2011 Likely to Have Far More Malevolent Threats, Security Experts Warn
According to a warning by IT security experts, 2011 could be more challenging with respect to malware threats compared to the current year (2010). The Hindu Business Line published this on December 27, 2010. Also, according to the experts, they anticipate a huge change within the threat scenario as fresh types of organizers emerge having increasingly effective objectives for their Internet assaults.
Additionally, they state that during 2011, viruses will appear more-and-more similar to those we see in science fiction films. Together with this, the realm of cyber-crime will consolidate just like corporations merge. Viruses won't simply attack individuals, but target corporations and installations more-and-more. There will be no sparing of anti-virus agencies too.
According to Vice-President Shantanu Ghosh for Symantec's India operations, in 2011, there will be increasing attacks against industrial organizations and crucial infrastructures and while there'll be responses from ISPs, the governments will take counter actions only slowly. The Economic Times published this on December 28, 2010.
Furthermore, mid-sized businesses will be targeted with cyber-spying. Both critical infrastructures and highly reputed brands will keep on getting attacked with more-and-more localized and targeted assaults. Besides, most assaults will take place through Web-browsers, while Distributed Denial-of-Service (DDoS) attacks will continue to inflict the Internet in a massive way.
According to The Hindu Business Line dated December 27, 2010, security specialists think there'll be a completely fresh group of more dangerous authors of malicious software as well as malware attacks that will seek private data and monetary gains. Also, spyware 2.0 will emerge which is a fresh breed of malicious program for capturing users' private information.
Additionally, there will be more of cyber-criminals' attacks against users in big companies, while direct assaults against daily end-users will slowly decline.
Hence it's vital for comprehending that for executing an online assault, the technique utilized won't rely on the entity organizing it alternatively the objective(s) it has rather it'll be reliant on the services of the Internet, the technical abilities of modern operating systems, and of course the gadgets the general public utilize during work as well as during their day to day living.
Related article: “Loopholes did not cause online banking thefts”: ICBC
» SPAMfighter News - 05-01-2011
We are happy to see you are reading our IT Security News.
To reward your interest, we would like to offer you all our award-winning products
at the price $19.95. Pick your own favorites.