Some time ago, our friends at Symantec have concluded several threats that emerged in the year 2009. This time try to predict Symantec noteworthy threats in 2010. These threats, among others:
• Antivirus is not enough - Poliformik and some unique malware variants provide a serious threat in the year 2009. Traditional approach to antivirus, either by signature files and the ability heuristic / behavioral considered not sufficient to protect the computer from the latest threats. Symantec thinks that now is the point of where the latest malicious programs created with higher speeds.
• Social Engineering as a Main Vector Attack - cyber criminals to attack the user directly. The criminals are also more trying to deceive their victims to download malware or divulge sensitive information, with the impression that the user does not do a thing wrong. One of the triggers social engineering popularity is the fact that the operating system and Internet Brower which is in the computer user is not a gap that was attacked by cyber criminals., But the user itself. Social engineering has become one of the main attack vectors in use today, and Symantec estimates that the number of attacks experiment using social engineering techniques will likely continue to increase in 2010.• Fake Security Software Manufacturers Increase His business - In 2009, a lot of false security software in circulation. In 2010, be prepared to see a more sinister threat. Prepare to see the perpetrators of fake security software makers trying to increase the level further. Hijack the victim's computer, change the computer becomes useless is one example of actions that they can do. However, not all their actions threaten the victim's computer. For example, Symantec has analyzed several antivirus vendors who sell counterfeit copies of third-party antivirus software with other brands. In this case, the user is technically did have antivirus software that they pay, but the fact is, the same software, they can download for free from somewhere else.
• Applications of Social Networking Party will be a Target of Fraud - Managing social networking websites continue to increase the security of their website. However, it turns out that criminals are not targeting the gaps on the website. The attacker is likely to attack the existing gaps in the application made by any third party to penetrate into the social network user accounts, just as we have seen when the attackers visited a browser plug-ins such as web browsers become more secure.
• Windows 7 will be a focus of the attacker - Recently, Microsoft has launched the first security patch for Windows 7. Each party developers to think to mend the gap, cyber criminals have been one step ahead of developers. Microsoft's operating system is also not the exception, and because Windows 7 has begun circulating, no doubt, an attacker would have to find ways to continue to exploit users of Windows 7.
• Botnet a Continuously Changing Fast (Fast Flux) Rising - Fast flux is a technique used by a botnet, such as the Storm botnet, to hide phishing and malicious websites under the already infected tissue which acts as a proxy.
• Service URL Penyingkat Best Friend Become Boots - Because users often do not know where they will be delivered by a URL that has been shortened, fraud can hide a dangerous link. One example is the URL penyingkat service bit.ly. Symantec has seen a trend toward the use of this tactic to distribute applications to deceive. In addition, in order to avoid anti-spam filters, spammers are expected to use the service URL to pemendek their crimes.
• Mac and Mobile malware will Rise-In 2009, we've seen the Mac, and smartphone makers target of malware, such as botnet Sexy Space is intended for mobile devices based on Symbian operating system and OSX.Iservice Trojan targeting Mac users. With the increasing popularity of Macs and smartphones in 2010, more attackers will spend their time to create malware that can exploit this device.
• Spammers Violate Rules - With economic conditions increasingly difficult, and more people take advantage of lax rules on CAN SPAM Act, we will see more and more organizations selling lists of email addresses and more marketers are not responsible for spamming the list.
• Adapting Spammers, Spam volume will fluctuate Keep - Since 2007, spam has increased by an average of 15 percent. Despite significant growth in this spam email may not be continuing in the long run, but it was obvious that spammers do not want to give up as long there are economic motives. The volume of spam will continue to fluctuate in the coming 2010 and spammers continue to adapt to increased security software, the intervention of a responsible ISP, and government agencies around the world.
• specialized Malware - Malware is highly specialized, discovered in 2009 and has a goal to exploit a particular ATM. This trend is expected to continue to grow in 2010, including the possibility of malware targeting electronic voting systems, which are used in the political arena and voting via public telephone lines, as is widely used in many competition reality shows on television.
• Increased technology will CAPTCHA - This will make the business more developed economies in the region that offers the people to collect accounts on legal sites, especially those that support user-generated content, for spamming purposes. Symantec estimates that these individuals would be paid less than 10 percent of the income spammers, with the search account to charge between 30 to 40 dollars per 1,000 accounts.
• Instant Messaging Spam - As the virtual world of criminals looking for ways to avoid CAPTCHA technology, attacks through instant messenger (IM) will increase its popularity. Threats through IM will consist of spam messages that contain unwanted malicious link, particularly attacks aimed at the active IM accounts. At the end of 2010, Symantec predicts that one of the 300 IM messages will contain the URL. In addition, in 2010, Symantec estimates that, overall, one of the 12 hyperlink will lead to a known domain name is used to contain malware. Thus, one of 12 hyperlinks that appear in the IM message will contain a domain that is considered suspicious or dangerous. In 2009, levels only 1 of 78 hyperlinks.
• Non-Home Spam Will Rise - With the penetration of broadband connections continues to grow worldwide, particularly in developing economies, spam in countries that use languages other than English will increase. In some parts of Europe, Symantec estimates that spam localization rate will exceed 50 percent of all spam.
Windows 7 will fight threats in 2010.
/ 2/23/2010 11:43:00 AM /
0 komentar:
Posting Komentar
pleas share your informations with me..