You are here: 
Home / Culture / Hi-Tech
rss News rss Articles rss General

Large-scale hacking projects. Why be afraid of users in the coming year?

December 11 2007

Hacker attacks have already come into everyday life. In this regard, the priority of experts in computer technology becomes a problem of those same attacks to predict. The company Websense Security Labs has recently published ten most ambitious hackers who are waiting for users in the near future.

The main event of next year for Internet scams Olympics in Beijing. Experts predict the massive spread of thematic websites, sending spam Olympiad, DdoS-attack.

In second place - spam blogs, comments, search engines and forums. As experts predict, will soon place most active users full of links that lead to infected websites. In doing so kiberterroristy also raise the infected page in Internet rankings. Indeed, the popularity of a page often depends on the number of references to it.

The three leaders also attack on the next-generation network - Web 2.0. This network includes such popular resources such as AJAX, Google, Mail, Flickr, TaDa lists. Weak point of Web 2.0 widgets and commercials, and used these hackers. An attack of such resources is very beneficial - allows access to a huge audience.

The fourth item - breaking and contamination of existing resources. Experts estimate that the number of infected sites exceeds the number of specially crafted malicious pages. "We compromise well-attended resources, criminals minimize the need for additional lures through email, instant messaging and posts on the web" - explain specialists.

In fifth place are attacks aimed at the company, Apple. For the most part, the rest does not give criminals the popular "apple" product iPhone.

Sixth place, like the third, associated with Web 2.0. The difference between this kind of attack that they will be targeted at specific interest groups, themes, age and spending habits.

Much attention in the ranking of hackers paid security software. To reduce the likelihood of detecting malicious code fraudsters will use, for example, in JavaScript, the technique of polymorphism. When using the polymorphism of the virus code is generated automatically, in other words "on the fly." A majority of anti-virus programs identify a virus inherent in him by the code. Thus, to detect the virus with polymorphic code simple user is almost impossible. Such cyber-attacks - in seventh place.

In eighth place, researchers can see the improvement and global dissemination of information hiding techniques for the development of different Trojans, in the vernacular, "Trojans." As early as next year, "Trojans" will be embedded into standard protocols, and various media files.

Ninth place, oddly enough, is empty. The fact is that next year a nasty surprise awaits themselves hackers. In the middle, the experts promise massive crime detection kiberterroristov. Just at this point will show off the loudest from the open cases.

Closes ten vishing, analog voice phishing. As we know, phishing involves a spam mailing list on behalf of well-known company, which requested or enter the site, or simply in a letter to inform their confidential data such as account numbers. However, fraud cases of this kind have already learned to successfully and quickly disclose. Vishing same - is to get a user's Internet or SMS spam, which calls for a call to any landline number in the course of this call and ferret out personal user data.

Sasha Mertsalova


Print version

Photo Gallery
At this moment...

Week top publications
Popular reading
©2006-2019 All rights reserved display number of browses и visitors for 24 hour