Sina Technology News July 20 morning news, the first half of 2011, released today, Rising Internet Security report, the report noted, the first half of 2011, a total of $ 103 530 000 Internet users suffered phishing attacks, to create a direct Internet users in China economic losses of at least ten billion level, false Taobao station, Tencent ######## websites, ######## ICBC website, ######## Bank of China Web site, phishing sites occupy the top four.
Rising security experts said, "cloud attack" (Threats to Cloud) has become a reality, "cloud" client security protection is becoming a focus.
reported that first half of 2011, Chinas new Internet virus 5.287 million, an increase of 25.2% over last year; 2.18 million new phishing sites (in URL terms), is 25 times last year; 1 billion Internet users zero 530,000 people hit by phishing sites, to Internet users in China and caused direct economic loss of at least ten billion level.
Rising reported that first half of the new Trojan web site (page number) the total number of 236 million,
women griffey shoes, compared with last year fell by 91.2% (2010 compared to 26.66 million), only 1% of same period in 2009. The reason this happens is that "cloud security" the successful implementation of technology, breaking the chain of horse hung black run, making the site linked to horse unprofitable, forcing the hackers to gradually give up such attacks.
data show that the false Taobao station, Tencent ######## websites, ######## ICBC website,
dunk sb heels, ######## Bank of China Web site, phishing sites occupy the top four. "######## buy site" and "false shopping site" in general,
womens jordan heels, although the ratio of the number is not high, but the momentum is increasing more rapidly. For example some people to buy advertising in search engines, links to sell iPhone 4 mobile phone, Shang Dangzhe many.
Rising security experts said, "cloud attack (Threats to Cloud)" is becoming a reality, a large number of user data storage and behavior of the "cloud providers" such as microblogging, social networking sites, network storage, even including traditional telecommunications operators and hotel industry, is facing an unprecedented security risks.
rapid growth of hybrid virus
2011 in the first half, Rising "Cloud security" system intercepted a total of 5,
asics onitsuka,286,791 a new virus samples, the overall amount of virus compared with the same period last year increased by 25.2%. In which a Trojan 4,024,499, accounting for 76.12% of the overall proportion of the virus, followed by the virus were infected with virus (win32), backdoor, virus release device (Dropper) and advertising programs.
first half of Internet users in more than 740 million people are infected, an average of 4.11 million passengers daily users poisoning, according to the number of infections,
air griffey max gd, the number of variants of a comprehensive assessment and representation, Rising out of the first half of 2011 selected the top ten viruses.
January to June by new behavior analysis of virus samples found that the virus is from the traditional low-level assembly language, gradually transformed into high-level language acquisition and use of mixed low-level way of writing, the part written in assembly language guide to loaded from the main high-level language virus. The use of high-level language, lower cost, shorter development cycles, results in the "hybrid virus" in the overall increase in the proportion of the virus very much.
in the first half, rising a total of 445,957 intercepted a virus infection, accounting for 8.44% of the overall proportion of the virus, Trojan horse has become the second largest category after the virus type.
phishing sites jumped to 25 times more Internet users over 100 million people suffer
in the first half, Rising intercepted phishing 2.18 million (in URL terms), is 25 times last year; a total of $ 103 530 000 people were Internet users in phishing attacks. Data according to CNNIC, Chinas Internet users each net purchase amount estimated at 162 yuan, the first half of 2011, the direct loss of fishing sites shall be ten billion yuan level. Among them, the false drugs (which account for a large share of health care drugs), and inferior health care products (weight loss, breast, chronic health care products), and inferior digital products (cottage phone, ######## iPhone, etc.), as most phishing sites are keen sale "merchandise . "
Currently, the majority of the relevant departments in order to avoid phishing sites to its monitoring and evidence, the life cycle is very short, usually a phishing site on the Internet to survive no more than a month, and some survive only a few days or even hours. Type of phishing sites were ranked banks accounted for 33% off; ######## winning websites accounted for 29%; ######## shopping sites accounted for 19%, 7% ######## gaming site.
Recently, buy web site to become hackers "phishing" new favorite, because many Internet users have become accustomed to the buy site to buy cheap goods, while these funds are directly into the "buy site" account,
jordan heels, lack of third-party monitoring, it is easy to become a look into the depths of the object.
search engine users suffered phishing attacks become the biggest way Rising
According to statistics, in the first half of 2011, intercepted the fishing site, users search through the search engine to the proportion of total traffic accounted for 60% of search engine users have become the biggest phishing sites encountered way.
2011 June Rising intercepted a group through the purchase of search engine advertising to promote the ######## site, they pretend to leave the U.S. delegation network, handle net in an attempt to cheat the search engine users in the hands of money. Buy a fishing website which shows the price of 3,300 yuan on site iPhone4, has sold 256, the amount of fraud in several hundred thousand dollars. According to technical analysis and positioning, after the fraudulent site has multiple domain names similar to buy ######## famous station, cheat money.
Rising security experts point out that some of the original lie in the traditional areas of fraudsters, has begun to "electronic business" and "network",
new ken griffey shoes, including the breast weight loss, hypertension, cancer, tea, pearl jade and other areas, have begun to a large number of ######## phishing sites. For example, in some forum, we often see the "farmers direct marketing, the National Bao You " of the ad, a lot of money is not shipped,
air griffey max 1 red, or send the poor tea phishing sites.
"cloud attack" was a reality a number of famous sites,
Nike air 1/2 cent penny, "dragging library"
2011 in the first half, against an enterprise network hacker attacks increase, many large database sites,
asics tiger, hackers or copied, and used to sell benefits. Dating websites, electronic business web site, buy web site, hotel chains etc become the focus of hackers. Since a large number of these sites store user information, purchase information, such as banks and credit card information, hackers can take profit.
Rising reported that users value the "cloud" More and more, such as: music sharing,
Nike Air Griffey Max II, document sharing,
nike heels for women, address book synchronization, online shopping, etc., the service providers server, generally have more or less "cloud" features,
griffey shoes 2011, they usually support a variety of platform applications. Drag the library is the security industry term that refers to hacking corporate networks, users on the server database, financial database and other copied.
If you do only protection on the PC side, and on other platforms did not do the appropriate protection, then it is easy to go wrong. First half of 2011, Rising has intercepted specifically for cell phones and mobile devices of the phishing sites, if the phone does not have the appropriate security software installed, users can easily visit later in the move.
All in all, the current network is a wide range of threats, users see the web page,
nike heels, download,
cheap asics, play games, Internet shopping are likely to encounter different risks. Some form of ever-changing virus, malicious software can easily stepped in, seriously affect the users computer work. (Wood)