Recent Post

Monday, January 9, 2012

Malware Predictions in 2012

malware
Entering 2012, the development of cyber security and threat will facing a challenge and complex conditions. On the other hand, the awareness growing of these aspects help to suppress malware escalation level  attack.

Here are some predictions that need to be a record in 2012:

  1. Global statistics reported by Gartner indicates that the use of OS Windows 7 on a computer in the world is increased in the end of 2011 with a share of 42 percent, it is replacing Windows XP in the top rankings. These conditions will change the map that was developed by the threat of cyber criminals. In the year 2012 it is expected to be no significant change in the development of related malware attacks that target shifted to a "new" OS Windows 7 and Windows 8, by doing a by pass of security mechanisms.
  2. Another consequence of the change from Windows XP to Windows 7 is reduced level of Conficker infections. Worm that appeared since November 2009 and became a legendary worm, and it most commonly found in the last three years.
  3. Localized attacks will continue, ie, using social networking as a media in the form of phishing attacks and trojans. The target is clear, to steal banking related data stored on the computer.
  4. Hacktivism. By the Increase and widespread of Internet attacks with a ideology background, a series of attacks occurred in some parts of the world. In 2012 it is expected to have increased and expanded to other parts of the world. Therefore, whether institutional or enterprise is encouraged to complete their computer system with full security to prevent the attacks of certain groups such as anonymous or something.
  5. Data loot becomes the traded commodity. Trade the stolen information will be more intense and used for legal activities. Information search function is of course done by using botnets that are no longer limited just to steal your email address and password and limited demand on the spammers. Next botnet will develop massive data search and so complete, that information will then be traded, with the target buyer is a company to push company lead generation. For these needs, Botnets collect the information and appears as a fake online form.
  6. Mobile communication devices will be a vector to attack a network and other critical systems. On the PC, the manual configuration and patch can be done in a matter of days so that the threat could be handled more quickly and easily, while the mobile communication devices - smartphones take a little longer. So the absence of patches and updates are on mobile communication devices become vulnerable to threats and will be much more difficult to handled.

Review http://www.computer-issue.blogspot.com on alexa.com

0 comments:

Post a Comment