Nearing the start date of retail sales of the new operating system from Microsoft – Windows 8. And despite the fact that this version of Windows, like its predecessor, is designed based on the core NT, with its output of IT-industry expect significant changes.
Of course, these changes will affect and information security: At least we can predict the appearance of new families and even the types of malicious programs for Microsoft Windows.
Windows 8 is largely oriented to the use with tablet devices equipped with a touch screen. This is demonstrated not only a deep modification of the user interface, with its “tiled” representation of the Home screen panel Charms, integration with Windows Market and other amenities of modern mobile platforms, but also included the presence of a suite of applications, targeted specifically for portable hand-held devices . This is a great program, “pedometer”, which allows to calculate how far you have walked with your tablet, and the applet is “Location” in the Control Panel, tied to the testimony of the built-in GPS-receiver unit, this program “Journal” that lets you create handwritten notes that previously supplied only to Windows Embedded.
If so, we can with some confidence to believe that in the short term for Windows 8 will be new subspecies of malware that have plagued exclusively to users of mobile platforms such as Google Android. What do you say, for example, Trojan-Spy, which intercept and transmit attackers coordinate movements by Windows 8, obtained using the modules and GPS? How about malware, steal and exploit account Microsoft, Windows 8 is used to log into the system, work with Windows Market and synchronize user data with cloud services? After a single account Microsoft – is access to previously purchased applications to the address book, the e-mails …
One of the main threats to the users of mobile devices running the platform Android, a malicious theft of confidential information stored on the internal and attached storage devices, and the data transmitted through e-mail and SMS. Windows users are still less susceptible to such kinds of cyber attacks – in relation to the total number of other types of threats. The key phrase here – “yet,” because the use of cloud technologies for storing and synchronizing your contacts and mail can be a good bait for attackers if this technology will be found vulnerability. With years of experience with the products Microsoft, I personally am convinced that sooner or later, this vulnerability be found.
In other words, a gradual shift of emphasis in the market towards deepening the support of mobile devices will inevitably facing developers of antivirus software unexpected problems. New times dictate new challenges.