Sunday, July 21, 2013

Internet, a universe full of black holes - La Voz de Galicia

government Frictions, following the discovery of malicious code to access strategic data of countries and recent leaks of information in social networks confirm that black holes still persist in the universe of network security and efficiency forcefully demanding, according to experts.

Many of the companies responsible for cyber security and protection have been put to work. Tomorrow, for example, the company Kaspersky meets in Moscow to discuss cybercrime , theft of confidential information and laundering money online.

also the issue of security at the user level and increasing attack on mobile devices seem to be also one of the pillars on which the concern revolves these businesses. The reason? The explosion of users such terminals, increasingly attract cybercriminals because they are in a reef to access foreign data reported them huge amounts of money.

This has been explained technical director Iberia Kaspersky Lab, Pedro García-Villacaña , the agency Efe, who has encouraged both the surfer and the user of mobile devices ” smart ‘for safety caution, especially now that shoot the threats to be in summer.

“It takes a greater awareness of citizens to protect themselves on the Internet, just as you take safety measures in their real life,” said the expert.

class=”texto”>

“malware” or detected malware on mobile devices is growing like wildfire, as outlined by the Russian company. Thus, only in the first quarter of this year has already exceeded 50% of the previous year.

He added that, according to the figures, 99% of these attacks to mobile devices ‘intelegentes’ is targeting devices with an operating system (OS) Android, owned by Google, which does not preclude strangely, that users continue to increase exponentially.

is also understandable, then, that the tendency for developed malicious code is becoming more sophisticated from a technical standpoint and far-reaching in the sense that many computers come fast and often without a trace, he explained.

class=”texto”>

García-Villacañas has stated that, although “not need to be guru” of computing to become cybercriminal, if “advanced technical knowledge is required.”

In his view, “one competent person, with advanced technology and a lot of different channels, can be reached in hours thousands of computers around the world through the distribution of a trojan properly configured» .

already immersed in the subject, pointed out that the difference between Trojans and conventional viruses is that, while the former seek leave no evidence, the latter make clear his meddling . It is for this reason that many of the cybercriminals go unnoticed without a trace of any crime.

class=”texto”>

.

The director of this entity, Trolleys Oerting , recently participated in a day of safety in Madrid, in which he warned of the proliferation of organized networks sofisticasdas increasingly to Internet crimes.

In his words, the network itself, paradoxically, offers a whole host any tools easily accessible for self as a terrorist and criminal.

class=”texto”>

Miguel Suarez , an expert on corporate security Synmatec , developer Norton antivirus , has highlighted the increasing Cyber ??espionage attacks a very specific goals each year is detected and confirms a clear trend annual growth thereof.

Precisely class=”texto”>

No comments:

Post a Comment