Computer hackers are increasingly tailoring attacks using Trojan horse programs for certain businesses in hopes of filching intellectual property, a new security report released Thursday said.MessageLabs said its latest research data shows these kinds of attacks have risen six-fold over the same period in 2005. While the increase is dramatic, the number of attempts remains low; the targeted attacks are occurring about once a day, compared to one or two per week in 2005, the company said. An attack e-mail may be sent to people in four or five companies in similar kinds of businesses, said Paul Wood, senior analyst for MessageLabs. The company counts the attempt as one attack.MessageLabs products filter e-mail and Internet traffic before it reaches its users, and the company studies the traffic for trends. It provides services to about 14,000 business customers worldwide, and its attack statistics are drawn from that data pool. Wood said the methods of attack are changing since computer security has improved overall. “It’s very much more difficult for the cybercriminals to get through organizations’ defenses in the same way that they would have done four or five years ago,” he said.The lower the profile of the attack, the greater the chances are for success, as sending out tens of thousands of e-mail messages with bad programs or links is quickly noticed. The latest method is to send only a few messages, often to specific people in a company, rather than using programs that harvest large numbers of unrelated e-mail addresses from the Internet, Wood said.Hackers are combining threats through sophisticated programming. Once one malicious program infects a computer, it is often able to download other programs capable of rummaging through files and sending them back to a host, or using the machine to send spam or download adware, Wood said.To avoid antivirus programs that bluntly filter any e-mail containing an executable attachment, hackers are instead sending links through e-mail or instant messages. The link can lead to a website hosting a malicious program, some of which can automatically start running if users don’t have the proper security updates for their browsers, Wood said.Other attacks target vulnerabilities in applications, such as Microsoft’s Word or Excel programs. Hackers can find a vulnerability in those programs, constructing a special Word or Excel file that causes other malicious code to run on a computer when opened, Wood said.-Jeremy Kirk, IDG News Service (London Bureau) Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content brandpost Resilient data backup and recovery is critical to enterprise success As global data volumes rise, business must prioritize their resiliency strategies. By Neal Weinberg Jun 01, 2023 4 mins Security brandpost Democratizing HPC with multicloud to accelerate engineering innovations Cloud for HPC is facilitating broader access to high performance computing and accelerating innovations and opportunities for all types of organizations. By Tanya O'Hara Jun 01, 2023 6 mins Multi Cloud brandpost Survey: Marketers embrace AI at expense of metaverse investments Generative artificial intelligence (GAI) has quickly rocked the world of marketing. Sitecore polled B2B marketers on their perceptions of GAI. Here’s what they said. By Dave O’Flanagan, Sitecore Jun 01, 2023 4 mins Artificial Intelligence news Zendesk to lay off another 8% of its staff, cites macroeconomic issues The new tranche of layoffs comes just six months after the company let go of 300 staffers and hired a new CEO in order to navigate its operations through macroeconomic distress. By Anirban Ghoshal Jun 01, 2023 3 mins CRM Systems IT Jobs Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe