4 problems difficult for network security 2013
After a dizzying pace of development, it can be said that 2012 is a year when global internet in general and network security in particular show signs of slowing down. Many experts have predicted that some trends or trends have shaped the internet world in 2012 will continue to play an important role in the global network map next year.
And here are a few of them:
Internet: Tools of governments
'Ultimately, many governments have realized that the internet is a relatively perfect tool for monitoring, controlling, counterintuitive, or even fighting.' That's a spokesman for Mikko Hypponen, technical director of F-Secure, a Finnish network security enterprise in a letter to technology news website CNET. Luckily, we can be sure that in 2013, the internet will not completely become a fiery battlefield between government, businesses and on the other side dangerous hackers. But 'work' prepares the internet to become a security front that has been prepared by many countries for a long time.
'There will definitely be projects like' Olympic Games' coming out in the future. Later, we will see the first 20 years of Internet existence is indeed the Golden Age, when everything is still free. ' The "Olympic Games" here Hypponen wanted to mention the US government-related project, which created Stuxnet, Duqu and Flame, tools to attack the Iranian government's network to undermine the program. nuclear of this country.
Network security expert Chris Wysopal agrees that 'digital war' will not be too strange. 'Virtual war will certainly exist in parallel with real life combat.' More specifically, government-assisted attacks in some countries will soon become 'routine'.
However, not because the attacks have occurred more often, but they are less likely to make the experts feel surprised.Network security expert Tomer Teller at Check Point said he was amazed at the number of"accurate oriented attacks"from hacker groups.
Tim Rains, director of Microsoft's security department, pointed out that the consequences of government-assisted attacks will be far more dangerous than those operating in Iran and attacks. enterprise network.
Mobile: The fat prey of hackers
Obviously, the second trend is a big opportunity for businesses or startups, not worrying like the trend we mentioned above. Network security experts are beginning to care about protecting their smartphones or tablets from internet threats from the past few years. With the current growth rate, the protection of mobile devices against hackers is even higher than ever.
Derek Halliday, product manager of Lookout Mobile Security, points out two trends that his company has noticed in 2012: Currently only a few main malware attacks mobile devices. The second trend, Halliday said: Ignoring the poorness of the number of malware, we can even see the incredible contrast to the number of attacks via mobile devices. dynamic.'If you try to trick someone over the phone in the US, you will encounter many problems and it will be difficult to succeed. However, things are different when the attack takes place in Russia or China. '
Halliday adds that Android 4.2 is currently the safest mobile operating system, with many upgrades in security from Google.But fragmentation will certainly make this operating system harder to choose, at least until the end of 2013.
On the other hand, Wysopal said, the consequences of mobile malware attacks are increasing.'In 2012, about 0.5% of US mobile phone users were attacked by malware and took away personal information stored in their phones. 0.5% may sound small, but this number represents about 1 million people, and absolutely cannot ignore it. The growth rate of this negative trend is slower than expected, but the consequences it brings are increasing over time. '
Having a different opinion than Halliday, the new proposal said that the new iOS is the safest mobile operating system:'Five years after the first version was released, no malware on iOS has been recorded yet. Apple has done a good job of it. '
Computer desk: Still the No. 1 goal
Clearly, mobile platforms have been developing rapidly.Evidence is that sales of Android-based devices have surpassed Windows-based computers since the third quarter of 2012. But this does not necessarily mean that PC users will Which is safe from hacker attacks.
In 2012, there was a "rootkit" (attack tool to take over the admin of the computer or network) called ZeroAccess, and it seems that the media and the community almost forgot about the presence of the tool. This danger. 'ZeroAccess is completely unnoticed by the community, but what it can do is in no way inferior to Conficker, the infamous tool on newspaper pages. Once entered into the computer system, it will install itself into the master boot record. Thus, this rootkit will be started before Windows starts to start. '
While Hypponen said that Windows 8 or Mac OS can use UEFI (Unified Extensible Firmware Interface, translated as " Unified Extensible Firmware Interface " ) to safely boot the operating system, Microsoft is concerned that the This can cause a lot of rootkit changes in the future, more difficult to detect and more difficult to eradicate.
2012 is about to go away is also a relatively difficult year for Mac OS when referring to the security aspect, mainly 'thanks to' the Trojan called Flashback. Hypponen said, 'The Flashback creator is still outlawing and rumors that he is creating something else. And while some clever changes have been made by Apple for Mac OS (Hypponen wants to mention the Gatekeeper on Mountain Lion), there is still a part of the user who has become a good prey for hackers. ' .
Data theft
One of the hot issues in 2012, is the attacks that steal data from individuals, businesses or even governments.Behind the server system of Google, Facebook or simpler is the mobile application that allows data storage on the server, is extremely valuable information for many advertising organizations, businesses or bad rather than criminals.
Therefore, Halliday advises internet users to protect themselves by learning and using personal customization tools on social networks, as well as paying attention to controlling personal information. social networks or other applications.
You should read it
- 7 mistakes make Internet security at risk
- Israel launches the world's first cybersecurity network
- Guidelines for securing computer network systems
- The basic steps in dealing with network security issues that you need to understand
- 5 types of data theft you should know to prevent
- Awareness and experience - the most important factor in every network security process
- Will 5G make us more vulnerable to cyber attacks?
- Things to know about a network intelligence analyst
- What is data exfiltration? How to prevent this dangerous behavior?
- Network security 2009: Disturbing computer virus problems
- The cybersecurity tools that every business should know
- The 5G era is near, but are security procedures ready?
Maybe you are interested
How to download Lien Quan Mobile for PC using emulator software
Download link Naraka Bladepoint Mobile for Android and iOS
How to download Dead By Daylight Mobile for iOS and Android
'Silent' Town: No Wifi, No Mobile Signals for Over 60 Years
Tips to beat the Ice Dragon boss in PUBG Mobile
Formula for combining Golden Pan DTCL season 13, TFT Mobile 14.23