Nightmare named virus
Already far away, the time when the author of the virus has shattered millions of computers is just a teenage hacker 'little pony', wants to prove the male character. Now look back, it's still, anyway
Already far away, the time when the author of the virus has shattered millions of computers is just a teenage hacker " rocky horse ", wants to prove the male character. Now look back, anyway, it's still a " good past ".
Do you think this conclusion seems paradoxical and weird? In fact, the current security situation compared to that day was really " a heavenly one ". Today's attacks were narrower, but the attack hit the target - piercing even the most reinforced operating systems.
Instead of the old " rocky horses ", writing a certain virus program just to make the world famous, now, the attacks are mostly funded by criminal gangs. Their purpose is clear: stealing information (both corporate data and personal accounts) for use in sophisticated fraudulent cases.
So it is not surprising, when the software designed to secure the system itself turns into a target of hackers. In addition to the wave of attacks aimed at the Windows operating system, another trend is intensifying to attack many installed applications.
From database software, antivirus software, data backup software or even music software - all the gaps of these programs are thoroughly exploited. Information of corporations and even countries are at risk of intrusion. " The attacks are all about information theft, " Symantec's product manager said.
New risk
It's dangerous when most users are subjective that they are safe because they always install the latest security patch. You must always ensure that in addition to the operating system, other applications installed in the device are always up to date.
Fortunately, more and more programs, such as Adobe Acrobat Reader and Mozilla Firefox, are equipped with an automatic update system (Please note that both AAR and Firefox have been hacked in 2005). And because these applications run on different types of systems, users of Mac OS X or Linux operating systems cannot lull themselves to sleep that no hacker craves.
Looking back at SANS 'Top 20 most serious security vulnerability report, we will see up to 9 cases designed to attack many different operating platforms. File sharing programs like eDonkey, Kazaa and BitTorrent are the most bombarded targets. The main problem is that all files distributed through these P2P networks can be viral infectious agents without users knowing.
Crime of media
From Windows Media Player, RealPlayer to iTunes and Sony BMG's CD, most popular music players have security holes, allowing attackers to automatically install malicious programs such as keyboard tracking. , stealing passwords and other account information. Therefore, it is concluded that illegal downloading is illegal and there is a high risk of being sued. Security risk is another compelling reason for you to consider staying away from file sharing programs.
Another trend is also worrying that hackers are increasingly bombarding web servers. In the worst case scenario, they can create fake sites, or even snatch control of the real site - to carry out attacks aimed at everyone who visits the file, through the vulnerabilities included. Browser. (Many websites that use PHP scripting language have been put into view this year).
A few tranquilizers
It seems that the nightmare of this virus also causes you constant headaches and insomnia. While waiting for an effective remedy, comfort yourself with some tranquilizers.
One experience was that all vendors of computer hardware and software had to learn from Microsoft and Apple in providing security and updates to the system automatically. Criminals attack loopholes with faster speeds and of course, we can never say, "Hey, wait for me to install the security system" with them.
It can be said that the security thinking of both consumers and technology firms has been outdated until . 6 years. Six years ago, attackers targeted only the operating system - it was not automatically updated by an operating system business. Now, attackers turn to peek at popular applications - and of course, all of these apps are not automatically updated.
Software enterprises are struggling to build a mechanism that allows automatic application updates, while users need to know themselves by installing security by hand first.
Thien Y
You should read it
- Minimize risks from security attacks
- Enhance security for Mac operating system
- How to install software programs on macOS operating system
- Security vulnerabilities - basic insights
- What is Crowdsourced Security?
- New attack method 'bypasses' security software
- Alternatives to 'expensive' software
- This is the operating system containing the most holes in a decade
- Why shouldn't there be more than one antivirus on a Windows PC?
- Remedies of Windows XP / Vista Recovery
- The software needed after installing Windows
- Anti-virus programs catch up with the Windows WMF vulnerability
Maybe you are interested
Here's How To Protect Your Business From Illegal Online Marketing And Sales How a phone tracker for android will help control your phone Why Text Messaging Is Still Relevant In A World Of Smartphones Formula to calculate the area of a triangle: square, regular, balanced, and even SEO - The cheapest, highly effective online marketing 6 clear signs that your phone is hacked