Trend Micro”: the attacks highlighted the advanced security threats in 2014




Trend Micro”: the attacks highlighted the advanced security threats in 2014
January 7, 2014

Co said, “Trend Micro” (Trend Micro) specializing in security default, that the year 2014 will see a rise in threats lurking devices, mobile and organized attacks based on the methods the targeted of the two types of “watering hole” (Watering Hole) and “Click Jacquinj” (ClickJacking ) “deceive the web user clicking on a link is what is believed to be the link needed”, at a time fortifies the cybercriminals themselves and they disappear in the deep web.

The frequency of the company’s forecast for 2014 Echo comic drama about the newly released “Trend Micro” in nine episodes under the title of “2020: The Series”, depicting what the default threat to our world from the dangers of security with the end of the decade.

In the nearer term, is expected to show the year 2014 the large number of crimes in the Internet, it will affect the companies, governments and individuals, according to the “Raymond Jeans”, the head of Information Technology at the “Trend Micro”, who confirmed that methods such as search sources open and trolling with spears, which generally limited to targeted attacks, will become more popular in the coming year, due to cyber criminals involved knowledge and experience on best practices.

With regard to the attacks target, saw the jeans that the world will see more attacks “watering hole”, in which they are luring the victims to the sites of “bomb” based on the principles of social engineering, and attacks “Click Jacquinj”, which fool the user clicks on the link is what is believed to be link required.

On the other hand, remained threats to mobile devices are increasing for some time, and this year will be the smart devices located between a bullet targeted attacks and mobile banking, which will not return Khtota check Alosasatan sufficient to keep the user safe. The “attacks intermediaries” and malicious applications will pose a growing threat to users of smart phones from consumers and corporate employees.

Said Rick Ferguson, vice president for research in security, “Trend Micro”, the attackers continue to pursue technological developments, Mthinin chance vogue devices or platforms or means new technology among consumers on a large scale.

He added that mobile banking applications have recently become the norm alternative to receive an access code to the electronic service in a short text message, expecting to see the criminals are looking for ways to exploit it, especially since the thing to do with money, he said.

And went on, Ferguson said expected to be exposed other technologies emerging systems such as augmented reality, audio and visual, which is expected to be raised from several companies over the next twelve months, to large-scale attacks as soon as it reaches the critical point ahead of development and deployment, to make these devices a strong presence in the criminal scene default, due to its considerable potential in data collection and because of the ease it relates to the Internet.

It is expected to turn cyber criminals to every possible means to penetrate networks and steal valuable data, which means that the bumper year 2014 exposing techniques wearable, Kasaat smart, risk, also means an increase in attacks targeting systems, “Windows XP” and “Java 6 “, which stopped the producers of technical support, which poses a threat to the POS systems and equipment, health care and vital infrastructure, which continues to operate older versions of the systems,” Windows “is not supported.

They expected “Trend Micro” to see the year 2014 and the occurrence of a security breach huge data every month, especially with the growing ability of criminals to hide in the “web of deep” using tools such as the “Tour”, which make it difficult for law enforcement to reach them in the depths of the World Wide Web.

But will remain what is known as “Internet of Things” (which is the Internet, which integrates the material things which include them sliced ​​smart to be able to communicate, and thus become the elements of participation and active in daily life and business operations) far during the current year for threats broad, because they are under development. That cyber criminals are waiting, most likely, the emergence of applications, application Vogue “Internet of things” to take advantage of the opportunity.

It is expected to become a reality systems enhanced audio and video, in the wake of 2014, the next target for criminals, as it can penetrate the compact cameras in these systems and their use in espionage, it can also extract including sensitive data, as information access to personal accounts and banking.
Related Topics:

Cyber ​​attacks
Trend Micro


In: A Technology & Gadgets Asked By: [23202 Red Star Level]

Comments are closed.

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »

Star Points Scale

Earn points for Asking and Answering Questions!

Grey Sta Levelr [1 - 25 Grey Star Level]
Green Star Level [26 - 50 Green Star Level]
Blue Star Level [51 - 500 Blue Star Level]
Orange Star Level [501 - 5000 Orange Star Level]
Red Star Level [5001 - 25000 Red Star Level]
Black Star Level [25001+ Black Star Level]