Security threats to beware in 2011

We take a look ahead to what threats await us in 2011.

Many predicted social networks would become virtual playgrounds for hackers in 2010 and they were right. Disconcertingly, 2011 looks likely to get even worse, according to a wide range of security experts.

Joona Airamo, chief information security officer at Stonesoft, warned one attack could affect millions of users.

"Hackers will use malware that copies a user's address book and sends out malicious emails/files to all their friends," he said.

"Just like the old email scams, the malicious file will look like it has been sent from the initial target so recipients will trust the source."

Given the introduction of Facebook Messages, an attack like the one Airamo outlined could become even more widespread. With some hope, Zuckerberg and Co will be on their security game to protect users.

Social engineering will continue to be big in 2011 in general, with Trend Micro claiming cyber criminals will launch malware campaigns by bombarding unwitting users with emails that "drop downloaders" containing malware.

Rising zero-days

In 2010, zero-day threats were disturbingly common, affecting various pieces of much-used technology, including Adobe Reader, Windows and Internet Explorer.

This year, expect to see plenty more such sudden dangers and vendors scrambling to issue fixes.

"Zero-day vulnerabilities are widely considered something of a common occurrence. Sadly, that trend is set to continue in 2011, with zero-day threats becoming even more prevalent," said Kaspersky's Gostev.

"The rise in malicious exploits that seize on programming errors won't just be down to new vulnerabilities they will also occur because of the speed at which cyber criminals react to such loopholes."

Featured Resources

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures

Download now

The role of modern storage in a multi-cloud future

Research exploring the impact of modern storage in defining cloud success

Download now

Enterprise data protection: A four-step plan

An interactive buyers’ guide and checklist

Download now

The total economic impact of Adobe Sign

Cost savings and business benefits enabled by Adobe Sign

Download now

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Nokia will replace Huawei as BT's largest 5G equipment provider
5G

Nokia will replace Huawei as BT's largest 5G equipment provider

29 Sep 2020