Tuesday, July 2, 2013

80 days around the wolrd threats

"Anything one man can imagine, other men can make real". Written by Jules Verne in his novel "Around the World in Eighty Days". It is an adventure that takes Phileas Fogg to travel around the planet by train, boat or elephant to meet with a bet. Nowadays, cyber-threats can almost instantly expand worldwide and their aim is not as noble as the Phileas' one.

According to the security software company +ESETthe most widespread malware in June does not travel by train nor boat nor even through the Internet but infects devices from removable media. It is the worm Win32/Bundpil. In the ESET's ranking they also explains the features of his nine travel mates.

Other hazards that proliferate around the world are related to virtualization and the cloud. According to the Cisco's Annual Security Report 2013, these risks have to do with the violation of the software that creates and runs virtual machines, with a cheaper and easier infrastructure to conduct criminal activities, and the difficulty companies find on implementing traditional security approaches.

In fact, +Cisco Systems itself has released patches to cover some vulnerabilities in several of its security solutions (Cisco Content Security Management Appliance, Cisco Email Security Appliance, Cisco Web Security Appliance) to prevent undesirable adventurers deciding to go that way on their journey.

There are travelers who do not like to travel alone. This is the case of two malicious programs called Beebone and Vobfus, Microsoft alerts as many antivirus are unable to remove them. Each program will donwload slighter different variations of the other in an attempt to evade antivirus software.

Apparently the United Kingdom is the target of at least 70 monthly shipments of sophisticated espionage attacks. As stated by MI5 and the Government Communications Headquarters (GCHQ), their goal is not only to obtain military or government secrets, but mainly the theft of intellectual property for the benefit of foreign nations.

Currently you can thwart "the bad guys'" plans without leaving the chair. Only with your computer. But can you imagine if you could travel flying like Superman to those places where cybercriminals are programing a lethal malware or you could destroy computer viruses simply with a look? In today's video, security professionals tell us what superpowers they would like to own.


Post a Comment