Latest Podcast



Featured Articles

Wednesday, December 29, 2010

McAfee Labs expects geolocation, mobile devices and Apple to top the list of targets for new threats next year

Online security company McAfee has published its 2011 Threat Predictions report, detailing the new internet-related threats its researchers expect to see next year – and some have a decidedly mobile flavour.

Vincent Weafer, senior vice president of McAfee Labs, said “We’ve seen significant advancements in device and social network adoption, placing a bulls-eye on the platforms and services users are embracing the most. These platforms and services have become very popular in a short amount of time, and we’re already seeing a significant increase in vulnerabilities, attacks and data loss.”

The McAfee Labs Threat Predictions for 2011 are:

Exploiting Social Media: URL-shortening services
Social media sites such as Twitter and Facebook have created the movement toward an ‘instant’ form of communication, a shift that will completely alter the threat landscape in 2011. Of the social media sites that will be most riddled with cybercriminal activity, McAfee Labs expects those with URL-shortening services will be at the forefront. The use of abbreviated URLs on sites like Twitter makes it easy for cybercriminals to mask and direct users to malicious websites. With more than 3,000 shortened URLs per minute being generated, McAfee Labs expects to see a growing number used for spam, scamming and other malicious purposes.

Exploiting Social Media: Geolocation services
Locative services such as foursquare, Gowalla and Facebook Places can easily search, track and plot the whereabouts of friends and strangers. In just a few clicks, cybercriminals can see in real time who is tweeting, where they are located, what they are saying, what their interests are, and what operating systems and applications they are using. This wealth of personal information on individuals enables cybercriminals to craft a targeted attack. McAfee Labs predicts that cybercriminals will increasingly use these tactics across the most popular social networking sites in 2011.

Mobile: Usage is rising in the workplace, and so will attacks
Threats on mobile devices have so far been few and far between, as ‘jailbreaking’ on the iPhone and the arrival of Zeus were the primary mobile threats in 2010. With the widespread adoption of mobile devices in business environments, combined with historically fragile cellular infrastructure and slow strides toward encryption, McAfee Labs predicts that 2011 will bring a rapid escalation of attacks and threats to mobile devices, putting user and corporate data at very high risk.

Apple: No longer flying under the radar
Historically, the Mac OS platform has remained relatively unscathed by malicious attackers, but McAfee Labs warns that Mac-targeted malware will continue to increase in sophistication in 2011. The popularity of iPads and iPhones in business environments, combined with the lack of user understanding of proper security for these devices, will increase the risk for data and identity exposure, and will make Apple botnets and Trojans a common occurrence.

Applications: Privacy leaks — from your TV
New Internet TV platforms were some of the most highly-anticipated devices in 2010. Due to the growing popularity among users and ‘rush to market’ thinking by developers, McAfee Labs expects an increasing number of suspicious and malicious apps for the most widely deployed media platforms, such as Google TV. These apps will target or expose privacy and identity data, and will allow cybercriminals to manipulate a variety of physical devices through compromised or controlled apps, eventually raising the effectiveness of botnets.

Sophistication Mimics Legitimacy: Your next computer virus could be from a friend
Malicious content disguised as personal or legitimate emails and files to trick unsuspecting victims will increase in sophistication in 2011. ‘Signed’ malware that imitates legitimate files will become more prevalent, and “friendly fire,” in which threats appear to come from your friends but in fact are viruses such as Koobface or VBMania, will continue to grow as an attack of choice by cybercriminals. McAfee Labs expects these attacks will go hand in hand with the increased abuse of social networks, which will eventually overtake email as a leading attack vector.

Botnets: The new face of Mergers & Acquisitions
Botnets continue to use a seemingly infinite supply of stolen computing power and bandwidth around the globe. Following a number of successful botnet takedowns, including Mariposa, Bredolab and specific Zeus botnets, botnet controllers must adjust to the increasing pressure cybersecurity professionals are placing on them. McAfee Labs predicts that the recent merger of Zeus with SpyEye will produce more sophisticated bots due to improvements in bypassing security mechanisms and law enforcement monitoring. Additionally, McAfee Labs expects to see a significant botnet activity in the adoption of data-gathering and data-removal functionality, rather than the common use of sending spam.

Hacktivism: Following the WikiLeaks path
Next year marks a time in which politically motivated attacks will proliferate and new sophisticated attacks will appear. More groups will repeat the WikiLeaks example, as hacktivism is conducted by people claiming to be independent of any particular government or movement, and will become more organized and strategic by incorporating social networks in the process. McAfee Labs believes hacktivism will become the new way to demonstrate political positions in 2011 and beyond.

Advanced Persistent Threats: A whole new category
Operation Aurora gave birth to the new category of advanced persistent threat (APT)— a targeted cyberespionage or cybersabotage attack that is carried out under the sponsorship or direction of a nation-state for something other than pure financial/criminal gain or political protest. McAfee Labs warns that companies of all sizes that have any involvement in national security or major global economic activities should expect to come under pervasive and continuous APT attacks that go after email archives, document stores, intellectual property repositories and other databases.

A full copy of the 2011 Threat Predictions report is available from McAfee Labs.

Print
Author: The Fonecast
0 Comments
Rate this article:
No rating

Leave a comment

This form collects your name, email, IP address and content so that we can keep track of the comments placed on the website. For more info check our Privacy Policy and Terms Of Use where you will get more info on where, how and why we store your data.
Add comment

Opinion Articles

How AI technology is transforming the smartphone experience

How AI technology is transforming the smartphone experience

From improved performance to personalized recommendations, AI is enhancing the functionality and usability of smartphones for users

By incorporating advanced algorithms and machine learning capabilities, AI can help to optimize a smartphone's performance, providing users with a faster, more efficient and user-friendly experience.
Author: The Fonecast
0 Comments
Article rating: No rating
Whatever happened to all my tech?

Whatever happened to all my tech?

Mark Bridge revisits his mobile technology reviews

Mark Bridge writes:

I've been taking a look back at the devices I've written about during the past few years. Some are still faithful companions, others... well, let's just say my faith was misplaced.
Author: The Fonecast
0 Comments
Article rating: No rating

Predictions for 2016: Network Function Virtualisation, 4G throttling and video calling

Mark Windle, head of marketing at OpenCloud, predicts that this year’s reduction in the number of traditional telecoms operators in some countries will provide an opportunity for other operators to innovate and capture market share in 2016.

He says next year will be a year of rapid change for telecoms… whether it’s MVNO disruption, competitive tariff pricing or simply defence from the ‘dark art’ of hacking.

Author: The Fonecast
0 Comments
Article rating: No rating
Kapture review: the audio-recording wristband

Kapture review: the audio-recording wristband

A 'recording watch' that links to your smartphone

Mark Bridge writes:

The most memorable moments in life often go unrecorded. You don't have your camera in your hands. Your finger is still hovering over the 'pause' button on your audio recorder. Or you were simply too busy experiencing whatever was happening. It's all about the one that got away.

That's where Kapture can help.

Author: The Fonecast
4 Comments
Article rating: 4.0
Making mobile websites work better

Making mobile websites work better

Device detection and responsive design explained

Mark Bridge writes:

James Rosewell shows me a colourful roll of paper that's the width of an iPhone but well over three metres long. When I look closer, I can see it's a printed copy of the Wall Street Journal's mobile website. That's a lot of scrolling to do... and a pretty unfriendly user experience for anyone reading the news online. Why does it work so badly?

Author: The Fonecast
1 Comments
Article rating: 4.0
RSS
123578910Last

Recent Podcasts

A podcast packed with smartphones galore... from Samsung, Sony, Microsoft and Motorola

Podcast - 10th September 2014

James Rosewell and Mark Bridge return from their summer break with a podcast full of smartphones and smart watches.

As well as products from Samsung, Sony, Microsoft, Motorola, HTC and Kazam, there's talk of Opera's new browser deal, a potential change on the UK high street... and a mobile app that connects to a Bluetooth toothbrush for improved toothpaste coverage.

Author: The Fonecast
0 Comments
Article rating: No rating

We review the CAT B100 rugged mobile phone

Podcast - 30th July 2014

Mark Bridge takes an in-depth look at the CAT B100 rugged phone from Bullitt Mobile.

The CAT B100 is designed to withstand rather more than everyday bumps and knocks - which is why Mark drops his mobile phone on the pavement, submerges it in his washing-up bowl and shuts it in the freezer.

Author: The Fonecast
0 Comments
Article rating: No rating

Microsoft cuts its mobile staff, Apple finds a new partner and Yahoo! makes an acquisition

Podcast - 23rd July 2014

We start this week's podcast with news that thousands of Microsoft's ex-Nokia employees are losing their jobs.

Other topics for discussion include the new Apple and IBM partnership, Yahoo's acquisition of Flurry, regulating mobile games, improving rural mobile coverage, BT's new phone service and some management movements.

Author: The Fonecast
0 Comments
Article rating: No rating

Florent Stroppa of OnMobile talks about the state of the mobile telecom industry, from network deals to smart wearables

Podcast - 18th July 2014

In this podcast Mark Bridge talks to Florent Stroppa from mobile value-added service specialist OnMobile about the state of the mobile industry in 2014.

They discuss the dominance of Apple and Samsung, network consolidation, the new Amazon Fire smartphone, smart wearables and much more.

Author: The Fonecast
0 Comments
Article rating: No rating

National security, phones for children, a new UK mobile network and a change of name

Podcast - 16th July 2014

This week's mobile industry podcast begins with a quick look at the UK government's emergency legislation affecting fixed-line, mobile phone and broadband traffic.

We then talk about Microsoft's plans, a new virtual network from the Post Office, Samsung's renamed app store, budget 4G smartphones, a wearable phone for children and some misleading advertising.

Author: The Fonecast
0 Comments
Article rating: No rating
RSS
123578910Last

Follow thefonecast.com

Twitter @TheFonecast RSS podcast feed
Find us on Facebook Subscribe free via iTunes

Archive Calendar

«May 2024»
MonTueWedThuFriSatSun
293012345
6789101112
13141516171819
20212223242526
272829303112
3456789

Archive

Terms Of Use | Privacy Statement