Top 10 security threats of 2010

We list our top 10 threats of 2010 and their impact on the security industry as a whole.

Mariposa was a sign of good things to come in terms of takedowns in the botnet sphere. Whilst such malicious networks had undoubtedly been causing havoc before 2010, but this year law enforcement really upped its game.

Bredolab was certainly one of the largest botnets ever seen, having over 30 million systems in its grasp.

In a high point for police and the IT security industry at large, Dutch police disconnected 143 servers which were helping run the botnet. Subsequently, Armenian police arrested a man believed to be the mastermind behind the operation.

6. Mac threats

2010 was surely the year when security professionals tried their hardest to dispel the myth that Macs are impenetrable machines. This was highlighted by a number of specialist Mac security offerings launched this year, including those from McAfee and Panda Security.

The latter released a report indicating Mac OS vulnerabilities had increased more than five-fold in less than a year. Elsewhere, a Mac version of the infamous Koobface worm was discovered for the first time.

The evidence indicated Mac users are indeed safer than PC users, but what is clear is that hackers will go where the users are. As the number of Apple acolytes escalates, so will the number of threats facing their systems. The same goes for other operating systems and machines as well.

5. Facebook scams

As expected, social networks were a big target for cyber criminals in 2010. Facebook, being the most popular such service, was always going to be a hotbed for scammers trying out their luck.

One of the more concerning threats emerged at the start of the year, when hackers posed as Facebook officials to obtain user login details.

Many scams were based around celebrities one of them focusing on a picture of a supposedly aroused Justin Bieber. Others looked to entice the slightly more disturbed minds on Facebook, offering particularly macabre content.

It's depressing, but expect to see this kind of threat sticking around as hackers have discovered they can make money from surveys that users are directed to as they hunt for seedy content.

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Recommended

Safari bug lets websites track browsing activity and unique identifiers
web browser

Safari bug lets websites track browsing activity and unique identifiers

18 Jan 2022
El Salvador becomes latest target of Pegasus spyware
spyware

El Salvador becomes latest target of Pegasus spyware

13 Jan 2022
Mac shipments grew at twice the pace of PCs in 2021
Hardware

Mac shipments grew at twice the pace of PCs in 2021

13 Jan 2022
Google banned from importing patent-infringing tech following Sonos IP victory
Policy & legislation

Google banned from importing patent-infringing tech following Sonos IP victory

7 Jan 2022

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022
Hired by machines: Exploring recruitment's machine-driven future
recruitment

Hired by machines: Exploring recruitment's machine-driven future

8 Jan 2022