The End of the Internet, or the Microsoft Users Net-Meltdown?
The 2005 Australian Computer Crime and Security Survey (PDF) reports that at the end of 2004 "the hackers turned pro". The ACCSS index may be easier for downloads. For 2-3 years now, most malware has satisfied the definition of Organised Crime - it's theft, it's purposeful, it's co-ordinated. In an August 2006 post , I reported the ACCSS comments and new comments from SANS . ZDNet now report that Rootkits becoming increasingly complex and operate by stealth. They say: Rootkits -- malicious software that operates in a stealth fashion by hiding its files, processes and registry keys--have grown over the past five years from 27 components to 2,400, according to McAfee's Rootkits Part 2: A Technical Primer (PDF). If you use a Microsoft system and connect to the Internet without extensive protection, you should be afraid, very afraid. And even large organisations who do everything right, are still open to targetted "zero day" attacks. The first Windo...