The following security trends are expected to be popular this year, based on reviews of security firms that PC World collection.
The SSL protocol does not really safe
Typically, users will feel reassured to see the security icons displayed on the browser's tool bar after installation. But do not rush subjective, hackers have found new ways to get information when users send secure manner usually through the Internet.The format of this new malicious software can tell time when you visit the Web site is secured with SSL - an encryption technology to ensure safety is to be trusted on the Internet. The malicious software can "breathe" the name and password before they are encrypted. According to security software maker Webroot, then this attack can bypass the filter and flow of public information to only target information is encrypted on the network and that are most likely valuable information.
Malicious applications aimed at specific targets appear more
The malicious software targeted specifically tends to increase. The software of this type can access the web access history of users and "ambush" waiting for the opportunity to attack when they visit a certain page. For example, the malicious software spy only steals online banking information of the user will only check and lurking in the bank's website that users visit. The number of malware is programmed to target the specific objectives will be very popular so this year.Difficult to detect and remove malicious software over
While old-style malicious software often have specific shape disguise as a certain program on his computer, "descendants" of much more advanced. They are nearly invisible and does not affect significantly to the performance of your computer so that users can be questioned. They even did not have an interface that runs silently in the background and only attacked when the chance.The removal of malware is also becoming more difficult. For example one example is the potential for very deep ZeroAccess rootkit in your system and turn it off extremely difficult. ZeroAccess disable any program that attempts to access it (this is why it is named as such).
The software is actually not new - they have emerged from several years in many different forms. They had disguised form of anti-virus software and keep troublemakers at lì computer until the user accepts payment for paid software. Malwarebytes company representative said that this software is in danger of an increase in the future with increased hazard level is higher. They can lock your computer until you accept a new payment only.
The attack of this kind also risk theft of data hundredfold higher than when you pay to accept the "ransom" to control your computer - you must provide information related to your credit card and surely it will be exploited in some time.
The former risk is re-
The old type of malicious software are also emerging. The researchers of CheckPoint security company that will have so many things appear again this year. Applications such as the Storm worm has been circulating a few years ago will find its way back under the new camouflage coat.Malware on the development of mobile devices, how?
A story last year was quite noisy appearance of rogue software on mobile devices running Android. Months to the end of 2011, we have witnessed the rise of malicious software disguised as applications in Android Market. Is not it time to worry about this problem?The representative said that CheckPoint is still no clear expression of malicious software attacks on mobile devices on a large scale but they warn that they will certainly be at risk in the future.
0 comments:
Post a Comment