Panda Prepares To Battle Corporate Espionage - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Panda Prepares To Battle Corporate Espionage

Panda Software is developing a service expected to launch early next year to protect enterprises against an emerging network security threat it calls "espionage," where professional hackers will target one specific company instead of many with tailor-made code.

Panda Software is developing a service expected to launch early next year to protect enterprises against an emerging network security threat it calls "espionage," where professional hackers will target one specific company instead of many with tailor-made code.

To test the waters, Panda rolled out Wednesday TruPrevent Personal 2006 for individual users that is designed to run alongside normal security software such as Norton Antivirus from Symantec Inc. It protects against new attacks from code unknown to the security software.

The service will use artificial intelligence and sophisticated algorithms to identify and stop unknown malicious code from attacking the network. In the last year there have been approximate 20 attacks on various commercial companies from individuals seeking competitive information, and many have never been reported by the media, Patrick Hinojosa, Panda Software U.S. chief technology officer, told TechWeb. "The fastest way to get a leg up on your competition is corporate espionage," he said. "Some of the code we are seeing is coming from other companies because the nature of the data."

Most vulnerable to these attacks are companies such as those that have frequent changes in product lines within industries such as aerospace, defense, pharmaceutical, biotech, and finance.

The SAN Institute and the governments of the United States and the United Kingdom earlier this month released a report on the year's top 20 Internet vulnerabilities. The report notes criminals often seek out target applications in target companies to cause devastating results.

Ferris Research first began hearing from security software company MessageLabs earlier this year that individuals were targeting high-level executives within specific companies to gain access to passwords and confidential documents. "We are well aware there are sophisticated organize crime networks involved with consumer-based phishing where people pass on details of compromised credit cards and it's assumed the network is similar to this spear-fishing attack," said Richi Jennings, lead analyst for e-mail security practice at Ferris Research.

Software companies from Panada Software to MessageLabs are putting software and systems in place to check that internal file structures, are correct, to look for unknown malware such as viruses, Trojan Horses, and worms, Jennings said.

In May, for example, a hacker successfully infiltrated the computer network of CardSystems Solutions Inc., a third-party payment company processing more than $15 billion in Visa, MasterCard, American Express and Discover transactions, and stole approximately 40 million credit card numbers from credit card companies.

Most companies can firewall their e-mail and are fast at nailing down worm outbreaks, but those are typically perpetrated by "script kiddies, people who want to make noise for notoriety," Hinojosa said. "These are not people who want to make noise. This is about organized crime and that's the major difference."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
News
Rethinking IT: Tech Investments that Drive Business Growth
Jessica Davis, Senior Editor, Enterprise Apps,  10/3/2019
Slideshows
IT Careers: 12 Job Skills in Demand for 2020
Cynthia Harvey, Freelance Journalist, InformationWeek,  10/1/2019
Commentary
Six Inevitable Technologies and the Milestones They Unlock
Guest Commentary, Guest Commentary,  10/3/2019
Register for InformationWeek Newsletters
Video
Current Issue
Data Science and AI in the Fast Lane
This IT Trend Report will help you gain insight into how quickly and dramatically data science is influencing how enterprises are managed and where they will derive business success. Read the report today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll