By looking at trends in 2010, SecurityNewsDaily make predictions five Internet security threats to watch in 2011.
Hacktivism
The
hackers are not breaking the flow for the money. They break because
they do not agree with their victims. "Hacktivism is a new form of
demonstration in the virtual world," said Sean-Paul Correll, researchers
from PandaLabs.
Examples of hacktivism
activities are DDoS attacks, sending a barrage of data that a web site
server so that eventually overwhelmed serve stopped working-of PayPal
and MasterCard in December because of both financial services were
blocking the transfer of money from their users to WikiLeaks. Another
example is a DDos attack against the Motion Picture Association of
America and the Recording Industry Association of America conducted by
the 4chan forum. Both were attacked for making a web site The Pirate Bay
was closed.
Smart device
The
popularity of smart phones or other mobile devices, such as the iPad,
which connect to the internet is a "toy" just for criminals. Their main
targets, according to security firm SecureWorks origin, is banking
transactions conducted via smart phones or other smart devices.
"Where
there is money, there is a villain," said Patricia Titus, Vice
President & Chief Information Security Officer of Unisys.
"Clouds"
Cloud
computing is a computing trend in 2010. Data is placed on the internet,
can be accessed anytime and anywhere as long as there is a network. A
solution so bright point for some businesses. However, clouds can be
cloudy, right?
The most simple example is the
discovery of malware on Rapidshare file storage. Malware named
Trojan-Dropper.Win32.Drooptroop.jpa was alarming, according to
researchers from Kaspersky Lab Vicente Diaz, "Because not appear on the
Rapidshare link and can deceive ordinary security devices."
As more and more companies use cloud computing in this system, SecurityNewsDaily predicts many hackers dwell on it.
Social Engineering
Sophos
said last December there is a false message spread through Twitter.
Messages deceive computer users so that they believe their computer got a
virus so they are encouraged to download a fake antivirus which link is
included in the message as well.
This scam is not new, but will
continue in 2011, even with higher numbers. "About 500 million," so
called SecurityNewsDaily. Total number of users similar to Facebook.
"Social engineering is more convincing, more subtle, more widely spread,
as well as more professional," says Baumgartner from Kaspersky Lab.
One
factor that will contribute to social engineering is a service
penyingkat URL. Service is often used to shorten long URLs to fit with
social media web sites, like Twitter, which limits the number of
characters.
A computer science
student named Ben Schmidt experimenting with the web site URL penyingkat
product. The project is called "Evil URL Shortener" was not only
shorten the URL, but also with techniques DDoS attacks. "This is
evidence that penyingkat website can take people anywhere," said
Schmidt.
Stuxnet
Stuxnet
is the name of a type of malware worm that began spreading in June 2010
and is predicted to remain a scourge in 2011. The worm that attacks
systems using Siemens software in industrial control system was found to
attack a nuclear power plant in Iran.
It is estimated, Stuxnet sent by
a particular country, not by individual. The Internet is a new place
for the country to war, the researchers said, and will grow in 2011.
Examples of attacks launched by a
country is to attack China via the Internet to Google and 34 other
companies in January 2010. The attack, according to McAffee, very
complicated.
Of all the threats that arise, what can we do? At the very least: be careful.
Hacktivism
The
hackers are not breaking the flow for the money. They break because
they do not agree with their victims. "Hacktivism is a new form of
demonstration in the virtual world," said Sean-Paul Correll, researchers
from PandaLabs.
Examples of hacktivism
activities are DDoS attacks, sending a barrage of data that a web site
server so that eventually overwhelmed serve stopped working-of PayPal
and MasterCard in December because of both financial services were
blocking the transfer of money from their users to WikiLeaks. Another
example is a DDos attack against the Motion Picture Association of
America and the Recording Industry Association of America conducted by
the 4chan forum. Both were attacked for making a web site The Pirate Bay
was closed.
Smart device
The
popularity of smart phones or other mobile devices, such as the iPad,
which connect to the internet is a "toy" just for criminals. Their main
targets, according to security firm SecureWorks origin, is banking
transactions conducted via smart phones or other smart devices.
"Where
there is money, there is a villain," said Patricia Titus, Vice
President & Chief Information Security Officer of Unisys.
"Clouds"
Cloud
computing is a computing trend in 2010. Data is placed on the internet,
can be accessed anytime and anywhere as long as there is a network. A
solution so bright point for some businesses. However, clouds can be
cloudy, right?
The most simple example is the
discovery of malware on Rapidshare file storage. Malware named
Trojan-Dropper.Win32.Drooptroop.jpa was alarming, according to
researchers from Kaspersky Lab Vicente Diaz, "Because not appear on the
Rapidshare link and can deceive ordinary security devices."
As more and more companies use cloud computing in this system, SecurityNewsDaily predicts many hackers dwell on it.
Social Engineering
Sophos
said last December there is a false message spread through Twitter.
Messages deceive computer users so that they believe their computer got a
virus so they are encouraged to download a fake antivirus which link is
included in the message as well.
This scam is not new, but will
continue in 2011, even with higher numbers. "About 500 million," so
called SecurityNewsDaily. Total number of users similar to Facebook.
"Social engineering is more convincing, more subtle, more widely spread,
as well as more professional," says Baumgartner from Kaspersky Lab.
One
factor that will contribute to social engineering is a service
penyingkat URL. Service is often used to shorten long URLs to fit with
social media web sites, like Twitter, which limits the number of
characters.
A computer science
student named Ben Schmidt experimenting with the web site URL penyingkat
product. The project is called "Evil URL Shortener" was not only
shorten the URL, but also with techniques DDoS attacks. "This is
evidence that penyingkat website can take people anywhere," said
Schmidt.
Stuxnet
Stuxnet
is the name of a type of malware worm that began spreading in June 2010
and is predicted to remain a scourge in 2011. The worm that attacks
systems using Siemens software in industrial control system was found to
attack a nuclear power plant in Iran.
It is estimated, Stuxnet sent by
a particular country, not by individual. The Internet is a new place
for the country to war, the researchers said, and will grow in 2011.
Examples of attacks launched by a
country is to attack China via the Internet to Google and 34 other
companies in January 2010. The attack, according to McAffee, very
complicated.
Of all the threats that arise, what can we do? At the very least: be careful.