Panda Prepares To Battle Corporate Espionage - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Panda Prepares To Battle Corporate Espionage

Panda Software is developing a service expected to launch early next year to protect enterprises against an emerging network security threat it calls "espionage," where professional hackers will target one specific company instead of many with tailor-made code.

Panda Software is developing a service expected to launch early next year to protect enterprises against an emerging network security threat it calls "espionage," where professional hackers will target one specific company instead of many with tailor-made code.

To test the waters, Panda rolled out Wednesday TruPrevent Personal 2006 for individual users that is designed to run alongside normal security software such as Norton Antivirus from Symantec Inc. It protects against new attacks from code unknown to the security software.

The service will use artificial intelligence and sophisticated algorithms to identify and stop unknown malicious code from attacking the network. In the last year there have been approximate 20 attacks on various commercial companies from individuals seeking competitive information, and many have never been reported by the media, Patrick Hinojosa, Panda Software U.S. chief technology officer, told TechWeb. "The fastest way to get a leg up on your competition is corporate espionage," he said. "Some of the code we are seeing is coming from other companies because the nature of the data."

Most vulnerable to these attacks are companies such as those that have frequent changes in product lines within industries such as aerospace, defense, pharmaceutical, biotech, and finance.

The SAN Institute and the governments of the United States and the United Kingdom earlier this month released a report on the year's top 20 Internet vulnerabilities. The report notes criminals often seek out target applications in target companies to cause devastating results.

Ferris Research first began hearing from security software company MessageLabs earlier this year that individuals were targeting high-level executives within specific companies to gain access to passwords and confidential documents. "We are well aware there are sophisticated organize crime networks involved with consumer-based phishing where people pass on details of compromised credit cards and it's assumed the network is similar to this spear-fishing attack," said Richi Jennings, lead analyst for e-mail security practice at Ferris Research.

Software companies from Panada Software to MessageLabs are putting software and systems in place to check that internal file structures, are correct, to look for unknown malware such as viruses, Trojan Horses, and worms, Jennings said.

In May, for example, a hacker successfully infiltrated the computer network of CardSystems Solutions Inc., a third-party payment company processing more than $15 billion in Visa, MasterCard, American Express and Discover transactions, and stole approximately 40 million credit card numbers from credit card companies.

Most companies can firewall their e-mail and are fast at nailing down worm outbreaks, but those are typically perpetrated by "script kiddies, people who want to make noise for notoriety," Hinojosa said. "These are not people who want to make noise. This is about organized crime and that's the major difference."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
The Best Way to Get Started with Data Analytics
John Edwards, Technology Journalist & Author,  7/8/2020
10 Cyberattacks on the Rise During the Pandemic
Cynthia Harvey, Freelance Journalist, InformationWeek,  6/24/2020
IT Trade Shows Go Virtual: Your 2020 List of Events
Jessica Davis, Senior Editor, Enterprise Apps,  5/29/2020
Register for InformationWeek Newsletters
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll