As a member of Webroot Mel Morris. Year 2012 will be special attention to the work of network security and has made seven forecasting center top concerns for 2012. Accordingly, the
A. These kinds of attacks, "zero-day" will be of interest and stop better.
Looking back years, the number of attacks on the increase, the malicious software on a lot, big business mass attack. 2012 will be a year of attacks with specific objectives, a large scale. Blacklist and the signature becomes less effective now, a virus is detected when its author just add a few new elements, and zero-day attacks are gaining strength, security vendors Security will recognize the urgent need to analyze the threats and acts of a more comprehensive way.
Two. Start revolutionary security technology with the introduction of a range of software and tools enhance system security.
In recent years, the security industry and cybercriminals have a new symbiotic relationship to keep the market balanced. "Good Guys" did just enough to prevent attacks, but the bad guys are still making money their way. In the year to the innovative and effective security technology will drive a revolution and we will see a hot battle emerged between companies network security and cybercrime, it's survival. Shortly after Cloud-based technology is widely deployed, the series of security issues will heat up.
3. Governments increasingly concerned about standard entry in the system and the standard security against network threats.
Stuxnet worm is an example of something we discovered long ago, and its impact with a whole new meaning. Sophisticated capabilities of the virus to penetrate the system of government, quietly collecting information, and disable the nuclear power plant has prompted leaders to reassess the standards and technology Federal regulations. Stuxnet gives us a very real and very scared of what's to come.
4. The explosion of cloud computing technology.
Many companies are using cloud computing platforms and applications, will utilize all the power of IT, pushing the majority of IT professionals to access the methods and look to the cloud for infrastructure and data solutions.
Five. Enhanced security of mobile devices.
Your smartphone will be a target. Security companies have done a pretty good job preventing attacks on end, and this will lead criminals to focus their efforts more on mobile devices, is still quite easy to exploit the vulnerability in this environment. We see an increase in attacks Android and iPhone: application fraud, malicious link, spyware targeted at smartphones and tablets, all of the data, and the business users and consumers a rich store of information is very sensitive and less protection on their mobile devices.
6. Hackers taking advantage of legitimate applications for illegal purposes.
Android applications are just the tip of the iceberg. All the mobile device with our applications are designed to simplify life, even legitimate applications can retrieve information and use it without permission of the user, a criminal can take advantage of a mobile device to receive data from a nearby network, or hack into a wifi connection.
7. The network security is enhanced and focused at all levels of organizations, businesses and citizens.
When it comes to security, the weakest link is always used. In 2012, the indifference to the security will decrease. The enterprises will invest in strengthening security and mission of care measures. The staff and consumers will see the consequences of violations and begin to practice Internet combined with intelligent behavior in their daily
The other news