DDoS attacks, spyware and malware on mobile phones is emerging issues in 2013 and will continue to be the trend of 2014.
The spread of the virus has really become an industry “” industrial espionage in 2013. Espionage exists not only in the developed countries like the U.S., Germany, France …. The spy software takes advantage of security holes in text files (Word, Excel, PowerPoint) to spread. At the end of 2013, taking advantage of the text file to install spyware has stepped up, not through holes that need to switch to forms of phishing.
We discovered a series of hackers insert malicious code into a text file does not use vulnerabilities. The malicious code hidden in the form of 1 thumbnail is embedded directly into the text file. To read the contents, make sure the user will click to open larger image, thus activating malicious code.
Currently, connect your phone and computer are no longer safe is the message that we send in monthly newsletters Cybersecurity 11-2013 . Superclean DroidCleaner and is the first strain was able to carry out acts of cross transmission between your computer and smartphone . The malicious code capable of multi-platform spread is highly worrisome amid the world of smartphones and computers is almost a . This analogy helps hackers to easily create a malware can operate simultaneously on many different platforms , the ability to exploit the maximum spread .
2014 , this trend will continue strong , even booming smartphone market by rapidly rising . More than 1 billion smartphones sold worldwide in 2013 and this figure will be 1.7 billion in 2017 ( according to IDC ) . Particularly in the USA , in 2013 there were 60 million smartphone users and approximately 20 million computers are in use .
Taking advantage of the often arbitrary users download software applications without regard to origin , hackers spreading viruses by inserting malicious code into software as popular download manager tool , video editing and … posted on the forums . Users download the rogue software has accidentally turn your computer into a zombie ( zombies ) in botnet system .
Users should change their habits arbitrarily install software of unknown origin , if not unwittingly abetting the DDoS will continue . We recommend finding sources to ensure the repositories or from reputable suppliers .
2014: DDoS attacks, spyware and malware on mobile phones will continue to boom