
Company "Trend Micro" launched its own security expectations Annual entitled (expectations Trend Micro Security 2015 and beyond: concealer is visible), and highlighted electronic threats experts the company has highlighted the speculation report that indicates the spread of attacks from a growing countries where cyber criminals from states known to have succeeded in targeting victims around the world.
In addition, the report highlights seven security predictions for 2015, including the banking systems and payment systems.
As in the Middle East region, the self-loading software, which leads the user to the promotional ads were replaced at the forefront of these attacks, as well as e-mail spam messages.
Total spam attacks has reached more than 24 million attack during the third quarter of 2014, divided between the Kingdom of Saudi Arabia, which came under attack for 14 million, followed by the United Arab Emirates at a rate of 8 million attack, two million were distributed in an attack on the rest of the Middle East countries.
As was repulsed more than 1.5 million malicious software during the third quarter of the year, suffered users from the Middle East. The focus of the above risks mentioned in several sources led by banking sites on the Internet, and attempts to blackmail online, fraud sites and mobile applications.
According to the report, will continue to spread a campaign of targeted attacks during the year 2015, after the remarkable success of targeted attacks carried out by cyber criminals in the United States of America.
Combating threats experts predict quest hackers from countries such as Vietnam and the United Kingdom, India, for the use of targeted attacks, and attacks against non-traditional countries also finally got against institutions in countries such as Malaysia and Indonesia.
In this regard, Raymond Janes, senior technical managers to the "Trend Micro" he said, "is not what we are witnessing today is a big surprise, but the surprise is the brutal force and procedures followed by cyber criminals to steal information. Following the success of targeted Aljamat issued by China and Russia, many of the pirates from other countries will look to process electronic attacks as a way to find a foothold in their institutions. In addition, the growing barrage of violations, which are designed to show the data on a daily basis, it is logical to believe that data breaches will be within the normal form of the scenery changing security threats. "
The report also pointed out that the threats that are targeting banking institutions will continue to strength and with the electronic attacks targeting the largest and most complex banking institutions that they must follow the concept of dual factor authentication to protect the electronic services provided to clients.
Meanwhile, LG has Shirin vice president of technology and solutions to the "Trend Micro" said: "payment systems will continue to evolve in the foreseeable future. We expect huge amounts of data, and our experts in security and electronic protection we will continue to consider the threats that are trying to manipulate the systems Near Field Communication NFC, given the importance of some of the specific platforms and gained more momentum, and fondness for the end-user in the adoption of modern and advanced technologies. "
Among the most prominent expectations that referred to the report of the year 2015, that more cyber criminals will resort to hidden networks darknets, forums and exclusive access to share and sell malware.
The report is expected to translate the growing electronic activity on the web for the best tools and attempted piracy and more successful.
Manfrotto exploitation Android system packages, as the weaknesses in mobile devices play a bigger role in the injury of devices. And targeted attacks spread and prevail, like cyber crimes. The new payment methods via mobile devices Stanm new threat, and will see more attempts to exploit vulnerabilities in open-source applications.
And is expected to report "Trend Micro" of 2015 that protects the technical diversity "Internet of Things" devices from mass attacks, and this will not be the case for the data that you deal with it, and will appear more attacks and threats targeting e-banking services.
Private security expectations annual report for the year 2015 also included a steady increase in the exploitation of smart devices such as cameras and smart equipment and televisions with cybercriminals show greater aggressive in targeting these platforms and the institutions that manage the data.
Also, other factors such as competition and market pressure driving companies producing smart devices to put more and more smart devices without regard to security matters as required and pay online criminals to look for weaknesses to exploit to their advantage.
He concluded by saying Sherry: smart homes will continue to concepts and automated deployment in various parts of the world which will increase from cyber attacks in general, and therefore must hardware manufacturers consider how to protect evidence in these devices not only protect the devices themselves. "
No comments:
Post a Comment