Latest Podcast



Featured Articles

Wednesday, December 29, 2010

McAfee Labs expects geolocation, mobile devices and Apple to top the list of targets for new threats next year

Online security company McAfee has published its 2011 Threat Predictions report, detailing the new internet-related threats its researchers expect to see next year – and some have a decidedly mobile flavour.

Vincent Weafer, senior vice president of McAfee Labs, said “We’ve seen significant advancements in device and social network adoption, placing a bulls-eye on the platforms and services users are embracing the most. These platforms and services have become very popular in a short amount of time, and we’re already seeing a significant increase in vulnerabilities, attacks and data loss.”

The McAfee Labs Threat Predictions for 2011 are:

Exploiting Social Media: URL-shortening services
Social media sites such as Twitter and Facebook have created the movement toward an ‘instant’ form of communication, a shift that will completely alter the threat landscape in 2011. Of the social media sites that will be most riddled with cybercriminal activity, McAfee Labs expects those with URL-shortening services will be at the forefront. The use of abbreviated URLs on sites like Twitter makes it easy for cybercriminals to mask and direct users to malicious websites. With more than 3,000 shortened URLs per minute being generated, McAfee Labs expects to see a growing number used for spam, scamming and other malicious purposes.

Exploiting Social Media: Geolocation services
Locative services such as foursquare, Gowalla and Facebook Places can easily search, track and plot the whereabouts of friends and strangers. In just a few clicks, cybercriminals can see in real time who is tweeting, where they are located, what they are saying, what their interests are, and what operating systems and applications they are using. This wealth of personal information on individuals enables cybercriminals to craft a targeted attack. McAfee Labs predicts that cybercriminals will increasingly use these tactics across the most popular social networking sites in 2011.

Mobile: Usage is rising in the workplace, and so will attacks
Threats on mobile devices have so far been few and far between, as ‘jailbreaking’ on the iPhone and the arrival of Zeus were the primary mobile threats in 2010. With the widespread adoption of mobile devices in business environments, combined with historically fragile cellular infrastructure and slow strides toward encryption, McAfee Labs predicts that 2011 will bring a rapid escalation of attacks and threats to mobile devices, putting user and corporate data at very high risk.

Apple: No longer flying under the radar
Historically, the Mac OS platform has remained relatively unscathed by malicious attackers, but McAfee Labs warns that Mac-targeted malware will continue to increase in sophistication in 2011. The popularity of iPads and iPhones in business environments, combined with the lack of user understanding of proper security for these devices, will increase the risk for data and identity exposure, and will make Apple botnets and Trojans a common occurrence.

Applications: Privacy leaks — from your TV
New Internet TV platforms were some of the most highly-anticipated devices in 2010. Due to the growing popularity among users and ‘rush to market’ thinking by developers, McAfee Labs expects an increasing number of suspicious and malicious apps for the most widely deployed media platforms, such as Google TV. These apps will target or expose privacy and identity data, and will allow cybercriminals to manipulate a variety of physical devices through compromised or controlled apps, eventually raising the effectiveness of botnets.

Sophistication Mimics Legitimacy: Your next computer virus could be from a friend
Malicious content disguised as personal or legitimate emails and files to trick unsuspecting victims will increase in sophistication in 2011. ‘Signed’ malware that imitates legitimate files will become more prevalent, and “friendly fire,” in which threats appear to come from your friends but in fact are viruses such as Koobface or VBMania, will continue to grow as an attack of choice by cybercriminals. McAfee Labs expects these attacks will go hand in hand with the increased abuse of social networks, which will eventually overtake email as a leading attack vector.

Botnets: The new face of Mergers & Acquisitions
Botnets continue to use a seemingly infinite supply of stolen computing power and bandwidth around the globe. Following a number of successful botnet takedowns, including Mariposa, Bredolab and specific Zeus botnets, botnet controllers must adjust to the increasing pressure cybersecurity professionals are placing on them. McAfee Labs predicts that the recent merger of Zeus with SpyEye will produce more sophisticated bots due to improvements in bypassing security mechanisms and law enforcement monitoring. Additionally, McAfee Labs expects to see a significant botnet activity in the adoption of data-gathering and data-removal functionality, rather than the common use of sending spam.

Hacktivism: Following the WikiLeaks path
Next year marks a time in which politically motivated attacks will proliferate and new sophisticated attacks will appear. More groups will repeat the WikiLeaks example, as hacktivism is conducted by people claiming to be independent of any particular government or movement, and will become more organized and strategic by incorporating social networks in the process. McAfee Labs believes hacktivism will become the new way to demonstrate political positions in 2011 and beyond.

Advanced Persistent Threats: A whole new category
Operation Aurora gave birth to the new category of advanced persistent threat (APT)— a targeted cyberespionage or cybersabotage attack that is carried out under the sponsorship or direction of a nation-state for something other than pure financial/criminal gain or political protest. McAfee Labs warns that companies of all sizes that have any involvement in national security or major global economic activities should expect to come under pervasive and continuous APT attacks that go after email archives, document stores, intellectual property repositories and other databases.

A full copy of the 2011 Threat Predictions report is available from McAfee Labs.

Print
Author: The Fonecast
0 Comments
Rate this article:
No rating

Leave a comment

This form collects your name, email, IP address and content so that we can keep track of the comments placed on the website. For more info check our Privacy Policy and Terms Of Use where you will get more info on where, how and why we store your data.
Add comment

Opinion Articles

Last week at The Fonecast: 5th June 2012

Don't expect a positive answer from the Oracle

Mark Bridge writes:

Here in the UK, we have a double Bank Holiday weekend to celebrate the Queen’s Diamond Jubilee. That means two days away from work for many of us (and also two days of unseasonably bad weather, according to tradition).

In fact, the three of us at The Fonecast are celebrating our own anniversary this month. It’s been six years since we started podcasting about the mobile phone industry. We’ll be revisiting some of those early programmes - and the biggest mobile news headlines from 2006 - in this week’s podcast on Wednesday.

Author: The Fonecast
0 Comments
Article rating: 4.0

Over The Air 2012 preview

The fifth annual Over The Air event - a combination of 36-hour mobile hack day and conference - takes place at Bletchley Park on Friday 1st and Saturday 2nd June.

This year’s event is also honouring the contributions of mathematician Alan Turing to the invention of the programmable computer, code-breaking at Bletchley Park during World War 2 and developments in other scientific fields.

Author: The Fonecast
0 Comments
Article rating: 5.0

Last week at The Fonecast: 28th May 2012

Motorola gets Google, HP gets frugal

Mark Bridge writes:

Just over a week ago Motorola Mobility lost a patent-related legal case against Microsoft in the USA. A couple of days later the company was formally acquired by Google – and a few days after that it lost a patent case against Microsoft in Germany. Business as usual, you might say.

Author: The Fonecast
0 Comments
Article rating: No rating

Last week at The Fonecast: 21st May 2012

A different kind of share for Facebook CEO

Mark Bridge writes:

What a week for Facebook co-founder and CEO Mark Zuckerberg. Not content with transforming his company through its stock market flotation, he then went on to marry. What does this reveal?  Well, he’s clearly capable of multi-tasking and he’d rather wear a suit for social occasions than for work.

Author: The Fonecast
0 Comments
Article rating: 5.0

How mobile technology is keeping the BBC Olympic Torch coverage on the air

Mark Bridge writes:

A horse box and eight SIM cards. That’s the basic technology keeping the BBC’s Olympic Torch Relay broadcasts on the air and on the road.

The converted DAF horse box is being driven in front of the runners as they carry an Olympic torch along the relay route. It’s equipped with four cameras and a mixing desk, enabling a choice of views to be recorded and broadcast for 12 hours per day throughout the 70-day relay.

Author: The Fonecast
0 Comments
Article rating: No rating
RSS
First3738394042444546Last

Recent Podcasts

Reviewing our 2015 mobile industry predictions... and looking forward to 2016

Podcast - 15th January 2016

Iain Graham, James Rosewell and Mark Bridge return to review their mobile industry predictions from last year. Which mergers, partnerships and developments did they forecast correctly... and which didn’t work out as planned?

Later in the programme, the team anticipates some of the topics that will be hitting the headlines during 2016.

Author: The Fonecast
0 Comments
Article rating: No rating

Podcast from Mobile World Congress 2015

Podcast - 6th March 2015

Mark Bridge learns about the mobile technology trends at Mobile World Congress 2015 by chatting to James Rosewell of 51Degrees, Dr Kevin Curran from the IEEE and Chris Millington of Doro.

They talk about wearable devices, wireless charging, mobile operating systems and much more... including some of their favourite products from the exhibition.

Author: The Fonecast
0 Comments
Article rating: No rating

Looking back at February: from security scares to multiple MVNOs

Podcast - 27th February 2015

We're taking a look back at the biggest mobile industry news stories from February 2015, including allegations that the UK's security service tried to breach SIM card security by hacking into one of the world's biggest SIM producers.

We also talk about the planned BT and EE merger, the creation of two new UK virtual networks, some acquisitions in the mobile payment arena and a new Ubuntu smartphone.

Author: The Fonecast
0 Comments
Article rating: No rating

Interview with Chris Millington of Doro about mobile retailing, wearables and technology for older consumers

Podcast - 24th February 2015

In today's programme Mark Bridge talks to Chris Millington, who's Managing Director for Doro UK and Ireland.

They discuss the state of mobile retailing in the UK, the future of wearable devices and - as you might expect - smartphones for seniors.

Author: The Fonecast
0 Comments
Article rating: No rating

A month of mobile: O2 counts on 3, Microsoft counts to 10 and Apple counts its profits

Podcast - 30th January 2015

We're back with a month of mobile industry news, including takeover talks and takeover rumours. O2 and Three are said to be discussing a merger... but is there any truth in the suggestions that BlackBerry could be up for grabs?

We also discuss Apple's record-breaking quarterly figures, the highlights of CES and the launch of Microsoft Windows 10, as well as saying farewell to the current version of Google Glass.

Author: The Fonecast
0 Comments
Article rating: No rating
RSS
12345678910Last

Follow thefonecast.com

Twitter @TheFonecast RSS podcast feed
Find us on Facebook Subscribe free via iTunes

Archive Calendar

«July 2025»
MonTueWedThuFriSatSun
30123456
78910111213
14151617181920
21222324252627
28293031123
45678910

Archive

Terms Of Use | Privacy Statement