Langsung ke konten utama

Adobe To Surpass Microsoft As Hacker Target

Adobe Reader and Flash will surpass Microsoft Office applications as favorite targets of cybercriminals, a security vendor predicted Tuesday.

In unveiling its 2010 Threat Predictions report, McAfee said the growing popularity of the Adobe products has attracted the attention of cybercriminals, who have been increasingly targeting the applications. Adobe Reader and Flash are two of the most widely deployed applications in the world.

As a result of Adobe's success in client software, McAfee Labs believes "Adobe product exploitation will likely surpass that of Microsoft Office applications in 2010."

Security experts for quite a while have warned of the potential security risk posed by Flash. In November, Foreground Security identified a flaw in the way Web browsers handle Flash files that could be used to compromise Web sites that have users submit content.

Beyond Adobe, cybercriminals are also expected to step up efforts next year to crack social networking sites, as well as third-party applications in general. Internet users can expect crooks to use more complex Trojans and botnets to build and execute attacks and to take advantage of HTML 5 to create threats. HTML 5 is the next major revision of hypertext markup language, the core markup language of the Web.

"We're now facing emerging threats from the explosive growth of social networking sites, the exploitation of popular applications, and more advanced techniques used by cybercriminals, but we're confident that 2010 will be a successful year for the cybersecurity community," Jeff Green, senior VP of McAfee labs, said in a statement.

Facebook, Twitter, and the third-party applications that incorporate the social networks have given criminals new technologies to target and exploit. In 2010, users will be most vulnerable to "rogue apps" distributed by criminals across the networks and to crooks that use the names of people on friends lists to get victims to click on unfamiliar links they might otherwise avoid, McAfee said. In addition, the use of abbreviated URLs on sites like Twitter will make it easier for cybercriminals to mask and direct users to malicious Web sites.

The technological advancements of HTML 5 are expected to shift more computing activity from the desktop to online applications. The technology's cross-platform support will make it easier for attackers to reach users across all mainstream browsers, McAfee said.

More sophisticated Trojans will make it possible to make unauthorized withdrawals from online banking accounts that stay below transaction limits, thereby making those withdrawals more difficult for banks to spot. E-mail attachments are expected to remain the most widely used Trojan distribution method, so users can avoid infection by checking on the safety of an attachment before clicking on it.

Regarding botnets, McAfee expects attackers in 2010 to adopt peer-to-peer control, a distributed and resilient botnet infrastructure, rather than the centralized hosting model seen today. The additional cost of the peer-to-peer model is expected to be outweighed by better success against the security community's increasingly aggressive techniques in shutting down and denying access to botnets.

Botnets typically refer to networks of computers that contain malicious software that places the host computer in the control of cybercriminals. The applications, called bots, are secretly deployed through Trojans or exploiting vulnerabilities in Web browsers and other Internet-enabled applications.

POPULAR

Museum Tsunami Aceh Persiapkan Inovasi berbasis Teknologi Digital

MUSEUM Tsunami Aceh terus lakukan inovasi untuk menjadi destinasi edukasi kebencanaan yang lebih modern dan menarik. Dengan mengusung konsep digitalisasi, museum akan memberikan pengalaman baru yang lebih interaktif dan imersif bagi para pengunjung. Kepala Dinas Kebudayaan dan Pariwisata Aceh, Almuniza Kamal, menjelaskan bahwa empat ruang utama di museum akan ditata ulang secara signifikan. Ruang-ruang tersebut meliputi lorong tsunami, memorium hall, lobi lantai dua, dan ruang pameran tetap. "Kami ingin menghadirkan pengalaman yang lebih mendalam dan menyentuh bagi pengunjung. Lorong tsunami akan dilengkapi dengan visual 3D pada lantai dan dinding, menciptakan sensasi seolah berada di tengah gelombang tsunami," ujar Almuniza, Rabu, 17 September 2025. Sementara itu, memorium hall yang ikonik akan diperbaharui dengan serangkaian LED berbentuk persegi panjang, menggantikan layar yang sudah ada. Tujuannya adalah untuk menampilkan konten-konten sejarah dan edukasi secara lebih d...

1,8 Juta Penderita Kanker Mati Akibat Merokok

Kebiasaan merokok adalah salah satu faktor utama penyebab kanker paru. Berdasarkan data Badan Kesehatan Dunia (WHO), 40 persen dari 12 juta orang di dunia didiagnosa terserang kanker setiap tahun. WHO memperkirakan, 84 juta orang meninggal akibat kanker dalam rentang 2005-2015. Ada 1,8 juta angka kematian aki­bat kanker yang disebabkan kebiasaan merokok. Sebesar 60 persen dari keseluruhan angka kematian akibat kebiasaan me­rokok dijumpai di negara-negara berkembang dan terbelakang. Bagaimana rokok dapat me­nimbulkan kanker? Kebiasaan merokok bisa memicu kanker paru, kanker paru, tenggorokan, rongga mulut dan pharynx.

Top Ten Facebook Alternatives That Keep Up Your Privacy

With the rise to top spot in social networking world, Facebook's taking advantage of its monopoly. The social networking ace is eager on controlling online identity of its members and reconfiguring the world’s privacy norms. Lately Facebook has been accused of taking advantage of users privacy. In such a situation you must be looking for Facebook Alternatives. If you are looking for alternatives, you have many but those that upkeep your privacy and offer similar features and apps as Facebook are numbered. We made an effort to queue up the 10 Facebook alternatives that doesn't compromise your privacy. 1. Friendster It is already quite popular in Asia but has also grown in popularity in the United States. The network offers quite a few features to customize your profile, offering quite a few features to customize. This is the ultimate point of a social network through. You can stay updated on people's shared information  Friendster’s privacy is stricter than what we find w...