Skip to main content

Malware That Confounded the Internet World In 2012

2012 has been a year which has seen big stories in the internet world in regards to security. It is easy and straightforward to point out to the big stories which have formed a talking point and which have demanded that a whole different kind of thinking and approaches made in the security industry. In fact to the cyber security world, 2012 has been the year of cyber warfare evident from the government sponsored attacks and malware. This year has also been the year for hacktivists who have attacked websites relentlessly.

The Flashback malware become very popular towards April when the damage it had done was eventually put bare. The number of the Macs infected with the malware was estimated at 700,000. It marked the first infection of the Mac and essentially the biggest to be seen thus far. The ramification of this malware were far reaching since the Mac was now vulnerable and this spelt a big source of concern for the faithful of the Apple brand. Security industry experts in finding answers on how the flashback malware was successful on the Mac OS X platform realized that the malware took advantage of Java vulnerability. It was able to spread and infect more Macs due to users of the Mac having not employed any security measures. It is now common sense that the major outbreaks are actually possible on the Mac platform.

Cyber espionage was in 2012 taken to a whole new different level. From April, cyber attacks were reported in the Middle East to the computer networks and systems of oil platforms. The wiper malware was responsible though it was never profiled since it was not found. But in finding answers to this, other sophisticated malware were unearthed; Flame and Gauss. Flame malware has eventually been declared a very complex malware capable of devastating attacks when deployed. The malware was deployed on Iran in the Middle East aimed at their nuclear enrichment program.

The capabilities of Flame were immense and it is able to steal documents, intercept audio conversations, scan blue tooth devices, and take screenshots and corrupt databases. Flame has been closely linked to the Stuxnet malware and both are believed to be sponsored and developed by a government. It is even believed that Flame had been in existence for long before it was discovered. The malware was unique in that it was able to be deployed as a man in the middle and even affect patched Windows operating systems. Gauss was even more mysterious and its abilities as complex as with the flame malware. The deployment of these malware on the Middle East is the signaling of cyber warfare which will only be flaring up in the future as more nations join the cyber arms race.

Android threats in 2012 have increased remarkably and statistics show that android malware has increased six fold. This can be best explained as an explosion in the number of threats on the platform. The reasons behind the explosion in the number of android threats can first be based on the fact that the platform is open source and allows malware writers equal freedom as app developers in taking advantage of the platform. Another reason has to be the economic gain seeing that android has been very popular and there are large numbers of android users to be targeted. Industry experts expect the same trend to continue in the coming year.

The circus revolving around the DNSChanger malware and it eventually shutdown by the FBI deserves mention on the highlights of the security industry in 2012. When this identity theft infrastructure was taken over by the FBI, they gave time for victims of the malware to disinfect their systems. This was a trouble free incident and was a perfect example of what cooperation between the private sector companies, governments and law enforcement agencies could give birth to. Information sharing, cooperation and pooling of resources are vital ingredients if success is to be achieved in the fight against cyber crime.

Notable events in the cyber crime and security industry are Adobe certificate theft, Shamoon malware, the Mahdi incident, password leaks that happened with Dropbox, LinkedIn among others and the Java zero day vulnerabilities. All these were an awakening call to the security industry and showed that attacks will have no boundaries and can affect extremely large numbers of people. Hacktivists came and announced their presence and will be also a very big concern going forward. The actors have not changed much but the scope and the complexity of the attacks continue to grow and the source of concern.

There are companies which are committed to preventing the spread of Cyber security and threats. GNS specializes in providing the ultimate cyber security solutions in order to prevent devastating types of attacks to your system and facilitate safe web browsing.

Article Source: http://EzineArticles.com/?expert=George_Cherere

Comments

Popular posts from this blog

Safe and Secure Mac Storage,

Do not underestimate the importance of your Mac storage For new Mac users, storage isn’t really that high on your list of priories, so few people truly understand the benefits of having a large amount of Mac storage before it’s too late. Macs, just like PCs, need a lot of storage if you’re planning to use them personally, or in a business situation to store files or media. Why is that, you might ask? Well there are a lot of answers to the question so let’s go through them one by one. First of all files are getting bigger and bigger. For example, games that used to be 300 mb and now getting updated to be double that. The reason for this is that computers are getting larger and larger base storage capacity, so programmers have more room to add in extra options, or just be lax in their duties! If you think that you won’t be downloading or storing much, then a lower Mac storage option would suit your needs better, but it’s important to know the average file sizes of things you like to...

Computers Are A Part Of Modern Life

Over the years, the image of the computer and those that use them has improved greatly, which shouldn't be much of a surprise. The computer industry has grown quite dramatically over the years, which has pushed people to want to go out and purchase one given all the benefits that it comes with. Regardless of how old or young the people in the home are, having a computer is certain to make things easier, which is always a good thing. It's very easy for you to see why the modern computer is able to impact young people so positively. Being able to access the internet ensures that you have access to almost limitless knowledge, enabling the younger generation to be able to take up interests in things that are not within their immediate vicinity, in addition to it being able to help children complete their homework and certain projects. It's also fair to say that there has been a large number of younger people that have been able to develop their personal s...

Apple iPad Mini Reviews

The Apple announced the long-awaited tablet computer iPad mini and that was a real surprise, the fourth       generation   of the classic full size iPad. As usual, iPad mini are quite decent electronic toys that deserve a closer look. Reduced tablet Apple iPad mini is intermediate between the original iPad and the media player iPod touch.   This is evidenced by the original convex design back cover made of anodized aluminum, the main advantage of a tablet, as stated by the manufacturer, is the ability to hold it with one hand, thanks to its compact size, the diagonal of the display is of 7.9 inches, and the device weighs only 310 grams. As for the technical characteristics, they are more like figures iPad 2 model 2011, is the same display resolution (1024 × 768) and the same dual-core Apple A5, only slightly modernized.    Manufacturer has prepared as many as 12 variants of iPad mini, tablet PC is available in black an...