بزرگترین تهدیدات سایبری 2012 که کاربران خانگی را هدف گرفتند .
پنجشنبه, ۲۱ دی ۱۳۹۱، ۱۰:۴۴ ب.ظ
به گزارش دیسنا - پایگاه اطلاع رسانی امنیت اطلاعات ایران


شرکت امنیتی ترند میکرو - غول امنیت سایبری - در یادداشتی در وبلاگ خود اقدام به نام بردن از 5 تهدید سایبری مهم نمود که در سال 2012 بیشتر کاربران خانگی را با مخاطره روبرو کرده بود .



شرکت امنیتی ترند میکرو - غول امنیت سایبری - در یادداشتی در وبلاگ خود اقدام به نام بردن از 5 تهدید سایبری مهم نمود که در سال 2012 بیشتر کاربران خانگی را با مخاطره روبرو کرده بود .
- Blackhole Exploit Kit spam runs. Blackhole Exploit Kit (BHEK) changed everything we knew about spam phishing as the traditional ways of protection no longer work. In fact, we even uncovered some email samples that only need a victim to click a malicious link to trigger the infection chain. BHEK spam runs are also known to convincingly spoof companies like Facebook, American Airlines, and Verizon in order to convince users to open the messages.
- Android malware. By end Q3 this year, we already saw 175,000 malicious and high-risk apps targeting Android users. Most of these pose as legitimate apps but have hidden routines like sending messages to premium numbers or collecting sensitive information. By 2013, we expect the number of such apps rise to 1 million.
- Ransomware/Scareware. Ransomware has long been a consumer concern. This year, however, saw not only high-profile incidents but also some developments to coax users into paying cybercriminals. An example is the increase in Police Trojan, which locks an infected system and threatens users to pay by posing as the victim’s local law enforcement agency.
- DORKBOT. New DORKBOT variants were found spreading via Skype and used legitimate file storage websites to store the malware copy. It also used different languages as part of its social engineering technique.
- Threats Leveraging London 2012 Olympics. Global events have always been a favorite of cybercriminals. This year was no different, as we saw several attacks that took advantage of the London 2012 Olympics. Some of these schemes include fake ticketing sites and scams that sprouted before, during, and after the event.
http://blog.trendmicro.com/trendlabs-security-intelligence/top-5-consumer-threats-for-2012/
http://about-threats.trendmicro.com/ebooks/a-guide-to-2013-new-years-resolutions/files/assets/downloads/A-Guide-to-2013-New-Years-Resolutions.pdf
http://about-threats.trendmicro.com/ebooks/a-guide-to-2013-new-years-resolutions/


واحد آموزش و اطلاع رسانی شرکت دورانتاش
( معتبرترین توزیع کننده سرویسها و محصولات امنیتی و کلـود در ایران )
اخبار مرتبط :
بازنشر خبر با ذکر منبع " دورانتاش " بلامانع است .
- ۹۱/۱۰/۲۱