1. Home
  2. >>
  3. theft
  4. >>
  5. Cyber ​​security, between cyber espionage and data theft involving the Internet of Things.

Cyber ​​security, between cyber espionage and data theft involving the Internet of Things.



Cyber ​​security, between cyber espionage and data theft involving the Internet of Things.


To military, territorial, city and personal security is added another dimension which has now become a permanent topicality and we are talking about IT security. Experts from McAfee and another well-known antivirus manufacturer Kaspersky say that cyber espionage will pick up in 2015, with small states and terrorist groups using cyberspace to “wage a war against enemies” in an increasingly sophisticated way.

MaAfee technicians refer mainly to Eastern European criminals saying that “they will go from lightning attacks to steal financial credentials to more advanced approaches, aimed at stealing information to sell or use later”. There IT security it is violated by very patient and prepared people, who spend their time studying computer systems, often they are very young people who have embraced a cause. In fact, McAfee explains that cyber espionage takes up the methodology of espionage between states, aims to steal information of high value on people and companies. “An increasing number of small criminal groups – explains Kaspersy – will have more and more companies as their preferred target. Large organizations will experience a higher number of attacks originating from different sources ”.

The cybersecurity front he is above all concerned about a growing fact, namely the expansion of what is called the Internet of Things, or the network that, through mobile devices, allows remote control of household appliances, light bulbs and entire homes structured in the modern innovations of home automation. So, not just the cyber espionage but also system intrusion worries and on this front are connected the numerous attempts by hackers to violate banking computer systems to which credit cards, online accounts, home backing with touch ID are connected, in short, perhaps even Apple is shaking and we remember that the giants of information technology, of the Web and new technologies are at the heart of this theme as they unwittingly often provide important privacy violation tools. Google took action precisely to study new methods of cyber security breach and create ad hoc defense programs.

Source: Ansa