
Other than that, the program ensures free video and conference calls online. Easy download and installing is among the main benefits of the Skype software. Zennstrom and Friss’s invention introduces voice communication of exceptional quality to any user having Internet connection all over the world.

However, the software owners were not satisfied with the number of registered users because of poor revenues received from the service. Three years later, about 276 million users all over the world communicated via Skype using free video and voice calls. At the end of 2005, Skype was purchased by eBay for assisting the company to increase the number of users, as well as extend its revenues (Mohr et al., 2009). The emergence and development of Skype dates back to 2003 when Janus Friss and Niklas Zennstrom founded the communication system (Mohr et al., 2009). What is more important is that Skype allows communicating with friends and relatives for free. Instant messages are also possible and, people can communicate freely regardless of the distance and location. Finally, we describe our speculative observations on future research directions.The software has a number of useful functions ensuring successful information exchange, including video calling, conference calling, calling from ordinary phones and calling from Skype to telephones (Skype, 2012).

We then discuss new attack patterns in emerging technologies such as social media, cloud computing, smartphone technology, and critical infrastructure. This is followed by critiques of existing state-of-the-art mitigation techniques as why they do or don't work. To assist in achieving this goal, we first present an overview of the most exploited vulnerabilities in existing hardware, software, and network layers. The development of more innovative and effective malware defense mechanisms has been regarded as an urgent requirement in the cybersecurity community.

Malware is the primary choice of weapon to carry out malicious intents in the cyberspace, either by exploitation into existing vulnerabilities or utilization of unique characteristics of emerging technologies. The exponential growth of the Internet interconnections has led to a significant growth of cyber attack incidents often with disastrous and grievous consequences.
