Visitors Now:
Total Visits:
Total Stories:
Profile image
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

Security Highlights for 2013 part 1

Saturday, December 7, 2013 10:21
% of readers think this story is Fact. Add your two cents.

(Before It's News)

Kapersky released their top security stories for 2013 this past week.[1] The threat landscape continues to evolve with more advanced threats, the emergence of cyber mercenaries and hacktivists, the rise of mobile malware, and of course cybercriminals continue to look for more ways to steal money. Businesses must remain ever vigilant and faithful to keep security standards up to date.

Here are the top five stories from the Kapersky Security Bulletin 2013:

  1. New “old” cyber-espionage campaigns
  2. Cyber-mercenaries: a new emerging trend
  3. Hacktivism and leaks
  4. Ransomware
  5. Mobile malware and app store (in)security

1. New “old” cyber-espionage campaigns – A series of sophisticated multi-national attacks were identified that have roots back as far as 2008. These complex attacks involve hundreds of high-level victims in government and diplomatic agencies, politicians, human rights activists, military contractors, oil and gas companies, and a range of high level research centers. One cyber-espionage campaign, Red October, utilized a highly sophisticate malware that can re-infect computers and adapt to specific targets. In addition, harvesting data from traditional endpoints this also attacked mobile devices connected to victims network.

red_october malware_ksb_2013_01

2. Cyber-mercenaries – The exposure of the Icefrog attacks revealed another emerging trend that might be compared to guerrilla warfare. Small groups of cyber-mercenaries target the supply chain  of government institutions, businesses and other companies with small hit-and-run attacks. This trend of guns for hire is expected to continue to grow.

3. Hacktivism – Security breaches now take the form of social protest designed to undermine a politicians, political group or specific organization. One group that appeared in the news regularly is called “Anonymous” and is known to attack government facilities, MIT, and even the British Parliament.

4. Ransomware – A new attack that has emerged involves blocking files to a computer file system and then demand payment for renewed access the computer.

5. Mobile malware and app store (in)security – Mobile malware has exploded since 2011 and there are now more than 148,427 mobile malware modifications. The primary focus of attacks on the Android platform. Malware attacks are growing in both volume and complexity. Some of the attacks have incorporated a fake Google Play store, Bluetooth, and text messages.

[1] Kaperksy Lap Expert. “Top security stories of 2013 – the expert opinion.” Kapersky Securelist Blog

The post Security Highlights for 2013 part 1 appeared first on Integracon Technologies Blog – Computer Support in Knoxville, TN.



Source: http://blog.integracon.com/2013/12/07/security-highlights-for-2013/

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.