Trends Cyber ​​Crime 2012: The Android Users Beware

Thursday, March 29, 2012

Trends Cyber ​​Crime 2012: The Android Users Beware

Criminals in cyberspace (cyber) have worked hard last year, and continues to improve its ability this year.

Along with the widespread use of the Android operating system, virus makers and creator of the malicious program also seeks to penetrate this system, the trick to get benefit from it, or just plain annoying and performance capabilities.

Tablet computers and mobile phones are now being put on android operating system, asked to be vigilant. "In terms of Trends Cyber ​​Crime 2012, the first place is the mobile malware," said Sebastian Bortnik, co-ordinator of research on the companies' antivirus ESET "in Latin America.

"Strong growth in market share for the Android platform has made it the main focus of the developers of malware, targeting mobile devices."

Android malware is not the only trend. Of operating systems, Gartner predicts Windows 7 operating system will become the most widely used by the end of the year.

That means some of the threats that tend to be more "popular" in 2012, according to ESET.

Although security technologies in operating systems like Windows 7 has more enhanced, cyber criminals are also developing a more complex malware to defeat the security fortress.

According to ESET, cyber criminals tend to use the line "traditional" for scams and malware, such as email, instant messaging or a USB device.

They're not going to change, but still manipulate the social networks, like facebook, then the search results poisoned with blackhat SEO techniques, and drive-by-downloads. Malware then infect and damage tissue.

"Malware" is a computer program that was created with the intent and main purpose of looking for software vulnerabilities.

Malware is generally created to break into or damage the software or operating system.

Examples of malware is a Virus, Worm, Wabbit, Keyloggers, Browser Hijacker, Trojan Horse, Spyware, Backdoor, dialer, Exploit and Rootkits.

0 comments:

Post a Comment