.
4shared.com - Free file sharing and storage

Sabtu, 09 Januari 2010

Reviewing 2009 and 2010 of the Security Glasses


Jakarta - Year 2009 is nearly over and soon to come 2010. What kind of glasses review computer security and malicious programs?

If there's one thing to always keep in mind the development of cyber security for this are: cyber crime is a real crime. This type of crime has exceeded even the illegal drug trade as a producer of criminal money in the world's number one.

Just a reminder, here are some brief statistics from Symantec about the impact of cyber crime today:

  • Wom Conficker / Downadup infects 50,000 computers every day
  • An unprotected PC will become infected in the next four minutes after connecting to the Internet
  • 1 of 5 online consumers become victims of cyber crime
  • 7 million people are deceived and provide personal information to cyber criminals during the last two years
  • In 2008, the victims spent approximately 58 hours to restore the losses due accounts missing
  • Every three seconds, an identity lost (stolen)
Furthermore, the methods used by cyber criminals increasingly devious and sophisticated. The threats today are poliformik and often delivered via the web.

Symantec security researchers watched an average of more than 200 million attacks each month and at least 10.7 million of which is a unique threat. Cyber criminals desperate to write and rewrite pieces of new malware and unique, which makes traditional security solutions become obsolete.

What consumers need is a new security model - reputation-based technology, capable of reaching detection can not be compared to new malware and pushed far outside the traditional security solutions, such as signature detection and heuristic / behavioral.

Reputation-based technology works by harnessing the power of many - tens of millions of users around the world Norton - to build the reputation of a file based on its attributes. He took the greatest weapon owned by cyber criminals - their ability to produce unique pieces of malware in a frightening pace - and turn it backfires.

This is the weapon that anyone needed to protect themselves in order to cope with security threats and trends that will continue to grow in 2010.

Home Security Trends and 2009 Outlook 2010

1. The attack on Social Networking Sites Happen More Often.

More and more attackers using social engineering tactics by targeting direct end users, and tried to outwit them to download malware or disclose sensitive information. Year 2009 be the year the attack on-site social networking sites (social networking) and users of these sites become the standard target of the criminals.

These sites combine the two factors that make it an ideal target for online criminal activity: the number of users that a very large and high level of trust among the users.

Symantec estimates that the number of such attacks will increase in 2010. And because the owners of these sites will tighten the security, the attackers will turn their attention to the security gap in third-party applications on the accounts of social networking users.

2. Security Software vendors Increase Its Bad.

This year, Symantec has identified 250 misleading applications disguised as legitimate security software, but actually only provide a little protection or no protection and can infect a computer with malware as direputasikannya fought. Since July 1, 2008 until June 30, 2009, Symantec received reports of 43 million effort to install security software naughty.

In 2010, we expect software vendors will naughty meningktkan their efforts to the next level, even by hijacking a user's computers, making it useless and held to be redeemed with money.

3. Malware Evolution.

Finally, in the year 2009 made it easier malware. This is largely due to the availability of popular toolkit easy to use, such as Zeus, which allows even novice hackers to create malware and botnets.

Many of the ready-made threats is a conglomeration of the components of other malware that already exists. Example Dozer, which contains the components of the Mydoom and Mytob.

This trend also makes more malware can be removed, with an emerging threat and sometimes disappeared within just 24 hours. Very specific malware, which aimed to exploit a particular ATM-ATM, also revealed in the year 2009. This indicates the involvement of people in the know about the ATM operations and how to exploit them. This trend will continue in 2010.


Protecting Yourself against the Cyber Criminals

With the more dangerous the threat landscape for consumers, Symantec believes that the reputation-based technology is the greatest weapon against, among others, the attacks social networking sites, security software naughty and malware, which will continue to be done by cyber criminals in 2010.

Model-based security lent reputation unparalleled strength in the traditional solutions in empowering consumers to 'reject' digital danger 'allow' safe online experience.

Here are some important tips to put into practice in order to remain protected consumers:

1. Use security software paid comprehensive and up-to-date

Find the security software that not only offers basic protection from viruses and spyware, but also helps detect malicious attacks before the attack occurred. Currently it is not enough just to have anti-virus solutions, but also two-way firewall, encryption passwords, anti-phishing toolbar and regular updates.

Your security suite should have a reputation for advanced technologies to achieve did not terbandingi detection of new malware and walked away out of traditional security solutions.

Check the security services web as Norton Safe Web as a place of a community of web users to collaborate to report the phishing sites and malware is dangerous.

2. Think before you give "permission"

When asked to provide access to "allow" or "deny" an application to Intenrnet, always select "deny". This is unless you are absolutely sure that the site was accessed authentic and safe.

3. Set the privacy options to the highest level

Use your site's privacy features to limit the posting personal to the people who you know and trust. Do any add someone to the list of people you trust unless you really know the person.

Whatever you say on your site can get around - even if you post them in private. Also do not use your account to disclose personal information about other people ..

4. Secure your wireless network.

If you are in nirkabek network, secured with a password and do not allow the computers that are not known for accessing your home network.

Always use strong passwords with a combination of letters and numbers, and change them regularly.

5. Do not give your credit card details to sites that do not have security

See if there is https: / / at the top of your browser and the padlock symbol at the bottom right corner of the screen.

6. Check and check again when you arrive at your destination

When clicking on the Facebook (or any site) make it a habit to see what appears in the address bar. You may not always be able to find a fake site, but in this fraud case, it is clear that not www.facebook.com.

0 comments:

Twitter Delicious Facebook Digg Stumbleupon Linkedin Yahoo! Bookmarks Google Buzz Google Reddit Mixx Technorati RSS Favorites
 

Blog Archive

News Antivirus © 2008 Business Ads Ready is Designed by Choi Rozs Supported by Blogger