Posts Tagged ‘cybercriminals’

Security AnalysisEvery year the information security threats are becoming more difficult to detect.

2011 for most businesses was a year of awareness of the seriousness of issues related to information security, as many well-known organizations have experienced hacking of information systems and information leakage.

During 2012, we can see that there are new types of malicious software, expands the range of virus and hacker attacks – compared to last year the malicious activity increased by 30%. World Network in the near future, of course, remain the main channel for the dissemination of malware. Attackers will continue to develop methods of social engineering designed to targeted attacks on browsers and related applications (applications that run group).

For most organizations, it becomes a serious threat information increased use of smartphones and tablet PCs. Poor control of mobile devices raises a number of employees of information security problems requiring urgent solutions, and creates a lot of challenges for IT departments.

It can be expected that cybercriminals will continue to actively use cloud technology to spread malicious code. Continue hacktivists attack groups such as LulzSec and Anonymous, leading to a denial of service, leaked documents and inaccessible sites. (more…)

Symantec CorpSymantec has conducted investigation into the attacks of “zero-day” (zero-day attack), received discouraging results: on average, hackers are able to unauthorized use of unknown vulnerabilities in a wide range of over 312 days or 10 months. Furthermore, the number and severity of these attacks in recent times only grow.

Exploit “zero day”, as the combination of a vulnerability, is not widely publicized, and the tools to exploit this vulnerability, an attacker in order to have great value for cybercriminals. Once the vulnerability becomes generally known, developers, and system administrators are beginning to work actively to block or neutralize the threat, then the next exploit “zero day” becomes almost useless to cybercriminals. (more…)