You are here: hacking technology > hacker invade > Content
Hot Articles
Recommend Articles
New Articles
2012 Olympic Games suffer k?nnte a serious cyber-attack if we act now
  Add date: 10/13/2010   Publishing date: 10/13/2010   Hits: 2
Before his speech at the Infosecurity show in this?or Europe, David Blunkett, has warned that the Olympic Games in 2012 k?nnte suffer a severe "Cyber attack 'if nothing is done now taken over. W?While the government must take the initiative, Mr Blunkett believes the way to beat hackers working closely with vendors and corporate security. The interior minister says the former British Olympic Games in London as a rallying point for setting the standards should use anti-National Cyber Security. If no Ma?measures are taken, k?can expect the organizers to total collapse of the systems and unauthorized access to data suffer from sophisticated hackers. Blunkett has said that the threat is so serious "We must work together to chemical, biological and radiological threats Cyber ".
MXSweep agree that cyber-criminals are always looking to Gro?events like the Olympic Games in 2012 to use for their own benefit. Edward Grant, MD says in MXSweep w?while organizers must be aware of the threats they face, businesses and the general?should also be public at how this problem k?nnte their IT systems which affect vigilant "In MXSweep welcome warning Mr Blunkett and the claim that people in?public and private sector more aware of the threats we do face. However, we believe that w?During the discussion of the threats that hackers today, Mr Blunkett neglected?temperate has another serious threat that is directed indiscriminately and address increased significantly?Hen, since we the Olympic Games in 2012 n?. Hern "Grant continued: "Spammers and phishers looking to use the event as an important part of the campaign?as spam in the period before 2012. We expect a dramatic increase in the number of unwanted e-mails, especially the games that the subject line mentioned?hnt see. In addition, users buy tickets online or goods must pay particular attention to that credit card data and other confidential information is stolen in phishing. How?Blunkett or has it?Winged a Common Approach to Ratings?ltigung INDISPENSABLENATUREOF of threat?sslich. In addition, w?re it to all Internet users call an eye to 24 / 7 of its ongoing responsibilities to identify and reduce instances of Cyberkriminalit?t keep. "
Prev:Ties aimed at both Windows and Mac OS X Next:Gumblar Web-based attack scenario is six times more than its n?chster rival found

Comment:

Category: Home > hacker invade