Sunday, October 14, 2012

Top 10 Threats for 2012

I was reading a post by Dawn Kawamoto from Daily Finance and she brought some interesting threats to discussion for 2012. Now I know 2012 is almost over, but it will be interesting to see if we see the ones that didn't widely occur in 2013. With cell phones and automobiles becoming more computerized, hackers have an even wider selection of devices to infect with viruses and other malicious threat, says Mrs. Kawamoto. Her listed top 10 threats are listed below:

Top 10 Threat Predictions for 2012:

10. Increased industrial attacks. Many industrial systems are not prepared for cyber attacks, and attackers may engage in blackmail or extortion. 

9. 'Legalized' spam. Legitimate advertisers are purchasing email lists of consumers who have authorized receipt of online ads, a move that comes as global spam volume has dropped over the past two years.

8. Hacktivism. Online activists will join forces with physical demonstrators, targeting public figures, industry leaders, and other entities.

7. Cyberwar showoffs. Countries are expected to demonstrate their cyber-war capabilities to send a message that they are not vulnerable to cyber attacks against their infrastructures (such as utilities).

6. Rogue certificates. Production of fake digitally signed certificates, which are used as a means of assuring consumers and their security software that the website they are viewing is legitimate, will increase.

5. Blinking online traffic lights. Legislative issues are expected to stall efforts to develop Internet traffic "rules of the road," which could aid in reducing instances in which hackers steer users to an unintended server.

4. Advances in operating systems directing hackers elsewhere. New security features included in the operating system will force hackers to find alternative entry points in a consumer's computer.

3. Threats to virtual currency. Hackers will increasingly target the growing use of cyber currency, which is often not encrypted, as a means to steal money and spread malware.

2. Embedded hardware. Cars, medical devices, routers, digital cameras, and other items use embedded systems designed to control specific functions. Once these embedded systems are hacked, an attacker can have complete control over the hardware, such as asking a car's GPS system to tell the hacker where you live.

1. Mobile threats bypassing PCs. Attackers will improve their craft with an eye toward launching mobile banking attacks. For example, consumers may eventually see SpyEye and Zeus, two Trojan banking attacks, migrate from the computer to the smartphone.


Cited:
Kawamoto, Dawn. 2012. Daily Finance: The Top 10 Looming Computer Security Threats of 2012. Retrieved at: http://www.dailyfinance.com/2012/01/03/the-top-10-looming-computer-security-threats-of-2012/

No comments:

Post a Comment