Toolkits and applications for phishing, spam, malware,
scareware and snoopware can today be acquired relatively easily from underground
sites or even purchased legally, lowering the financial and intellectual entry
barriers to acquire tools to facilitate unauthorized access to information and
communication systems to manipulate or destroy them.
Snoopware
is going mobile, threatening user privacy through the possibility of voice/data
call monitoring with devastating consequences, especially for the growing number
of corporate users who rely on their smartphones for confidential discussions
and data exchanges with their corporate IT systems. With the phenomenal growth
in mobile telephony (including smartphones), together with convergence, which is
bringing down the walls between networks, cyberthreats can now spread easily to
all platforms and to all countries .
As information technology becomes an ever greater part of our
lives, and as ubiquitous connections to the Internet become a reality, with
computers integrated into a growing number of household appliances, it is
increasingly likely that cyberthreats will spread to new levels and affect us in
ways unimaginable today.
«
Go back to overview |