Sunday, July 21, 2013

Internet security, a sought universe with many ... - 20minutos.es

class=”text”> A man surfing the internet. (FILE)

Espionage , governmental frictions by the discovery of malicious code to access strategic data of countries and recent leaks of information in social networks, confirm black holes that remain in the coveted world of network security, and requires forcefulness, experts say.

On Monday gather in Moscow heads computer security firm Kaspersky , to discuss cybercrime, theft of confidential information, laundering money online.

Also, try to level security user and increasing attacks on mobile , as a result of the explosion of users of this type of equipment, which attract the increasingly cyber , because they find in them a bonanza for accessing data outside they reported huge amounts money.

Extreme caution

class=”quote_new”> greater awareness is needed to protect citizens’ Internet This has been explained coach Kaspersky Lab Iberia, Pedro García-Villacañas who has encouraged both the surfer and the user mobile device “smart”, which connects them to the network, caution security, especially now in summer soar threats.

“It takes a greater awareness of citizens to protect themselves on the Internet, just taking security measures in real life,” said the expert.

According to data from studies of this Russian company, the “malware” or malicious code detected in mobile devices is growing like wildfire, so only in the first quarter of this year has already surpassed 50% of the previous year.

According to Kaspersky data “malware” or malicious code spread like wildfire In addition, according to the figures, the 99% of these attacks to mobile devices “smart” is targeting devices with Android operating system (Google), but that does not mean that we are shooting the threats to Apple devices that are gaining more users.

In the field of cybercrime, malicious code developed by criminals are becoming more sophisticated from the technical perspective and broader in the sense that come fast to many computers and often without a trace, he said.

Garcia-Villacañas expert has stated that, although “there have to be guru” computing for become cybercriminal , yes “advanced technical knowledge is required.”

The “Trojans”

In his view, “one person competent, with advanced technology and a lot of different channels can in hours thousands of computers worldwide by distributing a trojan properly configured. “

It recalled that, with the Trojans is looking to leave no evidence , unlike with the virus conventional that are evident when acting, thereby cybercriminals often go unnoticed and obtain maximum information unrelated to then profit.

European cybercrime center

Proliferation class=”imp”> sophisticated networks to commit crimes on the Internet Cybersecurity concerned about in the world as not only confirms the commitment of companies to develop systems to ensure safety, but also the governmental authorities , with initiatives such as the recent creation of a European center of the specific Europol cybercrime.

Its director, Troels Oerting, recently participated in a Segurida day d in Madrid, in which he warned of the proliferation of organized networks increasingly sophisticated, to commit crimes Internet .

According to him, even the network itself, whose members are trying to protect from cybercriminals, is what paradoxically available to any whole endless easily accessible tools for self as a terrorist and criminal.

Increase of cyber espionage

Miguel Suarez, one of the security experts of the company Symantec (Norton proprietary antivirus ), highlighted the increasing cyber espionage attacks very specific targets detected each year and confirms a clear trend annual growth thereof.

Just the latest report annual Symantec Internet threats in the 42% figure increased such attacks in 2012 over the previous year, also in 31% of these cases, cybercriminals security transgressed large targeted institutions making use of stolen data above small business.

No comments:

Post a Comment