Middle east and Asia event
Free web source for technology events related to all sectors
Symantec Predicts Continued Growth in Cyber Activity in Egypt in 2013
 
 
Share on Facebook     Share on LinkedIn         WatsApp
 

Symantec announces its 2013 cybersecurity predictions which emphasize that Egyptian organizations and individuals continue to be a target for cybercrime attacks. According to Symantec's 2011 Global Internet Security Threat Report, Volume 17, Egypt's global ranking was on the rise due to an increase in online and mobile internet activity, as well as rapid adoption of social networking across the country. Egypt also experienced a dramatic shift in its global ranking from 42 in 2010 to 27 in 2011 and ranked second across Europe, the Middle East, and Africa as a source for malicious online activity.

"In 2013, we foresee a continued rise in targeted attacks in Egypt with financial and political motivation. In addition to traditional cybercrime, Egypt's surge in internet users across social media and mobile devices may create a new avenue for increasingly sophisticated incidents," said Justin Doo, cloud and security practices director for Middle East and North Africa, Symantec. "On a global scale, malicious cyber attacks rose by 81 percent in 2011, and as this trend continues organizations in Egypt need to be vigilant about protecting their information by understanding their risk posture and deploying security policies and technologies to minimize the threats."

Increase in Cyber Conflicts
Conflicts between nations, organizations and individuals will play an integral role in the cyber world. Nations or organized groups of individuals will continue to use cyber tactics in an attempt to damage or destroy the secure information or funds of its targets. In 2013, we will see the cyber equivalent of saber rattling, where nation states, organizations, and even groups of individuals use cyber attacks to show their strength and "send a message."

Ransomware is the new Scareware

Fake antivirus has begun to fade as a criminal enterprise, and a new and harsher model has emerged: ransomware - which infects a computer system and restricts access until a ransom is paid to the creator of the malware. Ransomware goes beyond attempting to fool its victims; it attempts to intimidate and bully them. In 2013, attackers will use more professional ransom screens, up the emotional stakes to motivate their victims, and use methods that make it harder to recover data once compromised.

Mobile Adware Exposed
Mobile adware, or "madware," disrupts the user experience and can potentially expose location details, contact information, and device identifiers to cybercriminals. Madware--which sneaks onto a user device when they download an app--often sends pop-up alerts to the notification bar, adds icons, changes browser settings, and gathers personal information. In the past nine months, the number of apps including the most aggressive forms of madware has increased by 210 percent. Because location and device information can be legitimately collected by advertising networks, Symantec expects increased use in madware as more companies seek to drive revenue growth through mobile ads.

Monetization of Social Networks Introduces New Dangers
As consumers, we place a high level of trust in social media--from the sharing of personal details, to spending money on game credits, to gifting items to friends. As these networks start to find new ways to monetize their platforms by allowing members to buy and send real gifts, the growing social spending trend also provides cybercriminals with new ways to lay the groundwork for attack. Symantec anticipates an increase in malware attacks that steal payment credentials in social networks and trick users into providing payment details, and other personal and potentially valuable information, to fake social networks.

Attackers Will Shift to Mobile and Cloud

As unmanaged mobile devices continue to enter and exit corporate networks and pick up data that later tends to become stored in other clouds, there is increased risk of breaches and targeted attacks on mobile device data. Some mobile malware duplicates old threats, like stealing information from devices. But it also has created new twists on old malware. Today mobile malware sends premium text messages to accounts that bad guys can profit from. In 2013 you can be sure that mobile technology will continue to advance and thereby create new opportunities for cybercriminals. In addition, the increase in mobile computing will strain the SSL mobile infrastructure in 2013 and reveal a core issue: Internet activity on mobile browsers is not subject to proper SSL certificate handling. To exacerbate the problem, much of this mobile Internet usage is being handled by unsecure mobile applications, which brings additional risk to the table, such as man-in-the-middle attacks.

For additional information or to request an interview, please contact:
Marwa Moneer
The Portsmouth Group
+201099900047
Marwa.moneer@wallis-mc.com

Kathryn Stetz
The Portsmouth Group
+971 4 396 3575
Kathryn.Stetz@theportsmouthgroup.com

Jacqueline Freer
Symantec
+971 55 300 6106
Jacqueline_Freer@symantec.com

Press release posted on: Jan 2 2013

DarkMatter and Symantec to Provide Next-generation Cyber Security Solutions and Services
Symantec NetBackup Tackles Data Growth, Performance and Virtual Sprawl as Customers Transition to the Modern Data Center
Symantec Internet Security Threat Report Reveals Increase in Cyberespionage – Including Threefold Increase in Small Business Attacks
Norton by Symantec Names Top 5 Scams and Spams to Avoid on Facebook
Norton Launches 2012 Products in the Middle East, Extending "Norton Everywhere" Initiative, Now Featuring Arabic Products
Norton Gives Likejacking Scams the Thumbs-Down
Norton by Symantec releases its sixteenth internet security threat report
Symantec Brings Strong Authentication Credentials to iPad with VeriSign® Identity Protection (VIP) Access for Mobile

CategoryDescription
Security & Audit
 
http://www.symantec.com
Country: USA

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored













About us  |  Contact us  |  Partners  |  RSS
© 2024 MySolutionInfo.com