• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Abney Associates Infotech Update: Cyber-Threat Trends of 2013
 

Abney Associates Infotech Update: Cyber-Threat Trends of 2013

on

  • 316 views

...


http://abneyassociates.org/2013/02/04/cyber-threat-trends-of-2013/

abney associates infotech update
Experts forecast a rise in computer and cellphone scams
It takes no expert to predict that there will be for sure an increase of sophisticated methods and updates of old scams to try to take control of our computers and cellphones to get identities and money. Yet another year, here comes 2013, scammers are busy or maybe had already developed new ways to swindle us in the coming months.
Sign up for the AARP Money Newsletter.
This comes as a general rule and everyone must know even without asking tips from the experts, to stay safe one must know the basic vigilance. Now the question is how. This is how: Keep your security software updated and run it regularly. Click only on links from trusted sources; the same goes for buying cellphone apps. Be smart about where and how you navigate in cyberspace.


READ OTHER/RELATED ARTICLES:
http://www.good.is/posts/abney-and-associates-cyber-security-warning-hacking-problem-all-sides-need-to-tackle
http://www.good.is/posts/abney-and-associates-internet-technology-is-cybercrime-more-of-a-threat-than-terrorism

Statistics

Views

Total Views
316
Views on SlideShare
316
Embed Views
0

Actions

Likes
0
Downloads
4
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Abney Associates Infotech Update: Cyber-Threat Trends of 2013 Abney Associates Infotech Update: Cyber-Threat Trends of 2013 Presentation Transcript

    • Cyber-Threat Trends of 2013 http://abneyassociates.org/2013/02/04/cyber-threat- trends-of-2013/
    • Experts forecast a rise in computer and cellphone scamsIt takes no expert to predict that there will be for sure anincrease of sophisticated methods and updates of old scams totry to take control of our computers and cellphones to getidentities and money. Yet another year, here comes 2013,scammers are busy or maybe had already developed newways to swindle us in the coming months.
    • Sign up for the AARP Money Newsletter.This comes as a general rule and everyone must know evenwithout asking tips from the experts, to stay safe one mustknow the basic vigilance. Now the question is how. This ishow: Keep your security software updated and run itregularly. Click only on links from trusted sources; the samegoes for buying cellphone apps. Be smart about where andhow you navigate in cyberspace.
    • Five areas where scammers are mostlikely to be on guard for possible victims:Ransomware.The scam starts with malicious attachment like any otherscam, as soon as you click of the scammer’s email or instantmessage or you visit a scammer website that usually lure youwith enticing videos or promos, ransomware will lock yourcomputer, usually displaying a screen message that appears tobe from a law enforcement agency. Pay us, you’re told, andyou’ll get back control of your computer.
    • Once considered a niche scam, ransomware attacks explodedin 2012, hitting some 70,000 computers per month. About 3percent of victims pay the ransom fee — thanks, in part, tocyber-criminals increasingly using online payment methodsto collect, says cyber-security firm Symantec, which recentlypublished a detailed report on this ruse. “In 2013, attackerswill use more professional ransom screens, up the emotionalstakes to motivate their victims, and use methods that make itharder to recover once compromised,” predicts Symantec’sKevin Haley.
    • Cloud-based botnets.Spammers had been doing this for years, they distribute 150billion email messages everyday without the computer dailyusers knowledge that they were actually take part of thespam. To attract people to watch videos on social networkingwebsites, open email greeting cards and the like, spammersinfect random computers with botnet malware that makes themachines secretly send out spam.
    • Speak Out!In accordance with Georgia Tech researchers, in 2013, will alsoturn their botnet schemes to what’s known as “the cloud,” theglobal network of Internet-connected computers that store hugeamounts of data, shuttle it around and offer data services. “Onepossible example is for attackers to use stolen credit cardinformation to purchase cloud computing resources and createdangerous clusters of temporary virtual attack systems,” sayGeorgia Tech researchers. To understand it more, the scam goeslike this, for instance, if you share your family photos onlineyou’re using the cloud. And more and more companies putcustomer data and computing power on the cloud, there’s anever-growing collection of prized targets.
    • Madware.You are maybe more familiar with this as pop-up ads or textson your cellphone. But mobile adware or madware for shortis more that just irritating, what they do is give scammerssensitive data such as your location and stored contacts.Symantec expects more madware problems as companies tryto make money off free mobile apps by selling collected infoto advertisers since they found out abot the most agrresiveforms increase by 210 % as per mid-2012.
    • Social network payment sources.Where the money at the cyber-crooks follow, social networksare offering more pay services, such as opportunities to sendgifts or promote status updates, and crooks saw this as a greatopportunity to trick people.“Symantec anticipates an increase in malware attacks thatsteal payment credentials in social networks and trick usersinto providing payment details and other personal andpotentially valuable information,” notes Haley.
    • Search history poisoning.As the technology evolves scammers are not left behind theyalso come up with new tricks each time, first was themalware-spreading scammers created their own fly-by-nightwebsites. Then they upped the ante — and believability —with “search engine poisoning” — manipulating searchengines such as Bing, Google and Yahoo to display searchresults that lead you to dangerous destinations. The next scamthat we shoul be aware of is “search history poisoning.” Thisinvolves exploiting the record that’s kept of websites thatyou’ve visited. When stored as part of an online profile, asearch history lets hackers extend their scamming potential.
    • “If you compromise a computer, the victim can always switchto a clean machine and your attack is over,” notes GeorgiaTech’s Wenke Lee. “If you compromise a user’s searchhistory and hence his online profile, the victim gets themalicious search results no matter where he logs in from.”You can help foil this one by clearing your browser’s searchhistory frequently, or turning it off altogether.
    • READ OTHER/RELATED ARTICLES:http://www.good.is/posts/abney-and-associates-cyber-security-warning-hacking-problem-all-sides-need-to-tacklehttp://www.good.is/posts/abney-and-associates-internet-technology-is-cybercrime-more-of-a-threat-than-terrorism