Government Technology

    Digital Communities
    Industry Members

  • Click sponsor logos for whitepapers, case studies, and best practices.
  • McAfee

2010 Cyber-Threat Forecast Sees Hacks Growing in Sophistication and Reach



December 31, 2009 By

The new year will usher in some interesting new changes in the world of malware and cyber-attacks, according to one company's predictions for 2010.

Watchful eyes will have to be kept on mobile phone apps, Google Wave accounts, file sharing and peer-to-peer networks -- cyber-criminals will target those in greater numbers, according to predictions released by Kaspersky Labs, a provider of Internet threat management solutions for combating malware.

As technology touches more lives, the bad guys will see more opportunities.

"Given the growing sophistication of threats -- it's no longer just an e-mail saying, 'Please click on this attachment,' and you get infected with something -- the schemes are much more elaborate than that," said Roel Schouwenberg, the company's senior malware researcher.

Released Dec. 16, the company's predictions and findings on 2010's greatest cyber-threats and new attack vectors may be a wake-up call for some.

"A lot of things that are happening are happening invisibly, and people will not notice anything until they see that they have lost money or that their identity has been stolen," Schouwenberg said.

The forecast is divided into six predictions about the threats of tomorrow:

o more interest in attacking via Google Wave accounts as the technology is used more;

o more attacks on iPhone and Android mobile platforms as they become more popular;

o more attacks from file sharing networks instead of from Web sites and applications;

o more mass malware epidemics being spread through peer-to-peer networks;

o less distribution of fake anti-virus programs as the market for this type of attack has been saturated and IT security professionals have been more diligent in cracking down on it; and

o more criminals providing malware traffic -- using botnets to send spam, distribute malware or performing denial-of-service attacks -- as a paid service for other criminals in subtle ways without actually committing crimes.

This means the good guys might have a tougher time fighting the good fight.

"Malware will continue to further its sophistication in 2010, with specific malware families requiring significant resources from anti-malware companies to adequately fight them," Schouwenberg said in a statement.

Although these attacks might become more pervasive, their growth could be mitigated by workplace policies that restrict or modify social networking and the usage of mobile devices while on the job.

"I'm quite sure that governments are a lot more strict about what kind of smartphones -- or phones in general -- may run compared to the average business," Schouwenberg said. "That goes for attacks on social networks. Some government agencies have social networks blocked."


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Digital Cities & Counties Survey: Best Practices Quick Reference Guide
This Best Practices Quick Reference Guide is a compilation of examples from the 2013 Digital Cities and Counties Surveys showcasing the innovative ways local governments are using technological tools to respond to the needs of their communities. It is our hope that by calling attention to just a few examples from cities and counties of all sizes, we will encourage further collaboration and spark additional creativity in local government service delivery.
Wireless Reporting Takes Pain (& Wait) out of Voting
In Michigan and Minnesota counties, wireless voting via the AT&T network has brought speed, efficiency and accuracy to elections - another illustration of how mobility and machine-to-machine (M2M) technology help governments to bring superior services and communication to constituents.
Why Would a City Proclaim Their Data “Open by Default?”
The City of Palo Alto, California, a 2013 Center for Digital Government Digital City Survey winner, has officially proclaimed “open” to be the default setting for all city data. Are they courageous or crazy?
View All