gsmilocos

Would you like to react to this message? Create an account in a few clicks or log in to continue.

Share Me


3 posters

    5 internet security threats in 2011

    HYPERTEK
    HYPERTEK
    Site Owner
    Site Owner


    Location : Banga Town
    Posts : 3948

    Character sheet
    INCSA:

    5 internet security threats in 2011 Empty 5 internet security threats in 2011

    Post by HYPERTEK Wed Feb 02, 2011 5:59 pm

    By looking at trends in 2010, SecurityNewsDaily make predictions five Internet security threats to watch in 2011.


    Hacktivism
    The
    hackers are not breaking the flow for the money. They break because
    they do not agree with their victims. "Hacktivism is a new form of
    demonstration in the virtual world," said Sean-Paul Correll, researchers
    from PandaLabs.


    Examples of hacktivism
    activities are DDoS attacks, sending a barrage of data that a web site
    server so that eventually overwhelmed serve stopped working-of PayPal
    and MasterCard in December because of both financial services were
    blocking the transfer of money from their users to WikiLeaks. Another
    example is a DDos attack against the Motion Picture Association of
    America and the Recording Industry Association of America conducted by
    the 4chan forum. Both were attacked for making a web site The Pirate Bay
    was closed.


    Smart device
    The
    popularity of smart phones or other mobile devices, such as the iPad,
    which connect to the internet is a "toy" just for criminals. Their main
    targets, according to security firm SecureWorks origin, is banking
    transactions conducted via smart phones or other smart devices.
    "Where
    there is money, there is a villain," said Patricia Titus, Vice
    President & Chief Information Security Officer of Unisys.


    "Clouds"
    Cloud
    computing is a computing trend in 2010. Data is placed on the internet,
    can be accessed anytime and anywhere as long as there is a network. A
    solution so bright point for some businesses. However, clouds can be
    cloudy, right?


    The most simple example is the
    discovery of malware on Rapidshare file storage. Malware named
    Trojan-Dropper.Win32.Drooptroop.jpa was alarming, according to
    researchers from Kaspersky Lab Vicente Diaz, "Because not appear on the
    Rapidshare link and can deceive ordinary security devices."
    As more and more companies use cloud computing in this system, SecurityNewsDaily predicts many hackers dwell on it.


    Social Engineering
    Sophos
    said last December there is a false message spread through Twitter.
    Messages deceive computer users so that they believe their computer got a
    virus so they are encouraged to download a fake antivirus which link is
    included in the message as well.


    This scam is not new, but will
    continue in 2011, even with higher numbers. "About 500 million," so
    called SecurityNewsDaily. Total number of users similar to Facebook.
    "Social engineering is more convincing, more subtle, more widely spread,
    as well as more professional," says Baumgartner from Kaspersky Lab.
    One
    factor that will contribute to social engineering is a service
    penyingkat URL. Service is often used to shorten long URLs to fit with
    social media web sites, like Twitter, which limits the number of
    characters.
    A computer science
    student named Ben Schmidt experimenting with the web site URL penyingkat
    product. The project is called "Evil URL Shortener" was not only
    shorten the URL, but also with techniques DDoS attacks. "This is
    evidence that penyingkat website can take people anywhere," said
    Schmidt.


    Stuxnet
    Stuxnet
    is the name of a type of malware worm that began spreading in June 2010
    and is predicted to remain a scourge in 2011. The worm that attacks
    systems using Siemens software in industrial control system was found to
    attack a nuclear power plant in Iran.


    It is estimated, Stuxnet sent by
    a particular country, not by individual. The Internet is a new place
    for the country to war, the researchers said, and will grow in 2011.


    Examples of attacks launched by a
    country is to attack China via the Internet to Google and 34 other
    companies in January 2010. The attack, according to McAffee, very
    complicated.
    Of all the threats that arise, what can we do? At the very least: be careful.
    sanMIGlyt
    sanMIGlyt
    Bagnet Important Person
    Bagnet Important Person


    Location : iloilo city
    Posts : 375

    5 internet security threats in 2011 Empty Re: 5 internet security threats in 2011

    Post by sanMIGlyt Mon Mar 21, 2011 3:40 pm

    thank you sa information
    rich2011
    rich2011
    GI-SAM


    Location : manila
    Posts : 423

    5 internet security threats in 2011 Empty Re: 5 internet security threats in 2011

    Post by rich2011 Mon Mar 21, 2011 7:40 pm

    yun pala yun. Now i know

    Sponsored content


    5 internet security threats in 2011 Empty Re: 5 internet security threats in 2011

    Post by Sponsored content


      Current date/time is Sat Nov 16, 2024 11:52 am