Advertisement
Symantec as a provider of security solutions, storage, and management systems for consumer and enterprise Internet security threat report published. With the growing number of Internet users and mobile devices, the type and number of threats that attack the users of increasingly varied. In 2010, Symantec managed to find 10 million malware signatures, 286 million unique malware variants, and 3.1 billion worldwide malware attacks. The development of these security threats include the five main factors, as follows:
1. Targeted Attacks
The threat presented by malware is no longer aimed at the company, but also to individuals with the hope to obtain sensitive information. One major concern of malware that Symantec is Stuxnet showing increasing sophistication of malware that are available in the world of technology. This malware can trick the system checks the signature authentication program. When a user opens an infected program or file, automatically malware works and has the potential to damage the company's IT infrastructure. How its spread can be done via the USB slot. Other simple Malware also have a significant impact. Last year found 260 thousand data exposed by malware attacks and the average cost to be incurred by the company to resolve this problem amounting to USD 7.2 million.
2. Social Networking
It's hard to find people who are not connected with at least one social media. Social media, like Facebook and Twitter, the land now used as identity theft. The data and stolen identities are used to trick other users and send the URL link that had been infected with malware.
3. Hide and Seek
The relationship between malware and security software like hide and seek game. Malware, like rootkits, operates by changing the standard functions of a system or application, so it can move from one program to another in a single device without being detected. Symantec found more than 50% of computers infected with malware such as this comes from the United States.
4. Attack Kits
Equipment that helps the process of hacking and the creation of malware is now sold freely on the market. Handbooks for the hacker can easily be found in bookstores. With the release of a tool like this, not surprisingly, the number of threats to the security of Internet usage and Java, as the format most widely used program, remains a major target for malware.
5. Mobile Threats
Increasing the types and advanced features offered by mobile devices has led to an internet connection to the user's grip. Compact size and ease of use makes the mobile device, such as smartphones and tablets, as the main option users to explore the virtual world. Email, social media, and working documents are now available in a single device that can easily carry anywhere. With sensitive data stored on it, the mobile device becomes the target of malware. In 2009 found 115 malware that attack mobile devices and in the following year there was an increase of 42%, to 163 malware.