World computer to get a new malware threat that is able to spread quickly. Even in 2008, there is some threat that the virus detected by Symantec.Symantec, based on official information, on Tuesday (30/12/2008), the first new type of Malware consists of millions of different threats that bermutasi when they spread quickly. This malware called Trojan.Farfli and was first discovered in July 2007.
Second is the security programs and false utility, also known as "scareware" that promises to clean computers or users. This program is installed along with Trojan horse programs and provide the results of one or misleading, and will survive on a PC that has infected users to pay for healing the false threat.
The third rocket attacks to be a trusted Web site. Sites is the target of most criminal activities. In 2008, Symantec observed that the Web is now becoming the main channel in the activities of the attack.
Economic Bottom Land has become an efficient global market place during the buy and sell stolen goods and services related to fraudulent activities, with the value of the goods offered by individual traders is estimated to reach millions of dollars. From July 2007 to June 2008, Symantec researchers found that the total value of goods and items that are advertised as observed in the underground economy servers for more than USD276 million. This is the fourth form of attack.
The next attack occurs related data breaches. The high volume of data breaches that emphasize the importance of technology and strategy of data loss prevention. With the increasingly frequent occurrence of mergers, acquisitions, and employees who dirumahkan in the current economic climate, data loss prevention is very important in protecting sensitive information, including intellectual property rights owned by a company.
"Two years from now, spam will be resolved," said Bill Gates in 2004. In 2008, we see the level of spam reaching 76 percent until the occurrence of incidents McColo in November 2008, which makes the level of spam declined to 65 percent. Meanwhile, the spam filtering become more sophisticated in the past year, spam attacks still appear and spread. This clearly indicates that the spammers do not capitulate in the fight spam. Even spam is the potential to become a more dangerous attack again.
Phishing attacks are next. Phishing is on hold in 2008. The attackers take advantage of events that occurred as the U.S. presidential election in 2008 to create a "bait" they are more convincing and attack techniques using a more efficient and automated. Phishing toolkits also continue to contribute to the problem.
Last is a browser plug-in or the Vulnerable. Vulnerability on a site often closely related to the vulnerability in the plug-in. This can be used to run Web-based attack sophisticated
Second is the security programs and false utility, also known as "scareware" that promises to clean computers or users. This program is installed along with Trojan horse programs and provide the results of one or misleading, and will survive on a PC that has infected users to pay for healing the false threat.
The third rocket attacks to be a trusted Web site. Sites is the target of most criminal activities. In 2008, Symantec observed that the Web is now becoming the main channel in the activities of the attack.
Economic Bottom Land has become an efficient global market place during the buy and sell stolen goods and services related to fraudulent activities, with the value of the goods offered by individual traders is estimated to reach millions of dollars. From July 2007 to June 2008, Symantec researchers found that the total value of goods and items that are advertised as observed in the underground economy servers for more than USD276 million. This is the fourth form of attack.
The next attack occurs related data breaches. The high volume of data breaches that emphasize the importance of technology and strategy of data loss prevention. With the increasingly frequent occurrence of mergers, acquisitions, and employees who dirumahkan in the current economic climate, data loss prevention is very important in protecting sensitive information, including intellectual property rights owned by a company.
"Two years from now, spam will be resolved," said Bill Gates in 2004. In 2008, we see the level of spam reaching 76 percent until the occurrence of incidents McColo in November 2008, which makes the level of spam declined to 65 percent. Meanwhile, the spam filtering become more sophisticated in the past year, spam attacks still appear and spread. This clearly indicates that the spammers do not capitulate in the fight spam. Even spam is the potential to become a more dangerous attack again.
Phishing attacks are next. Phishing is on hold in 2008. The attackers take advantage of events that occurred as the U.S. presidential election in 2008 to create a "bait" they are more convincing and attack techniques using a more efficient and automated. Phishing toolkits also continue to contribute to the problem.
Last is a browser plug-in or the Vulnerable. Vulnerability on a site often closely related to the vulnerability in the plug-in. This can be used to run Web-based attack sophisticated
0 Responses:
Posting Komentar