As one example, Stuxnet itself can exploit four different zero-day vulnerability to attack targets. In 2010, assailants launched the attack pointed to various multinational companies listed on stock exchanges and government agencies, as well as companies that rate is quite surprising.
The high activity also encourages the use skyrocketing information technology that increasingly sophisticated cyber threats. Thus, the main highlight in this report include a dramatic increase both in frequency and sophistication of attacks targeted at the enterprise environment, continued growth of social networking sites as a place to spread the attack, and attackers change tactics infection, which is increasingly targeting vulnerabilities in Java in order to break into traditional computer systems. Continue reading How do Hackers Target the Attacks
Although the attacker makes some completely new malware, in many cases, they infect users by entering malicious logic into the existing native applications. The attacker then sends the application through the app store is infected with the public. Continue reading Symantec: Attacks targeting Mobile Devices-2
A recent report by Symantec Internet Security Threat Report (ISTR) indicate a potential increase in the threat of attacks on mobile devices. This encouraged more widespread platform users of mobile devices that attract the attention of attackers. Continue reading Symantec: Attacks targeting Mobile Devices