When publishing its 2014 security report on Breach data research survey, Verizon Wireless, the second US security operator, made some comments about the evolution of the dangers on the Internet.
Cybercrime is worth $ 20 billion per year, according to the firm Mischon de Reya New York, which specializes in the treatment of these cases large companies suffering hacking. This would imply, according to the company, as cyber crime cases exceeds the total traffic activity resell the world top three drugs, namely marijuana, cocaine and heroin. Less risky than drugs, cybercrime is booming. "The professionalization of hackers is constantly improving. Unfortunately, these are often very intelligent engineers for the rich mafias that have stolen information into a real business, "says Shwartz Edddie, one of the Vice-Presidents Verizon.
Given the comprehensive coverage of the operator and the number of specialists involved in security (nearly 1,000 in Europe, 3,000 in the United States and 2500 in the Asia Pacific region and experience in the field, we should pay attention to this report. Verizon will involve 50 companies and institutions to contribute to the study. with more than 63,000 security incidents in 95 countries, the ratio in 2013 is actually based on 1367 attacks in 2012, this figure has not exceeded 0 cases a statistical standpoint, the DBRIR identifies a dozen types of recurrent threats: .. the most common are called classic mistakes such as sending an e -mail to the wrong person, malicious software (malware individual to take control systems), insider abuse, theft or losses terminals "physical" of Web applications attacks, denial of service, espionage, cyber , intrusion machines and internet cafes, attacks to retrieve the card payment
Christopher Novak, head of the rapid response unit of Verizon explains :. "War, day by day, is lost. You spend your time chasing the fault. Each time, the attackers arrived at a good time, the operation of a gap between the internal sharing of information between security teams and intelligence attackers take advantage of the flaw which, increasingly, is hidden, then used for other actions and negotiations. "
The most common techniques are phishing for introducing a Trojan horse, that is to say a malware installed via sending emails.
The best way to protect your computer your mobile or tablet when you surf the web is to use a VPN service. This will ensure that no one is listening and uses the data you send over an Internet connection without protection. This will prevent your banking passwords, the email accounts or your social networking profiles to be intercepted and used without your knowledge.
Our VPN service encrypts your Internet connection with a complex system of encryption using the AES-256 algorithm. the coding will make it impossible anyone to interact with your personal data, even if your connection has been intercepted or compromised. any information you send will go directly into your secure virtual tunnel. with VPN, you can easily direct your traffic by choosing a server one of 50 countries available. This way you can enjoy the best VPN service for secure Internet connection from your computer, tablet or mobile phone, even being able to use a VPN connection simultaneously for 2 devices.
0 Komentar