The Computer Security Club in France (CLUSIF) presented its 2012 overview cybercrime January 17: last year was indeed marked by increasingly diverse attacks and "cyberwar"
in 2011, CLUSIF had identified the emergence of threats to mobile phones that were confirmed :. sending premium SMS on mobile botnets have become very fashionable. . And all mobile operating systems are affected by this scam
2012 is the first year to see cyber conflict increasingly formalized: Iran has developed its military approach to fight against cybercrime, France and Brazil have defined a purely defensive doctrine, while the United States has adopted a clearly offensive approach. Hacktivists and states fight like warriors in cyberspace. Strikes and Prevention states were also considered.
In addition, attacks and undercover operations were conducted by the Syrian government against opponents. It seems that some opponents have even been tortured to reveal their computer access codes for the security forces of the Government to integrate their network.
The conflicts have led to targeted attacks dematerialized such as those that hit Georgian or French governments. Many attacks have also affected businesses. Several states, including Western states have been accused of cyber attacks. But proving this claim is complicated because the links between certain groups of hackers or identification of shared control servers must be clearly
This does not prevent cybercriminals from botnets developing more and more sophisticated: the ransomware - malware blocking these computers. or mobile phones in exchange for ransom have become common. Therefore share the same operating system for PC, tablet and smartphone (Android, Windows 8 ...) increases the risk. Hacking has also become a booming business with criminals who sell their expertise attack, sometimes with assistance services and guarantees.
The attacks were carried out with various objectives, such as extortion, cyber terrorism and hacktivism. The procedures also vary :. targeted fishing attacks, e-mail with corruption or injection of malicious code into a website
To avoid such problems, opt for a VPN today. Thanks to technology, VPN, or virtual private network allows you to establish an encrypted VPN tunnel to a host (or server) on the Internet. You can surf anonymously, without restriction, and it is impossible for others to intercept your traffic because the VPN server. Your Internet business can not simply be spotted. After activating a VPN, your IP address is automatically replaced by the IP address in the country where your server is based.
This makes it almost impossible to track your location and helps you reduce your online traces.
0 Komentar