Watch out! New virus that can infect you via Wi-Fi

Computer virus.

Viruses sent over Wi-Fi, attacks on Internet devices Things that increase the activity of Chinese hackers – these are the threats that the F-Secure experts will say loudest in 2017.

USA on the target of Chinese cyberspies

In 2016 loud talk about spying on the Russians and even their involvement in the presidential election in the USA. However, the real danger with which the newly elected authority in the United States should face may come from China. Not so long ago the issue of Chinese cyberattack hit the headlines. In 2015, the US Office of Personnel Management reported a data breach that could affect as many as 14 million people. President Obama took immediate steps – warned of the possibility of imposing sanctions on the Middle States.

The United States administration has a fairly low level of awareness about the dangers and the way in which cyberattack states are doing, and what political goals they want to achieve in this way. For example, a new internal security adviser, Michael Flynn, who used an unauthorized Internet connection at the Pentagon, could be at risk of being seriously compromised. Motivation for China’s actions may be the desire to acquire information about the planned policy, as well as the ability to disclose the inconvenient facts of the private life of members of the Trump administration. This would make it impossible for the Americans to conduct a policy damaging to China. Such a plan can be put into effect in 2017, says Sean Sullivan, security advisor.

Malicious software is distributed over Wi-Fi

The destructive capabilities of botnets and DDoS attacks is a trend that will continue next year. It can potentially be created first “Wi-Fi worm”, or malicious software that quickly rozprzestrzeniałoby in urban areas as a result of infection routers using the wireless network. Infected device would contain code that kopiowałby the routers through connection to the Wi-Fi network. Once infected the worm router would try to replicate on other devices.

It is unlikely that the method has been widely used in the attacks, and may rather be developed by investigators for purposes of concept threat verification. However, in previous years, the attention of cybercriminals increasingly focused on routers and other than PCs devices. The Wi-Fi worm is the logical consequence of an attack using malicious software like Mirai, and now the technology allows the creation of such malware – suggests – Sean Sullivan.

The European debate on cryptography

Encryption is the basis for digital information security. Thanks to the encryption information stored or transmitted electronically are protected from spies, criminals and dishonest companies. Unfortunately, not everyone sees the benefits that this technology provides to individual users, businesses and society.

In recent years, governments have sought to restrict the use of cryptography by IT companies. Apple’s dispute with the FBI over the encrypted iPhone is probably the best example of a different lawmakers approach and companies to the issue of cryptography. More recent and significant example of a surveillance system is a new law in the UK, the so-called. “Charter Snoopers”. According to their content, service providers will have to store data on users’ search history over the past year, with selected organizations having access to that data.

In 2017 years, rulers may be more likely to push company information to allow oversight of their products and services, which will automatically reduce the level of security. Politicians in the countries of Europe will consider the legal and technical possibilities for the government to monitor citizens. Proponents of such legislative initiatives will conflict with those who argue that limiting the level of encryption increases the risk of cyber attacks, foreign intelligence activities, government persecution, and many other aspects. In turn, governments will be motivated by their actions the concern for the well-being of citizens and prevention for example against terrorist attacks. – He says – Erka Koivunen, Director of Information Security.

More DDoS attacks using the Internet of Things

The attack on Dyn company using Mirai malwares was a considerable surprise in 2016. huge interest of the media is a side effect of misunderstanding by manufacturers as a major threat is the lack of adequate security of their facilities Internet of Things (Internet of Things) .

IdC devices are in an early stage of technological development, and there are some defects, which were unable to reveal the tests under controlled laboratory conditions. After the attack, using a Mirai software company withdrew from the production of their webcams, realizing that the specific vulnerability model can be exploited by hackers.

In 2017 years Internet devices of things will be increasingly used to perform DDoS attacks. The next step, due to take place in 2018, will be attacking the users themselves. It is important the rulers, the cyber security industry and producers together looked after the proper protection of newly intelligent environments – says Mika Ståhlberg, Chief Technical.

Classical malware is becoming less effective against security endpoints that are currently available. Hackers must demonstrate a more innovative approach and greater commitment than before – your business requires the use of social engineering techniques, such as the use of phishing and phishing. Another way may also be to find forgotten by the IT administrator of the server and use it to penetrate the network.

New trends in the industry adjust to keep cyberzabezpieczeń. Meeting the new challenges in the fight against threats will require a combination of artificial intelligence and the human factor. Risk analysis, penetration testing, risk assessment, incident response and research analysis is only part of the tasks that can be improved by the proper cooperation of the machine man. In 2017 years was this kind of cooperation will be appreciated the industry’s greatest interest – says Andy “Cyber ​​Gandalf” Patel, Senior Manager of Outreach Technology.

Leave a Reply

Your email address will not be published. Required fields are marked *