by October 11, 2013 0 comments

he following methods were used most often by cybercriminals to penetrate systems: 

Exploiting vulnerabilities in browsers and their plugins (drive-by download).

Infection in this type of attack takes place when visiting an infected website, without any intervention from the user and without their knowledge. And this is the number one method utilized by cybercriminals, the one used in the majority of attacks. Protection against such attacks requires an Internet Security class solution capable of detecting threats as they are being downloaded from the Internet and the timely installation of all the latest updates for the browser and its plugins. Another key technology, developed by Kaspersky Lab, is Automatic Exploit Prevention, designed specifically to fight complex web threats, exploiting newly discovered vulnerabilities in software.

Social engineering.

These attacks require user participation, with the user having to download the malicious file to their computer. This happens when the cybercriminal tricks the victim into believing they are downloading a legitimate program. 
Protection against such attacks requires a web antivirus solution capable of detecting threats as they are being downloaded from the Internet.

Local threats

The use of local infection statistics for user computers is an extremely important indicator. Worms and file viruses account for the majority of such incidents. This data shows how frequently users are attacked by malware spread via removable USB drives, CDs and DVDs, and other “offline” methods. Protection against such attacks not only requires an antivirus solution capable of treating infected objects but also a firewall, anti-rootkit functionality and control over removable devices.

 

 

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

Your data will be safe!Your e-mail address will not be published. Also other data will not be shared with third person.