Langsung ke konten utama

Adobe To Surpass Microsoft As Hacker Target

Adobe Reader and Flash will surpass Microsoft Office applications as favorite targets of cybercriminals, a security vendor predicted Tuesday.

In unveiling its 2010 Threat Predictions report, McAfee said the growing popularity of the Adobe products has attracted the attention of cybercriminals, who have been increasingly targeting the applications. Adobe Reader and Flash are two of the most widely deployed applications in the world.

As a result of Adobe's success in client software, McAfee Labs believes "Adobe product exploitation will likely surpass that of Microsoft Office applications in 2010."

Security experts for quite a while have warned of the potential security risk posed by Flash. In November, Foreground Security identified a flaw in the way Web browsers handle Flash files that could be used to compromise Web sites that have users submit content.

Beyond Adobe, cybercriminals are also expected to step up efforts next year to crack social networking sites, as well as third-party applications in general. Internet users can expect crooks to use more complex Trojans and botnets to build and execute attacks and to take advantage of HTML 5 to create threats. HTML 5 is the next major revision of hypertext markup language, the core markup language of the Web.

"We're now facing emerging threats from the explosive growth of social networking sites, the exploitation of popular applications, and more advanced techniques used by cybercriminals, but we're confident that 2010 will be a successful year for the cybersecurity community," Jeff Green, senior VP of McAfee labs, said in a statement.

Facebook, Twitter, and the third-party applications that incorporate the social networks have given criminals new technologies to target and exploit. In 2010, users will be most vulnerable to "rogue apps" distributed by criminals across the networks and to crooks that use the names of people on friends lists to get victims to click on unfamiliar links they might otherwise avoid, McAfee said. In addition, the use of abbreviated URLs on sites like Twitter will make it easier for cybercriminals to mask and direct users to malicious Web sites.

The technological advancements of HTML 5 are expected to shift more computing activity from the desktop to online applications. The technology's cross-platform support will make it easier for attackers to reach users across all mainstream browsers, McAfee said.

More sophisticated Trojans will make it possible to make unauthorized withdrawals from online banking accounts that stay below transaction limits, thereby making those withdrawals more difficult for banks to spot. E-mail attachments are expected to remain the most widely used Trojan distribution method, so users can avoid infection by checking on the safety of an attachment before clicking on it.

Regarding botnets, McAfee expects attackers in 2010 to adopt peer-to-peer control, a distributed and resilient botnet infrastructure, rather than the centralized hosting model seen today. The additional cost of the peer-to-peer model is expected to be outweighed by better success against the security community's increasingly aggressive techniques in shutting down and denying access to botnets.

Botnets typically refer to networks of computers that contain malicious software that places the host computer in the control of cybercriminals. The applications, called bots, are secretly deployed through Trojans or exploiting vulnerabilities in Web browsers and other Internet-enabled applications.

POPULAR

Kerajaan Jeumpa, Kerajaan Islam Pertama Nusantara

Teori tentang kerajaan Islam pertama di Nusantara sampai saat ini masih banyak diperdebatkan oleh para peneliti, baik cendekiawan Muslim maupun non Muslim. Umumnya perbedaan pendapat tentang teori ini didasarkan pada teori awal mula masuknya Islam ke Nusantara. Mengenai teori Islamisasi di Nusantara, para ahli sejarah terbagi menjadi 3 kelompok besar, yaitu pendukung (i) Teori Gujarat (ii) Teori Parsia dan (iii) Teori Mekah (Arab). Bukan maksud tulisan ini untuk membahas teori-teori tersebut secara mendetil, namun dari penelitian yang penulis lakukan, maka dapat disimpulkan bahwa Teori Mekkah (Arab) lebih mendekati kebenaran dengan fakta-fakta yang dikemukakan. Teori Mekkah (Arab) hakikatnya adalah koreksi terhadap teori Gujarat dan bantahan terhadap teori Persia. Di antara para ahli yang menganut teori ini adalah T.W. Arnold, Crawfurd, Keijzer, Niemann, De Holander, SMN. Al-Attas, A. Hasymi, dan Hamka. i Arnold menyatakan para pedagang Arab menyebarkan Islam ketika mereka mendo...

Sejarah Huruf Alfabet

Istilah alphabet sebetulnya berasal dari bahasa Semit. Istilah ini terdiri dari dua kata, yaitu aleph yang berarti 'lembu jantan' dan kata beth yang berarti 'rumah'. Konotasi pictografis dari pengertian kedua kata ini menjadi sebutan untuk menunjukkan huruf pertama a (aleph) dan b (beth) dalam urutan huruf-huruf semit (Mario Pei,1971:176). Ini bukan berarti bahwa tulisan tersebut memakai sistem pictografis-ideografis, akan tetapi malah sebaliknya. Orang-Orang Semit mengambil tanda gambar lembu (kepala lembu) dari huruf Hierogliph Mesir tanpa memperdulikan pengertian lembu itu dalam bahasa Mesir sendiri, sedangkan menurut bahasa Semit, lembu itu disebut aleph. Demikian juga dengan tanda gambar rumah yang mereka sebut beth. Kemudian dengan mempergunakan prinsip akroponi, tanda gambar kepala lembu, oleh masyarakat Semit dijadikan tanda untuk bunyi a dan tanda gambar rumah untuk bunyi b. Semua huruf pada alphebt Semit mempunyai konotasi seperti pictografis itu. Daerah y...

Say Cheese: 12 Photos That Should Never Have Been Posted Online

You know the old cliche, a picture is worth a thousand words? Turns out that pictures have been deeply undervalued: A single photo can cost you your reputation, your job, even your freedom--if you post it online. Teachers, principals, firefighters, mayors, university presidents, and everyday people have all discovered the dark side of putting the wrong photos and videos on social networking sites. Sometimes they paid the price in embarrassment. An unlucky handful lost their jobs or landed in jail. The results aren't pretty, but they are sometimes hilarious. Here's our dirty dozen--12 pictures their owners probably wish they could take back. 1. Hey Kevin, Tinker Bell Wants Her Outfit Back It's bad enough to dress up like you're about to slip a dollar under some toothless child's pillow. But former intern Kevin Colvin made it much worse by asking his boss at Anglo Irish Bank if he could take time off for a "family emergency in New York," then flitting o...