Posts Tagged ‘mobile phone threats’

Future Trends of Targeted Security attacks in 2012

January 17th, 2012 Comments off

AntiSec CorpPersonal data leaked out on the internet is becoming a very basic situation. Just lately, Sony suffered a huge breach of their PlayStation Network in the year 2011 that resulted in the theft of names, address and maybe credit card information belonging to almost 77 million end users. If you feel scenario is bad then we need to take on that things can get worse as more information and facts are thrown out on the internet by bizarre hacker organizations such as Anonymous, and cyber criminals begin to target smartphones and social media. In 2011, AntiSec, a LulzSec hacking group released more than 10GB of information from 70 United States law-enforcement agencies. Even though they aren’t motivated by money, AntiSec doesn’t like how various law enforcement agencies operate and it’s trying to embarrass and discredit them. They simply said “We don’t worry about collateral damage. It will happen, and so be it.”

However the actual problem these people didn’t realize is the fact that once they publish sensitive personal data, it is helping significantly less qualified cybercriminals to commit identity fraud. Every week, a govt dept or enterprise has its information breached.

While certain high-profile attacks like Sony’s usually are meant to humiliate and spark change, the United States law-enforcement breach could represent a change in hacker thinking. AntiSec’s motivations have the symptoms of a vital difference, using the attackers purposely thinking about collateral damage like a proper weapon.

Social Networking

social-networking-sitesExperts say the way forward for adware and spyware is much more about how exactly potential sufferers is going to be specific than how it will likely be designed. Collateral damage will not be restricted to innocents jeopardized through no-fault that belong to them. Maybe you have recognized a buddy request on Facebook or linked to someone on LinkedIn you do not know? Possibly you think it is someone from soccer practice you’d ignored, or perhaps a former friend whose title had ended up the mind. Hesitant to appear rude, you recognized them like a friend and rapidly didn’t remember about this.

Experts say the future of malware is much more about how exactly possible victims is going to be targeted compared to the way it will be engineered. Collateral damages will not be limited to innocents affected through no-fault of their own. Have you ever approved a friend request on Facebook or linked to somebody on LinkedIn you don’t know? Maybe you thought it was somebody from school you would forget about, or a former colleague whose name had slipped your mind. Not wanting to seem to be impolite, you approved them as a friend and easily forgot about it.

When we take trustable decisions in social networks we forget the ramifications of its future. Everyone knows people who talk about everything they do on a social network or even website, from eating their breakfast every day to cutting their nails. While most of us consider these individuals an annoyance and may hide their status updates, cybercriminals really like them. Password-reset questions are simple to guess, an internet-based tools such as, whilst not created for this purpose, supply online hackers with useful facts about guessing the passwords.

Organizational Targets

organizational-targets-social-networkingBogus security software programs are the most common type of social-engineering strike that researchers come across. Social networking sites are not being used only to target individuals, it also attacks business. A latest attack attempt occurred where online hackers targeted professionals of a major company through their spouse. The possibilities were at least one of the businessmen might have a badly secured home Computer that he shared with his non-tech knowledgeable wife. This could provide the backdoor required gaining access to the organization. Before two years there we one or two attacks, but now it increases in 100’s a day.

Social engineering is by far the most powerful weapon in the cybercriminal’s tool kit whereas automated malware resources and hacking toolkits are number two.

Android Smartphone Threats

Smart phone threats are on an upswing, but we have yet to determine a major incident. This actually is partly due to platform fragmentation. Malware creator’s still get much better results by targeting Computers or websites.

These types of mobile platform web-based viruses represent the new frontier of malware. Nowadays, Cell phones are serving as a second identity factor for all types of corporate and business authentication schemes. Companies that used to rely on hard tokens, like RSA protocols, are moving to soft tokens, which may be launched from the mobile phones inside their corporate area. Two-factor authentication initially emerged because individuals couldn’t trust computers. Using mobile phone devices as an identification factor beats two-factor authentication.


Today, Android is the big smart phone target but don’t be blown away if attackers soon turn their focus on the iPhone – particularly if third-party antivirus programs become more or less standard on Android devices. IPhone census is appealing to attackers, and security specialists will tell you that Apple products are infamously insecure.

Apple is unwilling to provide third-party security entities using the kind of platform access they have to improve the security of iPhones, iPads, Mac Book Airs and so forth. Apple is very much on its own with security. If we’ve learned something about security in the past Two decades, it’s that another major incident is definitely looming just over the horizon.

With the quantity of IP connected devices hiking to anywhere from 50 billion to a trillion within the next five to Ten years, tomorrow’s cyber-terrorist could target everything from home alarms and air traffic-control systems to flood control in dams.

Wordpress SEO Plugin by Wordpress SEO Plugin