Article Preview
TopCyber Actions At Present
Cyber actions of various types have increased annually in a dizzying way.
Many cybersecurity agencies and organizations, both governmental and private, that monitor this type of activity, have produced periodic reports all coinciding with the fact that the number of harmful cyber actions grow from year to year in a frightening way.
The actions reported refer to actions of common cyber-crime, more sophisticated actions targeting banking and financial institutions, actions to obtain personal data, namely personal banking and financial data, and even actions of cyber war or cyber espionage, such as military or industry, the latter seemingly unleashed by states or by organizations and individuals apparently connected to more obscure structures in some states.
One aspect that has also been emphasized in these reports is the sophistication of the attacks and the techniques used in them. This sophistication has been such that many of the software agents used are very hard to detect, and are often only detected when they are activated and trigger some of the actions for which they have been designed and “installed” in a sub-reciprocal way on the computers that make up the software network from which the computer attack will later be triggered. They are true stealth software agents that even technical computer users hardly ever detect, let alone most ordinary users who have only a minimum of computer knowledge and even so from the user's point of view.