Story image

Meet the Big Data professionals (it’s not who you think)

07 Oct 14

Reckon the top users of Big Data are the likes of banks, consumer products companies and mass marketers? Maybe so, but there’s another industry altogether just as focused on maximising its take on your wallet. Cybercrime.

That’s according to Trend Micro senior software architecture director Jon Oliver. “Scammers are very astute people and a core component of their ‘business’ is the collection and use of large data sets,” he says.

It’s Big Data in action, with comprehensive user interfaces providing in-depth insights into infection rates, complete with the ability to run experiments to see how millions of ‘customers’ react to various tactics and malware exploits.

“There is a high level of Big Data professionalism in cybercrime because it delivers results – and those ‘customers’ are in reality victims,” Oliver confirms.

In a timeframe from 2010 to 2014, he says an evolution in scam attacks was noted, driven by the analysis and experimentation being conducted by highly organised criminal outfits. The more shots you take, the more hits you get; “That’s one side of it, yes, but there is also a strong element of improving the aim at what you’re shooting to drive up the conversion rate. We’ve seen scammers achieve conversion rates in their ‘customer bases’ of over 14%, up from 5% or less depending on the scam.”

It’s a hit rate that most marketers can only dream of.

No question then, that Big Data delivers the goods. “Doing careful measurement across their databases directly impacts how the attacks are carried out, and by extension, how successful they are,” Oliver adds.

While there is a little paranoia over government surveillance from some quarters, the more clear and present threat is likely to come from the scammers who have an even more powerful incentive – that of profit. However, Oliver says there’s no need to shut down your interaction with the Web, nor do you need to start wearing a tin foil hat.

Instead, in addition to the usual precautions which include always updating software when prompted to do so, using an Internet Security suite and being aware of social engineering techniques, he says there are other tactics you can employ.

“Use specific, long and complex passwords for your email and financial services, and use a password manager for all your other internet services. Use two-factor authentication where possible. And consider using a dedicated ‘safe’ device for banking and other sensitive services. In other words, take the same level of precautions and discipline you would in securing your house – and have a plan for what to do if you suspect a possible breach.”

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
The disaster recovery-as-a-service market is on the rise
As time progresses and advanced technologies are implemented, the demand for disaster recovery-as-a-service is also expected to increase.
Apax Partners wins bidding war for Trade Me buyout
“We’re confident Trade Me would have a successful standalone future," says Trade Me chairman David Kirk
The key to financial institutions’ path to digital dominance
By 2020, about 1.7 megabytes a second of new information will be created for every human being on the planet.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
NVIDIA sets records with their enterprise AI
The new MLPerf benchmark suite measures a wide range of deep learning workloads, aiming to serve as the industry’s first objective AI benchmark suite.
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.