Date:23/01/16
As indicated in the report, during the period from 2014 to 2015, the number of XSS vulnerabilities significantly reduced. On the contrary, the number of CSRF vulnerabilities increased in this period. Developers have acknowledged that the Adobe Flash Platform is not able to withstand all types of cyber-attacks. And now they are taking necessary measures to reduce cybercriminals’ capabilities.
The document also lists the vulnerabilities that pose a threat to security.
According to Cisco, organizations achieved progress in encrypting data transmission between the nodes, but the stored data is often left unprotected. Most of the large-scale incidents, which took place in the past few years, happened because data stored in data centers and other internal systems was not encrypted.
In 2015, most of the attackers used the following types of malware: adware, spyware, redirection programs, exploits, iFrame and phishing program, SecurityLab.www.securitylab.ru reports.
Cisco: “Cyber criminals’ activity increased significantly in 2015”
Cisco has published a report on cyber security for 2015. According to the document, cyber criminals’ activity increased significantly during last year - hackers stole sensitive data, extorted ransom money from victims and exploited servers’ capacities.As indicated in the report, during the period from 2014 to 2015, the number of XSS vulnerabilities significantly reduced. On the contrary, the number of CSRF vulnerabilities increased in this period. Developers have acknowledged that the Adobe Flash Platform is not able to withstand all types of cyber-attacks. And now they are taking necessary measures to reduce cybercriminals’ capabilities.
The document also lists the vulnerabilities that pose a threat to security.
According to Cisco, organizations achieved progress in encrypting data transmission between the nodes, but the stored data is often left unprotected. Most of the large-scale incidents, which took place in the past few years, happened because data stored in data centers and other internal systems was not encrypted.
In 2015, most of the attackers used the following types of malware: adware, spyware, redirection programs, exploits, iFrame and phishing program, SecurityLab.www.securitylab.ru reports.
Views: 879
©ictnews.az. All rights reserved.Similar news
- Cellphone Use May Raise Cancer Risk
- Australian police pushes cyber safety education
- Vietnam aims to lead in e-government
- Senate Website Gets Hacked
- US builds net for cyber war games
- Japan enacts anti-computer virus law
- India passes law vs e-waste
- Anonymous Declares War On The City Of Orlando
- Microsoft highlights evolving dangers as online identity data proliferates
- Consumers want internet security to be provided by banks
- Government facilities targets of cyber attack
- South Korean web attacks might been war drill
- Sri Lanka to Establish National Passport Database to Increase Border Security
- Hi-tech crime agencies set to employ information security professionals
- Phone hacking and online campaign bring down the News of the World