Threats Latest Internet Security Threat Report Highlights 2013 Online Safety

2:58 PM
Threats Latest Internet Security Threat Report Highlights 2013 Online Safety -

In April, Symantec released its latest report on Internet security threats. The report contains cumulative safety data from 2012 and provided an overview of what can be expected in 2013. There were several major changes in the landscape of Internet security in 2012.

  • the median number of profiles stolen per data breach increased by 350%

    experts quickly noted the number of identities stolen per breach in 2012 decreased significantly (604,826 stolen by crime) . This statistic is misleading. 2011 was a record year for stolen identities with 5 major data breaches in which more than 10 million identities were stolen. The median number of identities stolen each offense is a better statistic to consider. The median number of identities stolen per breach in 2012 increased by 350% from 2400 in 2011 to 8350 in 2012.

  • attacks Hole - A Whole New Threat

    The "Watering Hole attack" is a new innovation in targeted attacks. This sophisticated approach to consumers flight target data. It is a four-step process:

    1. The attacker profiles the victim and the site they visit
    2. The attacker tests websites for vulnerabilities
    3. when a site is found compromised, the attacker injects malicious code to redirect the victim to a different site hosting the exploit code
    4. compromise the site is now waiting to infect the victim with a profiled zero-day exploit
  • drive by Downloads 30% increase

    based attacks Web, drive mainly by downloads, increased 30% in 2012. the good news is the number of new vulnerabilities increased by only 6%, which means that these attacks affect consumers who do not update their software. Not zero-day attacks. Symantec experts indicate increased web-based attacks is mainly due to soaring malvertising.

  • False deals are the most popular type of Social Media Attack

    Scammers and spammers follow the crowd so they have constant access to a large group of potential targets. In 2012, the most common type of attack was the wrong offering. Scammers invite users of social networks to join an event or a fake group. They make their offers with the promise of a free gift card or discounted. To join, users, and share sensitive information with the attacker, such as their mobile phone number. This allows the attacker to send a text from the user's phone to a number of premium rates. Other popular social media attacks include manuals sharing scams, likejacking, fake scams plug-in, and copy / paste scams.

  • Each type of increased mobile attack in 2012

    The short story in mobile Internet security is every type of attack has increased. The threats have increased the most are android exploits, leakage of privacy, fraud of the premium number, and mobile botnets. Taking mobile security seriously is more important than ever.

The latest Symantec report highlights trends constantly changing threats and Internet security. 2012 introduced several new threats and stressed the importance of protecting the online identity as consumers target attackers on all fronts. The best way to minimize the chances of becoming a target is taking proactive steps to secure each device that connects to the Internet. One such proactive measures used desktop computers for personal VPN and mobile devices.

VyprVPN provides a secure, encrypted connection to the Internet to protect privacy and user security. VyprVPN apps desktop and mobile, it is easy to connect to VyprVPN with one click or tap. Protect your Internet connection while at home or on the road

Our approach is unique in the VPN industry - we have, engineer and manage our VPN servers so we can provide the fastest speeds in VPN the world. We did not invent VPN, we optimized VyprVPN for connections to modern wide band. Other VPN vendors use third party companies to host their VPN servers. We do not do. We are the only company that manages your data so that your privacy and security are protected from end to end.

Previous
Next Post »
0 Komentar