CYBER THREAT FOR 2013

Posted on:
tags: , , , , , , ,
To help organizations prepare for next year, the Websense Security Labs announced a few predictions for the 2013 threat landscape
 
Since the spear-phishing attack on the White House, it is evident that cyber criminals have gained confidence and momentum in 2012. To help organisations prepare for next year, the Websense Security Labs announced a few predictions for the 2013 threat landscape.
Highlights include:

Mobile devices will be the new target for cross-platform threats: As development barriers are removed, mobile threats will be able to leverage a huge library of shared code. Attacks will also continue to increasingly use social engineering lures to capture user credentials on mobile devices;

Cyber criminals will use bypass methods to avoid traditional sandbox detection: More organisations are utilising virtual machine defenses to test for malware and threats. As a result, attackers are taking new steps to avoid detection by recognising virtual machine environments. These advanced attacks will remain hidden until they are sure they aren't in a virtual security environment;

Legitimate mobile app stores will host more malware in 2013: Malicious apps will increasingly slip through validation processes. They will continue to pose risks to organisations enabling Bring Your Own Device (BYOD) policies;

Government-sponsored attacks will increase as new players enter: Expect more governments to enter the cyber-warfare arena. In the wake of several publicised cyber-warfare events, there are a number of contributing factors that will drive more countries toward these strategies and tactics;

Malicious emails are making a comeback: Timed and targeted spear-phishing email attacks, along with an increase in malicious email attachments, are providing new opportunities for cyber crime.


---------------------------------------------------------------------------------
Posted By Sundeep aka SunTechie

Sundeep is a Founder of Youth Talent Auzzar, a passionate blogger, a programmer, a developer, CISE and these days he is pursuing his graduation in Engineering with Computer Science dept.
Add Sundeep as a Friend on
 

All aBoUt "Phishing"

Posted on:
tags: ,

The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is Bogus and set up only to steal the User’s information.

Phishing scams could be
v Emails inviting you to join a Social Group, asking you to Login using your Username and Password.
v Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.
v Emails containing some Information of your Interest and asking you to Login to Your Account.
v Any Email carrying a Link to Click and asking you to Login.

Prevention against Phishing
v Read all the Email Carefully and Check if the Sender is Original
v Watch the Link Carefully before Clicking
v Always check the URL in the Browser before Signing IN to your Account
v Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email.







>