Featured Posts

Change UBUNTU to BackTrackHave you ever thought to change into BackTrack UBUNTU? yes, ubuntu is a very interesting animation plus hacking ability BackTrack 4 ......

Readmore

Negative impact of the Wi-Fi Signal On The BodyWi-Fi (wireless fidelity) better known as wireless local networks are becoming increasingly popular, especially in developed countries and the developing world.....

Readmore

Resistance Testing Simplified 4G iPhone ScreenAlthough not officially on sale in stores, but ranting about the virtues of Apple iPhone 4G began kebenaranya tested. One advantage is the resistance of the iPhone 4G iPhone 4G glass on the screen....

Readmore

Apple Buying From CISCO IOS Name With the launch of the iPhone 4G, Apple also officially launched the all IOS 4. 4 is the name of the IOS operating system on the iPhone 4G.....

Readmore

Fuck ISRAELCriticism of Israeli-Zionist tantrum comes from Indonesia, Turkey, Pakistan, Spain, Iran and the Vatican. U.S. only concern. World condemns Israeli attack on the Turkish-flagged ship Mavi Marmara that brings volunteers and humanitarian aid into the Gaza Strip.....

Readmore

Rss

Kaspersky: 2010, Cybercrime via Network File Sharing


JAKARTA - Kaspersky Lab, a leading management solutions for content describing security attacks that are expected in 2010 following the cyber criminal activity.

In 2008, analysts estimate the company, the number of global epidemics. Unfortunately, this prediction proved correct: The year 2009 was marked by the malware according dominated advanced rootkits (to Kido known) as Conficker, Web attacks and botnets, SMS fraud and attacks on social networks . So what can we expect from 2010?

Experts from the company in years to come we will see in the nature of the attacks against the user against attacks through web sites and applications against attacks on file sharing networks. Since 2009, a series of massive outbreak of malware is supported by the spread of malicious files via Torrent portals. This method is used to spread viruses, such as the famous and TDSS Virut backdoor and first for Mac OS X. In 2010, we expect a significant increase in the incidence of this type of P2P network to see.

Cybercriminals to stay competitive in the Internet traffic. Modern cyberspace crimes, more and more efforts to legalize, and there are many things they can to make money online with traffic in larger quantities are generated by botnets. Currently, the majority of the black market in traffic services botnet competition. In the future, we must await the emergence of systems more "gray" market botnet. The so-called "Partners Program" botnet owners of these measures can produce profits, sending spam, DoS attacks and distribute malware, without crime Express.

The decline was the Trojan game in 2009, probably again on fake antivirus programs in 2010. The latter appears only in 2007 and 2009, accompanied by increased activity of their involvement in a series of major epidemics. For example, worms, Kido, install rogue anti-virus in the infected computer. Fake antivirus market is now saturated and profits back to the cyber-crime. In addition, these activities under the supervision of the IT security companies and law enforcement. It is difficult to produce and distribute fake antivirus programs.

"Much more sophisticated malware slowly in 2010, and many anti-virus in the treatment of infected computers to infect, since the file and rootkit technology is sophisticated," said Alex Gostev, Kaspersky Lab Director of Global Research & Analysis Team.

He said that security company by developing tools to address more complex protection. But a malicious program is able to take these measures can more or less immune to the anti-virus programs for some time.

When the attacks occurred against a web service is probably Google headlines Wave in 2010. The attack against the new Google service will probably use the usual pattern: the first, followed by spam, phishing, and mengeskploitasi vulnerability and spread of malware. Opening planned chromium network operating system is a remarkable event, but the Kaspersky Lab does not expect higher interest rates on the platform of the virtual world of evil.

However, in 2010, certainly more difficult for the iPhone and Android. Created the first malware for mobile platforms in 2009, a sure sign that they have attracted the interest of cyberspace is a criminal. The iPhone users are at risk than those who have compromised machines, but we can not apply for users of Android, are vulnerable to attacks. The combined growing popularity of mobile OS Android in China with the lack of effective control to ensure the security software to third on the outcome of malware outbreaks within a high profile.

The detection of new security vulnerabilities will remain a major cause of the epidemic. This vulnerability in the software by third parties (such as Adobe, Apple, discovers, develops, etc..) And Windows 7, the operating system market alone memasukki. If no serious vulnerability is discovered, around 2010 proved to be one of the quietest years for some time. (SRN)


0 comments:

Post a Comment