{"id":2148,"date":"2009-11-22T22:02:59","date_gmt":"2009-11-22T20:02:59","guid":{"rendered":"http:\/\/guy.pastre.org\/?p=2148"},"modified":"2009-11-23T10:05:18","modified_gmt":"2009-11-23T08:05:18","slug":"symantec-devoile-les-tendances-2010-de-securite-a-surveiller-du-rififi-a-lhorizon","status":"publish","type":"post","link":"https:\/\/guy.pastre.org\/?p=2148","title":{"rendered":"Symantec d\u00c3\u00a9voile les tendances 2010 de s\u00c3\u00a9curit\u00c3\u00a9 \u00c3\u00a0 surveiller : du rififi \u00c3\u00a0 l&rsquo;horizon !"},"content":{"rendered":"<p>Symantec dresse le panorama des principales tendances de s\u00c3\u00a9curit\u00c3\u00a9 \u00c3\u00a0 surveiller de pr\u00c3\u00a8s en 2010.<\/p>\n<ol>\n<li>Un antivirus ne suffit plus , compte tenu de l\u00e2\u20ac\u2122intensification des menaces polymorphes et de l\u00e2\u20ac\u2122explosion des variantes uniques de programmes malveillants.<\/li>\n<li>L\u00e2\u20ac\u2122ing\u00c3\u00a9nierie sociale comme principal vecteur d\u00e2\u20ac\u2122attaque : les agresseurs s\u00e2\u20ac\u2122en prennent de plus en plus \u00c3\u00a0 l\u00e2\u20ac\u2122utilisateur final directement<\/li>\n<li>Les fournisseurs de logiciels de s\u00c3\u00a9curit\u00c3\u00a9 factices redoublent d\u00e2\u20ac\u2122efforts.<\/li>\n<li>Les applications de tiers associ\u00c3\u00a9es aux r\u00c3\u00a9seaux sociaux seront la cible de fraudes<\/li>\n<li>Windows 7 dans les mailles du filet des agresseurs : Microsoft a d\u00c3\u00a9j\u00c3\u00a0 distribu\u00c3\u00a9 les premiers correctifs de s\u00c3\u00a9curit\u00c3\u00a9 pour son nouveau syst\u00c3\u00a8me d\u00e2\u20ac\u2122exploitation.<\/li>\n<li>Augmentation des botnets Fast Flux : \u00c2\u00ab Fast flux \u00c2\u00bb est une technique\u00c2\u00a0 pour masquer des sites de phishing et autres sites Web malveillants.<\/li>\n<li>Les services de raccourcissement d&rsquo;url, futurs meilleurs amis des adeptes du phishing.<\/li>\n<li>Intensification annonc\u00c3\u00a9e des logiciels malveillants ciblant les Mac et les terminaux mobiles.<\/li>\n<li>Les spammeurs changent les r\u00c3\u00a8gles : dans le contexte \u00c3\u00a9conomique d\u00c3\u00a9favorable, les individus seront de plus en plus nombreux \u00c3\u00a0 vouloir profiter des insuffisances de la l\u00c3\u00a9gislation.<\/li>\n<li>Les volumes de spams vont continuer de fluctuer au gr\u00c3\u00a9 de l\u00e2\u20ac\u2122adaptation des spammeurs.<\/li>\n<li>Logiciels malveillants sp\u00c3\u00a9cialis\u00c3\u00a9s : en 2009, on a d\u00c3\u00a9couvert des logiciels malveillants ultra sp\u00c3\u00a9cialis\u00c3\u00a9s con\u00c3\u00a7us pour exploiter certains distributeurs de billets.<\/li>\n<li>Perfectionnement de la technologie CAPTCHA : les spammeurs vont avoir de plus en plus de mal \u00c3\u00a0 craquer les codes CAPTCHA au moyen de processus automatis\u00c3\u00a9s. Ils vont payer des gens pour le faire manuellement !<\/li>\n<li>Spam de messagerie instantan\u00c3\u00a9e : tandis que les cybercriminels cherchent de nouveaux moyens pour contourner les technologies CAPTCHA, les attaques des applications de messagerie instantan\u00c3\u00a9e vont se multiplier.<\/li>\n<li>Multiplication des spams dans d\u00e2\u20ac\u2122autres langues que l\u00e2\u20ac\u2122anglais<\/li>\n<\/ol>\n<p>Voil\u00c3\u00a0 un programme peu r\u00c3\u00a9jouissant, mais qui incite tout de m\u00c3\u00aame \u00c3\u00a0 revoir les consignes de bases \u00c3\u00a0 donner \u00c3\u00a0 tous ces internautes d\u00c3\u00a9butants que nous recevons dans nos EPN.<\/p>\n<blockquote><p><em>L&rsquo;article d\u00c3\u00a9taill\u00c3\u00a9 <\/em>: <a href=\"http:\/\/www.generation-nt.com\/symantec-tendances-securite-menaces-actualite-913581.html\">http:\/\/www.generation-nt.com\/symantec-tendances-securite-menaces-actualite-913581.html<\/a><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Symantec dresse le panorama des principales tendances de s\u00c3\u00a9curit\u00c3\u00a9 \u00c3\u00a0 surveiller de pr\u00c3\u00a8s en 2010. Un antivirus ne suffit plus , compte tenu de l\u00e2\u20ac\u2122intensification des menaces polymorphes et de l\u00e2\u20ac\u2122explosion des variantes uniques&#46;&#46;&#46;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,7],"tags":[36,41,77],"class_list":["post-2148","post","type-post","status-publish","format-standard","hentry","category-autour-du-web","category-societe","tag-reseaux","tag-securite","tag-technique"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/guy.pastre.org\/index.php?rest_route=\/wp\/v2\/posts\/2148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guy.pastre.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/guy.pastre.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/guy.pastre.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/guy.pastre.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2148"}],"version-history":[{"count":3,"href":"https:\/\/guy.pastre.org\/index.php?rest_route=\/wp\/v2\/posts\/2148\/revisions"}],"predecessor-version":[{"id":2150,"href":"https:\/\/guy.pastre.org\/index.php?rest_route=\/wp\/v2\/posts\/2148\/revisions\/2150"}],"wp:attachment":[{"href":"https:\/\/guy.pastre.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guy.pastre.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/guy.pastre.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}