New forms of cyber attacks

4:48:00 PM
New forms of cyber attacks -

The Symantec anti-virus software company recently confirmed that cyber attacks worldwide increased 42% in 2012. This increase is due to both the techniques used by criminals get much more diverse and pirates that benefit both individuals and business users neglect. Thus, attacks on small businesses tripled in 2012.
With the Internet, cybercriminals imagination has no limits. Every year we discover new attack techniques. At a recent press conference Heslault Lawrence, director of security strategy at Symantec, made an overview of the new techniques used by hackers.
Phishing is a technique that has become very common. You may have already received this kind of email that aims to mislead a person to believe that the message sender is a legitimate institution (bank, utilities or telecommunications company, ...). The new technique spear phishing is more lucrative: it is to send an e-mail to companies meeting the executive secretaries so they print a document to their manager. You must click a link to this document. To ensure that these workers receive a phone call, in the language of the country and without accent, to encourage them to submit the document to the director in an emergency. Of course, the link sent in the email is intended only to introduce "malware" in the system of the computer company.

virus also websites often contain, in particular versions of the site for smartphones. It is very simple indeed to create an iPhone application with a development tool such as appstar 2.0. Unfortunately appstar 2.0 is infected by pirates, so that application developers are already using "compromise" on your smartphone during the transfer.

Nowadays, marketing and originality are the means to launch new trends. Sunzand is an application that turns the mobile phone screen in the solar panel: according to the developers of this application, this way, you do not need to charge the phone. In reality, it is primarily used to enter the mobile user and collect their contact information.

Also talk of smartphones, Symantec has identified several vulnerabilities of mobile phone operating systems. The Apple iOS and shows 387 vulnerabilities, while Google Android has only 13 points of vulnerability. In 2012, mobile malware has increased by 58%.

Ransom software also represent another powerful weapon that locks the computer system until the payment of a ransom. This more sophisticated attack shows the user's IP address and even turn a webcam to show its image on the lock screen. "The loss implied by this type of attack is estimated at 5 million in 2012. This figure is probably much higher," said Laurent Heslault. "In 18 days, we have already counted nearly 500,000 of these attacks, and we expect to see this phenomenon spread to mobile phones."

Moreover, spam emails being increasingly filtered through mailboxes, hackers are now transferring to social networks that contain a wealth of personal information. There are various techniques, such as creating fake "like" button on Facebook, which leads to install malware.

Last but not least, the cloud is also in the crosshairs of cyber attackers. By introducing a cloud server, hackers to access a wealth of information at all times personal data

To protect your Internet connection on your PC or mobile, choose a VPN. A VPN service encrypts your Internet connections and keep private the sites you visit and the information you provide on those sites.

Any information you send will go directly into your secure virtual tunnel. With VPN service, you can easily direct your traffic from one of the available countries. Your computer or laptop / tablet to connect to the Internet from any of these countries and no one can intercept your online business. Change your IP address, the VPN service is one of the most important steps to surf the Internet anonymously and safely.

Previous
Next Post »
0 Komentar