Cybersecurity: 10 threats to watch in 2014

8:14:00 PM
Cybersecurity: 10 threats to watch in 2014 -

the overall cost of cyber attacks to businesses in 2013 is estimated at € 300 billion. Here are the top 10 trends in cybersecurity and cybercrime, which increased in 2013 and should be closely monitored in 2014.

- the art of espionage Governments

An American iT security reporting editor in 2013 unveiled on cyber espionage practices and piracy carried out or supported by government services. China therefore welcomes a group of hackers probably from the People's Army, based in Shanghai, which affected 140 companies from 20 different industries. "The allocated resources are important because the mass of data collected and stored can reach terabytes."

- US intelligence tactics revealed

Many Edward Snowden revelations about the NSA modes and espionage practices have marked the year cyber- 2013 and shocked the people. Beyond watched channels (phone, mail, telecommunication cables underwater ...) there is a real industrial espionage system that the Obama administration has done in order to "fight against terrorism". The reform practices intelligence agencies were announced by Barack Obama. Web giants such as Google, Yahoo, Facebook, Microsoft have been accused of collusion must regain the trust of their users and be more transparent, especially in regarding the encryption of their respective networks

. - Questions about the laws on freedom and personal data

2013 led to fierce debate , particularly in France, on the legal framework in the information society. the military planning law and Article 20 created a wave of protests among the professional and defense organizations in the world of the Internet. In addition, the revision of the Directive on the protection of personal data, is currently subject to European governments. The European Union should adopt the new framework in 2014, "but this time seems difficult to achieve," said the CLUSIF. This project of the protection of personal data divides the actors in the digital sector, but also the Member States and even between them national authorities to the European Commission

. - Hacktivism unfulfilled

the Anonymous movement has lost its force with several arrests in the hacktivist network in the United States in 2013. but, according to Edward Snowden revelations based on documents dating from the NSA in 2012, the British secret service (GCHQ), also conducted several actions against the members of Anonymous, LulzSec and the Syrian electronic army

- massive flight digital data

Two big massive data losses occurred in 2013 :. one hand, Adobe software company with files containing 152 million accounts evaporated on Web (2.9 million customers who had left their bank details). Then there was the case of the target distributor :. The bank details of more than 110 million people were stolen following an assault

- Ramsonware, the new fashion trend

The "ransomware "- linked to the name of the programs that encrypt data and lock computers - become common. To regain access to his computer, he must then pay a ransom, otherwise the data will be destroyed. According to the newspaper Le Figaro, more than 1,280 complaints have been filed in France against this scam between November 2011 and January 2013. Today, their work is diversifying on operating system platforms: Mac and Android . Smartphones will soon be targeted

-. EC3, the center of anti-European crime

Early 2013, the EU launched EC3, a unit of anti cyber crime in The Hague whose mission is not intended to supplement the authorities national, but aims "to overcome cyber criminals in intelligence and speed, to prevent and combat their actions," said Troels Oerting, director of the information center to facilitate monitoring of the organizations involved. pedophilia, engaged in "phishing" scams and other online

- increase in mobile malware

Android is indeed preferred mobile OS platform cybercriminals, "We see around 2,000 new malware variants per day on Android samples. There is a year he was just 50 per day. It goes very fast and the trend will increase, "said Ondrej Vlcek, CTO of avast CLUSIF therefore assesses that Obad.a is -. To date. - One of the most complex malware on the Android system

-. the danger of virtual currencies

If 2013 was one of the bitcoin (P2P currency), its ecosystem is far from stable because of the flaws security on intermediate platforms led to the actual digital age holdup. Despite the FBI stop the silk Road, because drug trafficking observed on this platform, accepting Bitcoin as transaction lever bring even a doubt that these channels are home to money laundering. the recent arrest of the deputy chairman of the Bitcoin Foundation is likely to further diminish the credibility of the system. on the other virtual currencies like Liberty Reserve, wary of US authorities also blocked

-. The objects connected not all safe

Cars, watches, sunglasses ... we get in a world all connected. But security experts put some warnings on the risks associated with the development of sensors on clothing and other fashion accessories for daily operations, leisure or work. Beyond hacked webcams, Google Glasses could also be hijacked without their owners being aware. Bruce Schneier, security expert, considers it necessary to assess the actual level of security of embedded systems such as the Internet of Things, "riddled with vulnerabilities and there is no good way to patch."

The best way to ensure that your personal data is not followed is to use a VPN service. The VPN reduces your online movements by replacing your routing information through an anonymous IP address, thus going beyond geolocation, either on your computer or mobile device. Secure DNS servers VPN keep secret requests that you make, so that nobody can see your browsing history. In addition, your Internet connection is encrypted with a very strong system that protects you against hackers and illegal ears trying to listen and obtain sensitive information about you. Your Internet connection is hidden behind many servers VPN :. When connected to the VPN, no one can access your computer or mobile device without using VPN protected servers

Previous
Next Post »
0 Komentar