Friday, January 28, 2011

5 internet security threats in 2011

By looking at trends in 2010, SecurityNewsDaily make predictions five Internet security threats to watch in 2011.

Hacktivism
The hackers are not breaking the flow for the money. They break because they do not agree with their victims. "Hacktivism is a new form of demonstration in the virtual world," said Sean-Paul Correll, researchers from PandaLabs.

Examples of hacktivism activities are DDoS attacks, sending a barrage of data that a web site server so that eventually overwhelmed serve stopped working-of PayPal and MasterCard in December because of both financial services were blocking the transfer of money from their users to WikiLeaks. Another example is a DDos attack against the Motion Picture Association of America and the Recording Industry Association of America conducted by the 4chan forum. Both were attacked for making a web site The Pirate Bay was closed.

Smart device
The popularity of smart phones or other mobile devices, such as the iPad, which connect to the internet is a "toy" just for criminals. Their main targets, according to security firm SecureWorks origin, is banking transactions conducted via smart phones or other smart devices.
"Where there is money, there is a villain," said Patricia Titus, Vice President & Chief Information Security Officer of Unisys.

"Clouds"
Cloud computing is a computing trend in 2010. Data is placed on the internet, can be accessed anytime and anywhere as long as there is a network. A solution so bright point for some businesses. However, clouds can be cloudy, right?

The most simple example is the discovery of malware on Rapidshare file storage. Malware named Trojan-Dropper.Win32.Drooptroop.jpa was alarming, according to researchers from Kaspersky Lab Vicente Diaz, "Because not appear on the Rapidshare link and can deceive ordinary security devices."
As more and more companies use cloud computing in this system, SecurityNewsDaily predicts many hackers dwell on it.

Social Engineering
Sophos said last December there is a false message spread through Twitter. Messages deceive computer users so that they believe their computer got a virus so they are encouraged to download a fake antivirus which link is included in the message as well.

This scam is not new, but will continue in 2011, even with higher numbers. "About 500 million," so called SecurityNewsDaily. Total number of users similar to Facebook. "Social engineering is more convincing, more subtle, more widely spread, as well as more professional," says Baumgartner from Kaspersky Lab.
One factor that will contribute to social engineering is a service penyingkat URL. Service is often used to shorten long URLs to fit with social media web sites, like Twitter, which limits the number of characters.
A computer science student named Ben Schmidt experimenting with the web site URL penyingkat product. The project is called "Evil URL Shortener" was not only shorten the URL, but also with techniques DDoS attacks. "This is evidence that penyingkat website can take people anywhere," said Schmidt.

Stuxnet
Stuxnet is the name of a type of malware worm that began spreading in June 2010 and is predicted to remain a scourge in 2011. The worm that attacks systems using Siemens software in industrial control system was found to attack a nuclear power plant in Iran.

It is estimated, Stuxnet sent by a particular country, not by individual. The Internet is a new place for the country to war, the researchers said, and will grow in 2011.

Examples of attacks launched by a country is to attack China via the Internet to Google and 34 other companies in January 2010. The attack, according to McAffee, very complicated.
Of all the threats that arise, what can we do? At the very least: be careful.

No comments:

Post a Comment