Thursday, December 18, 2014

A new wave of attacks on cells and laptops – Interia

In 2015, waiting for us a new wave of hacker attacks on mobile devices – analysts warn Check Point Software Technologies. It is expected 82 percent. increase in the frequency of attacks on private and corporate phones and laptops.

In 2015, our phones will become the main target of attacks – will have to be careful

/ © 123RF / Picsel

Almost two years ago, experts at Kaspersky Lab published a study on the Red October – cyberszpiegowskiej complex operation, which aims to become diplomatic missions around the world. Now the “Red October” returns in the form of campaign Cloud Atlas. read more

The alarming fact is that 44 per cent. business enterprise does not control the data transmitted on private devices employees. In a 2014 survey of 700 companies found that 42 per cent. of them were victims of attacks on mobile devices, and repair the effects of which cost an average of 250 000 dollars.

Check Point experts emphasize that mobile devices provide the most diverse and valuable data. It is also the weakest link in the security, as it gives the attacker access to the private data identification, passwords, personal and business e-mail boxes, business documents and the ability to connect to corporate networks and applications.

In the current 2014 years we have seen more attacks using social engineering techniques, which consequently resulted in massive data leaks from several well-known companies. Also increased the popularity of malware specially adapted for a specific purpose – the most important are the RAM scraper and all kinds of ransomware. Increasingly, there were security problems of mobile devices, as employees connect to the corporate network using personal equipment.

There are also new types of attacks on websites (OpenSSL error, or Heartbleed, and the problem BadUSB), which affected tens of millions of web users and devices worldwide. These facts have highlighted just how unpredictable and difficult it can be to support and security management.

What are the greatest dangers 2015:

1. Malicious software is a zero-second

– sending by hackers malware that destroys the corporate network (73 per cent. In 2014 surveyed companies had infected bots networks – an increase of 10 per cent., Compared to the year 2013);
2. Pinching as mobile payments – hacking into mobile payment systems. Technology Pay with Apple iPhone 6 is likely to begin the process of adaptation of mobile payments by consumers, in parallel with several other competing payment systems fighting for market share. Not all of these systems have been tested for real threats, which may prove to be very profitable for a potential attacker to detect susceptibility;
3. Open source, open goal – cybercriminals will search for errors in the security code access to personal data and bank accounts;

4. Attacks on infrastructure – the introduction of malware therein on SCADA systems, process control management companies (almost 70 per cent. Of companies with critical infrastructure in 2014. Reported a burglary);
5. Suspicious device – more and more attacks on IP based devices present in the workplace and at home. Wearable type devices and other electronic components which communicate with the tablet and smartphones already at this point, penetrate the network. Companies must be ready to face this challenge;
How do we protect?

1. Securing SDN – can increase the level of safety by redirecting traffic through the gateway and IPS dynamic reprogramming and restructuring of the network during a distributed denial of service attack and also allow automatic quarantine endpoints or networks that have been infected with malware;

2. Cloud cover – with the increase in popularity of SaaS, we expect that the solutions of the type of security-as-a-service (security as a service) are increasingly being implemented to ensure visibility, the ability to control, threat protection and data security. This will also go hand in hand with the deployment of the security services to the public cloud.

LikeTweet

No comments:

Post a Comment