Posts Tagged ‘information threats’

Valentine Day ThreatsOn the Internet a lot of social services intended for communication and personal acquaintances.

Sometimes users find their other half is in the vast global network. For this reason, Valentine’s Day is very popular with cybercriminals is coming is a good time to spread malicious content of unsuspecting users.

“The popular holidays such as Valentine’s Day, increase the vulnerability of Internet users. Attackers prepare thematic content of interest to people in this day. Users willing to click on an infected link disguised as a greeting card or a love message, and can easily become victims of cybercrime. “

Antivirus companies offer a number of ways to protect themselves and their information on Valentine’s Day:

Avoid opening the congratulatory messages from unknown senders, probably love letter instead of a mysterious stranger that proved fraudulent letter from cybercriminals. The same recommendation applies to downloading attachments in such a report files – besides infecting your computer, they can lead to unwanted ads while browsing the site. (more…)

FortinetAmong the key risks – sophisticated targeted attacks on mobile devices and applications, active use of malicious IPv6 shelters and exploits.

1. The purpose of APT attacks will be mobile users

APT attacks, the so-called sophisticated targeted threats (Advanced Persistent Threats), named No. 1 threat because of their ability to use a variety of techniques and the latest technology for simultaneous attack from all sides. All these actions are clearly aimed at achieving a specific goal – to gain access to confidential information. A few recent examples of victims: Stuxnet, Flame and Gauss. Analysts expect that in 2013, the main purpose of APT attacks will shift to the private individuals, executives, politicians, and public figures. Confirm this forecast will be extremely difficult, in part because, after hackers managed to gain access to desired data, they can easily remove malware from the target device before the victim realizes what has happened. Moreover, it is hardly a person who have been victims of such attacks, will report the incident to the media, as it is in the first place will affect their personal reputation, and not on the company, public or government organization. In turn, attackers will actively seek out the information that they could use for criminal purposes, such as blackmail or industrial espionage in order to obtain compensation. (more…)