Friday, 31 December 2010

The attack on Social Networks Will Continue to Increase

What will happen later in the year 2011 relating to IT security? Threat or threats what should we watch out and be like if the face of the threat in 2011?
Consider the prediction of security experts from ESET. These predictions are compiled David Harley, Director at ESET Malware Intelligence and analysts in Cyber Threat Analysis Center (CTAC), an agency that analyzes cyber threats, as well as part of a new research body set up by ESET about trends 2011.

According to this analysis, social networking media will remain a primary target of attacks as experienced during the year 2010 either by the users of Google and Facebook. It will even have a tendency to increase in 2011 on social media sites such as LinkedIn, Orkut, and Twitter. Similarly to search engines such as Bing and Yahoo.
Occurrences up on the other side also raises new problems, and the problem will still exist if the threat eradication efforts are limited to just the symptoms by providing menus of privacy in social media such as wanted by users, so that data security remains the responsibility of the consumer but eradication was not up to "illness". Danger on Facebook is still there, but still subtle.

Attacks on mobile devices will have increased: certain brands that complement their products with the application for protection will be increasingly vulnerable to malware attacks, however, that certainly is an attack of false social networking will continue.

In the meantime, there will be no new botnet that will emerge, old botnet still be hanging around and increased during the year 2011. According to the Shadowserver data, the botnet circulation volume would still increase, meanwhile, expressed growing volume of data ThreatSense.Net bot malware still continues, where it shows a zombie infection will include a higher proportion than the infection in other systems.

A rather unpleasant news lately is the success of reducing infection rates and botnets in 2011 will continue, even these efforts will reduce the growing botnet. Analysts at the Cyber Threat ESET said that botnets will remain a major problem, but hopefully in the future, will more and more computer users are aware that the botnet that seem small and benign as well have a dangerous threat as a botnet which is known. Consciousness has become an important point though previous botnet siphon attention from cyber security researchers are now beginning to be forgotten by the manufacturer.

The appearance resembling Boonana Koobface, and potentially infect more than one OS. These conditions allow more malware based on Java to work with multiple platforms, for example, that use zombie botnets and able to work on two Windows OS and non-Windows operating systems.

Blackhat SEO (Search Engine Optimization), sometimes appearing as a virus or index index piracy, and blackhats opportunity to optimize the way it works will be more open in controlling traffic malware with real-time search mainly because of the use of social networking media, the topic of this issue has become a matter The main discussion at the Virus Bulletin Conference 2010.

Social networking media is still going to be one of the biggest problems, not only in the context of malware. Most of the malware will still be roaming and infect via the same road as email, malicious URLs, community forums, newsgroups mebujuk by potential victims to click on something. One might also be quite surprising is the vulnerability on. LNK also be increased from time to time though it has been long ago since the vulnerability was found.

The attack in the form of SCADA data theft are still going to exist, but will likely use a spear-phishing and malware social networking or even 0-days, and the Trojans rather than to replicating malware such as Win32/Stuxnet. But unfortunately Stuxnet's main strength seems to have been in lemahkan although Stuxnet code can also easily adaptable to attack all the installations that are not related so that we can be sure that the use of malware for the purpose of sabotage remains speculative and remains an active investigation be done.
Additionally, scrapping tools on social networking sites such as commonly used to steal data, will reduce the burden for spear phishing attacks, which will lead to attacks on other strategic targets.

"With increasingly active social network users in Indonesia, it is expected that each user has the awareness to protect your account and computer respectively. Most social networking sites provide data protection responsibilities to the owner of the account. For computer security, ESET has anticipated through its ability to detect malware from third party on the social networking programs. To the people of Indonesia, Indonesia also offers a blog ESET ESET Indonesia as a means of public education, "according to Yudhi Stearns, Security Consultant, PT Prosperita-ESET Indonesia.

Security companies that give particular attention to the anti-malware will tend more and put trust in the cloud-based telemetry for Reputational analysis and scheduling processing of malware. In a workshop organized by Caro in May 2010 in Helsinki, the number of malware samples that stand out at 40 million samples. For the year 2011 will likely reach 50 million figure. The number is fairly conservative, because getting accurate numbers is also not easy due to several factors including differences in the way of counting in each company's security and not enough time to check whether there is double counting sample.

Source ::

Read More :: 
- Lives can not be saved Due So Passive Smokers
- New Year's Eve, Jakarta Rain?
- Romantic New Year at Home
- Supply, Handbook of Making Bomb Al Qaeda


Post a Comment


YOUR-MEDIA Copyright © 2009 WoodMag is Designed by Ipietoon for Free Blogger Template