Google




Blogger Indonesia

Blog Tutorial

Add to Technorati Favorites

Submit Your Site To The Web's Top 50 Search Engines for Free!


Input Amount Here plz:
USD worth of e-gold


About Me


Name: Ariza P
Home: Solo, Central Java, Indonesia
About Me: I'm just a sick scientist... a person who likes to study in all my lifetime.. Coz.. Science is unlimited... Although all still Never Understand...
See my complete profile

Internet's Ad
Previous Post
Archives
Shoutbox
Name :
Web URL :
Message :



Hargailah Waktu...

Karena Waktu tak akan pernah kembali





Links

Google

Visitor Statistic
Tuesday, January 05, 2010

Internet Attackers in 2010




Mode cyber criminals are always looking for new ways as the way they previously unbroken. This is what would threaten Internet users in 2010. In addition to the conventional tricks, also beware of 'creativity' new principals.

  • Antivirus is not enough

With the increasing threat of polymorphic and unique explosion of malware variants in 2009, the industry quickly realized that the traditional approach to antivirus, either by signature files and the ability heuristic / behavioral, not enough to protect against the latest threats. We have reached a breaking point where the latest malicious programs actually made with a higher speed compared with good programs.

Thus, we also have reached the point where no longer makes sense to stay focused only on analyzing malware. The approach to security to find ways to include all the software files such as reputation-based security, will be key in 2010.

  • Social Engineering as a Main Vector Attack

More and more attackers to attack the user directly and try to outwit them to download malware or divulge sensitive information, with the impression that the user is not doing anything wrong. At least one of the triggers popularity of social engineering is the fact that any operating system and internet browser on the computer user, not the important thing, because penggunanyalah are a target, not merely the existing gap in their machines.

Social engineering has become one of the main attack vectors in use today, and Symantec estimates that the number of attacks experiment using social engineering techniques will certainly increase in 2010.

  • Fake Security Software Manufacturer Melonjak

In 2010, prepare to see the perpetrators of fake security software makers trying to increase the level further, even to hijack the victim's computer, turning it into useless and held for ransom. However, the next step which is not too drastic, is software that does not damage explicitly, but doubtful.

For example, Symantec has analyzed several antivirus vendors who sell counterfeit copies of third-party antivirus software with other brands as they supply. In this case, the user is technically did have antivirus software that they pay, but the reality is the same software they can download for free from somewhere else.

  • Third Party Applications Social Networking Target of Fraud

The popularity of social networking is expected to grow even higher in the next year to make the number of fraud will also continue to offset the amount of growth in the site's users. At the same time, owners of sites that will make proactive approach to overcome the threats.

As this goes on, and when these sites provide more ready access to their API to third-party developers, an attacker may be targeting the existing gaps in the application made by any third party to penetrate into the social network user accounts, just as we have seen when visited the attacker's browser plug-ins such as web browsers become more secure.

  • Windows 7 So the focus of the Striker

Microsoft has released the first security patches for Windows 7. As long as people who did the computer program code generation, the gap will still exist, no matter how tight testing prior to launch, and the more complex code, the greater the chance of the presence of security holes that have not been found. Microsoft's operating system is also not the exception, and because Windows 7 has begun circulating, and is expected to attract attention in 2010, no doubt, an attacker would have to find ways to exploit the user's Windows 7.

  • Botnet is Constantly Changing Fast (Fast Flux) Increasing

Fast flux is a technique used by some botnet like Storm botnet, to hide the phishing website and dangerous behind the already infected tissue which acts like a proxy. Using a combination of peer to peer networking, distributed command and control, web-based load balancing and proxy redirection, make a botnet tracking the location of origin is difficult.

When done penangkalan industry continues to reduce the effectiveness of traditional botnet, the new technique is expected to be more and more used to conduct attacks.

  • Shorter Service Best Friend Become URL Pretender

Because users often do not know where they will be delivered by the shortened URL, fraud can hide the link that makes the users who have high levels of suspicion average will think twice before clicking on it. Symantec has seen a trend toward the use of this tactic to distribute applications and will deceive many more were present. In addition, in order to avoid anti-spam filters, spammers are expected to use the service URL to pemendek their crimes.

  • Mac and Mobile Malware

The number of attacks designed to exploit the operating system or specific platforms was directly related to the platform market share, because the makers of malware to make money and always wants the best results of which they had sought. In 2009, we've seen the Mac, and smartphone makers target of malware, such as botnet Sexy Space is aimed at mobile devices based on Symbian operating system and OSX.Iservice trojan targeting Mac users.

With the increasing popularity of Macs and smartphones in 2010, more attackers will spend their time to create malware that can exploit this device.

  • Spammers Violate Rules

With economic conditions increasingly difficult, and more people take advantage of lax rules on CAN SPAM Act, we will see more and more organizations selling lists of email addresses and more marketers are not responsible for spamming the list.

  • Adapting spammers, fluctuating Keep Spam Volume

Since 2007, spam has increased by an average of 15 percent. Despite significant growth in this spam email may not be continuing in the long run, but it was obvious that spammers do not want to give up as long there are economic motives. The volume of spam will continue to fluctuate in the coming 2010 and spammers continue to adapt to increased security software, the intervention of a responsible ISP, and government agencies around the world.

  • Specialized malware

Highly specialized malware discovered in 2009 and has a goal to exploit a particular ATM. That indicates the high level of knowledge about the ins and outs and how to work and how it can be exploited. This trend is expected to continue to grow in 2010, including the possibility of malware targeting electronic voting systems, which are used in the political arena and voting via public telephone lines, as is widely used in many competition reality shows on television.

  • CAPTCHA technology will Rise

This will make the business more developed economies in the region that offers the people to collect accounts on legal sites, especially those that support user-generated content, for the purpose of spamming. Symantec estimates that these individuals would be paid less than 10 percent of the income spammers, with the search account to charge between 30 to 40 dollars per 1,000 accounts.

  • Instant Messaging Spam

Because the virtual world of criminals looking for ways to avoid CAPTCHA technology, attacks through instant messenger (IM) will increase its popularity. Threats through IM will consist of spam messages that contain unwanted malicious link, particularly attacks aimed at the active IM accounts. At the end of 2010, Symantec predicts that one of the 300 IM messages will contain the URL.

In addition, in 2010, Symantec estimates that, overall, one of the 12 hyperlink will lead to a known domain name is used to contain malware. Thus, one of 12 hyperlinks that appear in the IM message will contain a domain that is considered suspicious or dangerous. In 2009, levels only 1 of 78 hyperlinks.

  • Spam Non Indonesia will Rise

With the penetration of broadband connections continues to grow worldwide, particularly in developing economies, spam in countries that use languages other than English will increase. In some parts of Europe, Symantec estimates that spam localization rate will exceed 50 percent of all spam.

Labels: ,

posted by Ariza P @ 6:05 PM   0 comments