Internet becomes the most attractive field for terrorists. According to experts, the main thrust of the attack on the users will be web -content, and the main event for the scammers - 2008 Olympics in Beijing.
Most threats are ' content- oriented '. Unprecedented attention from cybercriminals Deserve company Apple, particularly its novelty - iPhone.
The company Websense Security Labs has published a list of 10 most attractive ways to attack users. According to experts, the surge of cyber fraud in next year's Olympics in Beijing will. Olympic Games will lead to significant hacking activity: infestation sites dedicated to the event, thematic spam, DDoS- attacks.
Second place was given the sad list of researchers malicious spam. Forums, blogs, search engines and comments on news websites, experts predict, will be inundated with URL, leading to the infected page. As a result, criminals can not only infect a large number of users, but also promote the infected sites to the first lines of the web rankings and places in which are directly dependent on the number of inbound links to your site. Completing the top three attacks on the information network of ' new generation '.
Web 2. 0, which includes various blogs, and resources such as AJAX, Google, Mail, Flickr, TaDa lists. In widgets, advertising inserts and other elements of Web 2. 0 is a lot of weaknesses, which will take advantage of cybercriminals.
Fourth place is given to an infected Web sites. Hackers will focus on hacking and the introduction of malicious code on legitimate resource. Their number, according to the study, will exceed the number of specially created malicious sites.
' We compromise well-attended resources, criminals minimize the need for additional lures through email, instant messaging or posts on the web ' - experts explain.
Fifth place in popularity among scammers devoted to Apple in general and in particular the iPhone.
Sixth place, as a third, related to Web 2. 0. The difference between this kind of attack that they will be targeted at specific interest groups, topics, age groups and buying habits.
Particular attention will be paid, and security software - to reduce the likelihood of detecting malicious code attackers would use, for example, in JavaScript, the technique of polymorphism. This type of hacking specialists took seventh place.
On the eighth put the Websense researchers to improve and the global spread of technology for the development of data hiding Trojans. In the future, the viruses can successfully integrate the data in a variety of standard protocols and media files.
Last place left for the researchers themselves hackers, who in 2008, a nasty surprise. The fact that the estimated Websense Security Lab, after the new year, the world expects a massive expansion of large groups of hackers due to the successful coordination of police officers from around the world.
Closes the top- 10 ' vishing ' - voice phishing (a type of Internet fraud, which aims - to obtain the identity of users) and voice spam. The growing number of mobile phone users and Internet telephony will be used by fraudsters and unscrupulous distributors of advertising.
Extensive series of different hackers have been fixed weeks ago. Criminals are registered hundreds of domain names, urging the search program is that they are a major source of information.
Getting to such a trap, users visited malicious websites which can capture from their computers and extract them from the personal data. This action is estimated by experts as an absolutely unprecedented.
And if you believe a word of information security services, it is just the beginning.
According to some projections, by 2017, computers will play a huge role in the economy, business, science, infrastructure, and even personal life. Accordingly, the criminals will not disregard a promising area. After 10 years, terrorism will go into another dimension, but does not become any less bloody.
view.
No comments:
Post a Comment