Super Rich Hackers

Storm Worm Makes Millions DAILY

I may stop trend hunting and start hacking and spamming soon! IBM's principal web security strategist, Joshua Corman, said that people behind the Storm worm are making millions of pounds a day by using it to generate revenue. He said that in the past it had been assumed that web security attacks were essential ego driven. But now attackers fell in three camps. 'I call them my three Ps, profit, politics and prestige.'

The Storm worm, which had been around about a year, had been a tremendous financial success because it created a botnet of compromised machines that could be used to launch profitable spam attacks. In addition to getting money simply for sending out the spam in much more quantity than could be sent by a single machine, the criminals are also getting a cut of any business done off the spam.
Trend Themes
1. Increased Botnet-based Attacks - The rise of botnet-based attacks, like the Storm worm, presents an opportunity for businesses to develop advanced web security solutions to combat this growing threat.
2. Monetization of Spam Attacks - The monetization of spam attacks highlights the need for businesses to invest in email filtering technology and other spam detection methods to protect their networks and users.
3. Diversification of Motivations for Cyber Attacks - The evolving motivations behind cyber attacks, including profit, politics, and prestige, call for businesses to adopt a proactive approach to cybersecurity to mitigate potential risks.
Industry Implications
1. Web Security - The web security industry can capitalize on the increased demand for advanced solutions to combat botnet-based attacks and protect businesses from potential financial and reputational harm.
2. Email Filtering - The email filtering industry has the opportunity to innovate and develop more efficient and accurate solutions to detect and block spam attacks, ensuring a safer online experience for users.
3. Cybersecurity Consulting - The cybersecurity consulting industry can assist businesses in understanding the changing landscape of cyber threats and implementing proactive measures to safeguard their sensitive data and networks.

Related Ideas

Similar Ideas
VIEW FULL ARTICLE & IMAGES