Kaspersky Lab, a Russian company specializing in e-security, expects to see more cyber attacks on networks, routers and "modems" in 2019, the French newspaper La Tribune reported on its Web site.

"These attacks will be difficult to detect, and bad habits for users of new products will make it even more difficult," said Kaspersky Lab security researcher Yasati Adiyaz.

He added in his report that the level of attacks reached the extent that can no longer be ignored, and the example of malware called the "Vpn filter" (vpn filter), which was revealed in May after it hit fifty thousand routers Worldwide, this software aims to collect intelligence, as well as disable devices.

The attacks are also geopolitical: they have embarrassed some governments to speak out about ways to protect themselves and respond to them, and the victim states have now adopted a phishing strategy, ensuring a better position in negotiations on the issue, especially when The attack is, for example, attributed to a group of pirates who are allegedly out of state control.

The fear of piracy is the most important success of these infiltrators, and they can now exploit this fear, suspicion and suspicion, which occurs in a more subtle way, increasing this panic and turmoil.

In 2019, new pirates will emerge from Southeast Asia and the Middle East, according to Kaspersky's report.

The report states that the Shadow Brokers group published in 2016 some of the tools used by the US National Security Intelligence Agency.

The year 2019 is also known as the Year of Phishing, an attack technique that targets a specific person or company to obtain personal or confidential information via SMS and e-mail.

Although the technology is very effective, it will become more important in the future, because it is based primarily on user curiosity and on the massive leaks that are released through social networking platforms like Facebook and Instagram.

The report pointed to the leak of data about 50 million users to Facebook this year, pointing out that it is available in the Internet, and can be exploited by hackers.

Finally, the report points to the emergence of new hackers from Southeast Asia and the Middle East using a variety of methods to obtain sensitive information. As Internet users enhance their protection, these groups improve and develop their tools and seek to expand their areas of influence.

Nevertheless, Adiyaz concludes that the presence of hundreds of highly effective anti-piracy tools will limit many of these cyber attacks to making them virtually impossible in the future.