Digitally speaking – social media and cloud from an end user point of view — how simple malware intruders can take over our “little devices” So is there a solution? talk to me if you want to know some of the technology companies I am working with are solving this critical issue, once you see the demonstration you will understand, why my fight to find a end point safety tool for ” what my quest is about for some of my own projects or catch me @mymulticast
Have you ever wondered why computer malware is a multimillion-dollar business for both hackers and online security experts.
According to the U.S. Department of Homeland Security reports that the Secret Service’s Cyber Intelligence Section helped to apprehend criminals who stole hundreds of millions of credit card numbers, which resulted in approximately $600 million in losses for financial and retail institutions in 2011. According to the National Criminal Justice Reference Service, the practice of buying and selling malware “bots” on Web forums is especially prevalent in Eastern Europe.
It’s twice as likely you’ll get hacked in 2013, according to the latest paper from mobile cybersecurity firm Lookout. The report, entitled 2013 Mobile Threat Predictions, makes several forecasts about the state of security as it pertains to Android users and the market as a whole.
The company says that a total of 18.4 million users will encounter malware or spyware by 2014. This assessment is the sum of security data from last year, and an estimate of malicious activity for 2013, which is also based on existing shipment data and other factors, such as the length of the average phone contract.
The global likelihood of a Lookout user coming across malware will also increase, from 0.4 percent as of October 2012, to more than double 12 months later.
According to the firm, 72 percent of the malware it detected in 2012 on the Android platform was classified as fraud: relatively simple programs that make use of legitimate premium SMS services to commit theft. This category of malware will “continue to dominate the 2013 mobile threat space” in spite of OS-level countermeasures introduced with Jellybean 4.2
Lookout’s report adds that we can also expect an increase in spam and phishing attempts, and addresses one final point – BYOD. Finding the “right balance” between protection and employee empowerment will be key for businesses in 2013.
“In 2012, smartphones and tablets managed countless aspects of our personal, public and business lives, giving attackers more incentives to strike,” said Kevin Mahaffey, co-founder and chief technology officer at Lookout. “In 2013, people and businesses will be more aware of the risks to their mobile devices than ever.”
Security is more crucial than ever, and not just in mobile. Hacktivist group GhostShell claims breach of 1.6M accounts at FBI, NASA records providing yet another example of what happens when an organization doesn’t protect its data.
February 21st 2012 digital trends 2012
Apple has revealed that its computers were attacked by the same cyber-criminals, based in China, that attacked social networking site Facebook, according to the BBC & RT news.
Apple tech staff were hacked according to RT news these same hackers early this month targeted Facebook
Apple computers were hacked could it be by the same group that targeted Facebook
Apple staff were victims to a cyber attack in which their Mac computers were infected with a virus, the company revealed.
Apple said a small number of computers were involved and there was no evidence the hackers had stolen any data.
Apple, whose Macintosh computers are usually thought to be safer from viruses than Windows-based PCs.
Experts say developers have trained their sights on writing malware to target Macs as the company’s market share has grown.
Apple said the attack had also targeted other firms and “was spread via a website for software developers”.
It said it plans a software update to repair infected Macs and is trying to trace the source.
News of the most high-profile cyber attack to date comes as a US security firm claimed to have pinpointed a building in Shanghai, China, used by one of the world’s “most prolific cyber-espionage groups”.