Cyber Threats that will mark 2011

Jan 10
09:03

2011

Eorama

Eorama

  • Share this article on Facebook
  • Share this article on Twitter
  • Share this article on Linkedin

The use of new technologies such as social networks, cloud services or the widespread use of the iPhone has become really popular among companies and individuals, but also really dangerous for their privacy.

mediaimage
IT companies,Cyber Threats that will mark 2011 Articles particularly security experts pinpoint that hackers’ main target will be these technologies, at a higher rate than previous years.2011 comes with improvements, and many threats, which may disturb users’ internet life. Let's see why a hacker uses these new technologies as tools for cyber attacks, spreading viruses and all kinds of malware.HIGH PUBLICITYSocial networks like Facebook, Twitter, etc. have received high recognition and cannot be ignored by a hacker. Hackers have become more sophisticated and do not look like the wild teenagers next door, as previously thought. Hacking has become a profitable business, which requires excellent technical skills. The popularity of social networks attracts attackers, who use «phishing» messages to mislead users and direct them to sites with malware and infect their computers. A major threat is also the use of URL Shortening services, which are used many times from hackers in order to masquerade a malicious link. THE WIDE USEMany electronic devices like iPhone, etc., have become important tools for professionals and individuals, as they provide the ability to always have a computer, whenever you need it. They can make online purchases, exchange e-mails,work remotely, be informed, they can even find locations. These mini devices have become a coveted tool for many people, but also a nice way for hackers, to perform cyber attacks.THE LACK OF KNOWLEDGENew technologies are usable and necessary for our lifestyle improvement, but they also require new knowledge and new expertise. Many computer engineers do not have enough skills on these new technologies, thus cannot secure them. Cloud services are gaining more and more fans and especially companies’ preference. But there are still many problems in security, allowing a hacker to attack without any particular difficulty. In addition, iPhone is essentially a laptop, but the problem appears to be in the operating system and the applications that lay on it, which constantly present vulnerabilities and  security holes. There are not few examples of system violations that we witnessed on security conferences during 2010.Do not panic; try to be more careful when using new technologies.

Article "tagged" as:

Categories: