 700,000 online user credentials and accessed 85 wallets.
The crypto currency addresses and wallets are anonymous, which made it impossible to contact the wallets’ owners. Hence, a new web page has been created where owners can enter their wallet’s public key to verify whether their wallet accounts have been affected or not.
The German Connection
According to Germany’s Internet Security Agency, hackers stole User IDs and Passwords of 16 million German users. This hacking incident took place in January of this year. Many of the targeted computers were infected with malware after this cyber-attack. The authorities started a probe to look into the matter.
A recent update on online theft created waves all over the internet. A Trojan called ‘Pony’ allegedly stolen crypto currencies worth around $220,000 from users’ online wallets. The Trojan worked as an advanced botnet from September 2013 to January of this year. The thieves stole around 700,000 online user credentials and accessed 85 wallets.
The crypto currency addresses and wallets are anonymous, which made it impossible to contact the wallets’ owners. Hence, a new web page has been created where owners can enter their wallet’s public key to verify whether their wallet accounts have been affected or not.
The German Connection
According to Germany’s Internet Security Agency, hackers stole User IDs and Passwords of 16 million German users. This hacking incident took place in January of this year. Many of the targeted computers were infected with malware after this cyber-attack. The authorities started a probe to look into the matter.
Protecting your Virtual Fortress
The above two instances prove how a lack of virtual security can cause havoc and lead to huge financial and data losses. If a robust and foolproof security system is not in place, hackers can break into a network with their sophisticated malware and other forms of viruses to steal and infect key information. In addition, online attacks like Denial of service (DoS) are used for blocking access to specific websites. Cyber criminals also use Domain Name System (DNS) information to redirect web traffic for their personal gain. Hackers are always on the prowl to break into a virtual infrastructure and tamper with the configuration. It results in the compromising of key devices that create security loopholes.
For comprehensive security, your organization needs the Next Generation Firewall (NGF) with the following features:
- Firewall with user identity-based decision making to prevent errors related to IP addresses.
- Firewalls that are integrated with Anti-Virus, Anti-Spam, Web Filtering, VPN for security, connectivity, and productivity.
- Multiple virtual security zones
- Firewall appliance with dynamic routing
- Centralized security management
- Layer 8 identity-based security
No comments:
Post a Comment