Top 10 security threats of 2010
We list our top 10 threats of 2010 and their impact on the security industry as a whole.
4. Unprotected Wi-Fi exploits
Despite data security concerns growing in prominence amongst non-IT people, the fact is many clearly still used unprotected Wi-Fi networks throughout 2010.
This was brought to light by one hacker, who created the Firesheep tool. This sniffed out login credentials for social networking sites from users on unprotected Wi-Fi hotspots. Worryingly, the tool was downloaded over 100,000 times in the first 24 hours following its launch and even spawned a copycat add-on in the form of something charmingly called 'idiocy.'
There was also the little matter of Google taking data over unprotected Wi-Fi networks during its Street View project, but that was accidental according to the search firm. Nevertheless, the point is, everyone should stick to using secured networks and nothing else.
Zeus, in its various guises, remained a major threat in 2010. Banks were the target and in August it emerged an unnamed UK financial institution had been hit, with 3,000 customer accounts compromised and 675,000 stolen between 5 July and 6 August.
Startlingly, earlier in the year, an RSA study indicated almost nine in 10 Fortune 500 companies in the US had
In better news for the good guys, the Police Central e-Crime Unit officers arrested 19 people suspected of being involved in a multi-million pound bank account theft that used Zeus.
Distributed Denial of Service (DDoS) attacks have been around for years. Everyone knows the deal in layman's terms - you make so many requests for a website that it fails to function.
What led us to include DDoS strikes in the top 10 list was its use in the WikiLeaks saga. As a result of the myriad attacks on both WikiLeaks itself and against organisations refusing to support Julian Assange and Co, the wider public became aware of what DDoS actually was.
Rarely does a threat become common knowledge outside of the tech industry and for this reason alone, this old threat was a big deal in 2010.
Stuxnet was actually let loose in 2009, but it wasn't detected until 2010. When it was finally found, it caused some serious ripples in the security industry.
The fact it took advantage of four different exploits - something unprecedented according to most experts in the field - was just half the story.
Once people had dug under the surface, it became clear Stuxnet was almost certainly the work of a nation state. After researchers discovered it was going after controls at industrial plants and a number of officials in Iran hinted their nuclear operations had been hit, it was clear this was a game changer.
Whilst it was not the most prevalent threat of 2010, what it did was change the security landscape forever, perhaps more than any other piece of malicious kit that has come before.
In This Article
2021 Thales access management index: Global edition
The challenges of trusted access in a cloud-first worldFree download
Transforming higher education for the digital era
The future is yoursFree download
Building a cloud-native, hybrid-multi cloud infrastructure
Get ready for hybrid-multi cloud databases, AI, and machine learning workloadsFree download
The next biggest shopping destination is the cloud
Know why retail businesses must move to the cloudFree Download