• Dell Decides To Stop Making Tablets With Android

    All is not gold that glitters. Although growth rates in sales of tablets, and the unbeatable expectations for the coming years, the truth is that not all manufacturers are getting their devices enter the market.
  • The iPad | iPhone 5 and 3 come with an enhanced Siri

    There are many rumors tell us that Apple is working hard on creating a new iPhone 5, but also a brand new iPad 3 that could make its triumphal appearance in mid 2012.
  • BlackBerry Mobile Fusion Will Handle Mobile Security Of Any Device On Business

    Research in Motion launched BlackBerry Mobile Fusion in 2012, allowing companies to manage the safety of their workers terminals regardless of brand or manufacturer.
  • Kinetic Nokia Device | Mobile Device Flexible

    By "fault" of concepts and a few more tries, flexible displays are not really shocking that they should, but another issue is that they respond to the type of fold that you do.
  • Wikitapas, A Tapas Bar Finder For Mobile

    The number of applications that use geolocation GPS to find nearby places is increasing. If there is a variety to locate bars, restaurants and hotels, is now the turn of the lids.

Tech Crunches Headlines

Sunday 27 November 2011

The Mobile Malware And Geolocation Will Be The Major Threats In 2012



According to the company M86 Security, malware and security for mobile geolocation applications are the main problems in security in 2012. This year has already seen an increase in mobile threats in 2012 are expected to continue the trend. M86 Security has presented its annual security report, which makes some predictions for next year. As expected, mobile devices will be the focus of the attacks. The proliferation of smartphones and tablets has already provoked the interest of cybercriminals, this 2011 and have substantially increased the volume of attacks on mobile systems.

According to data from M86, in 2011 there have been more than 7,500 mobile malware threats, well above the 2,500 recorded in 2010. However, the malware for these platforms has only just begun, and according to Info Security, "we are still in its infancy." As already noted by other security companies, Android is the system that receives more threats. Being open source, hackers find it easier to develop malware to the system.

The second group will enhance threats in 2012 as M86 is about geolocation services. In this case, the report of the security company ensures that the use of these services on social networks like Facebook will be a problem in 2012, when he popularized. At the moment this technology is taking off and users have not yet adapted to use a habit when using its location on the Web.

In this respect, M86 ensures that security in geolocation services will be affected by the attacks attempt to try and steal data knowing the location of the devices, noting that special attention should be paid to the use of geolocation services by minors.

M86 also notes that in 2012 may be recorded current new virus attacks that have mutated to evade security measures designed. As an example, Zeus puts the virus and its mobile version, but only one of several viruses that are expected to be updated to attack computers of users. Similarly, expect more attacks higher levels of complexity that attempt theft of digital certificates and all types of practices to overcome the defenses.

Another aspect that is assumed for 2012 is to continue the great attacks against companies. For M86, this 2011 popularized the trend of attempting to access the databases of large companies continue to produce, and may increase their number.

Finally, in his report, M86 also ensures that 2012 may be the year where you start seeing attacks on cloud services. More and more businesses and consumers are adopting storage and cloud services, which will be a target for hackers next year. Against this background, the security company believes that consumers and businesses, as well as antivirus vendors, should take extra care and enhance their security measures to meet a year will continue the trend of increasing sophistication of computer threats.