Security threats to beware in 2011

We take a look ahead to what threats await us in 2011.

Many predicted social networks would become virtual playgrounds for hackers in 2010 and they were right. Disconcertingly, 2011 looks likely to get even worse, according to a wide range of security experts.

Joona Airamo, chief information security officer at Stonesoft, warned one attack could affect millions of users.

"Hackers will use malware that copies a user's address book and sends out malicious emails/files to all their friends," he said.

"Just like the old email scams, the malicious file will look like it has been sent from the initial target so recipients will trust the source."

Advertisement
Advertisement - Article continues below

Given the introduction of Facebook Messages, an attack like the one Airamo outlined could become even more widespread. With some hope, Zuckerberg and Co will be on their security game to protect users.

Social engineering will continue to be big in 2011 in general, with Trend Micro claiming cyber criminals will launch malware campaigns by bombarding unwitting users with emails that "drop downloaders" containing malware.

Rising zero-days

In 2010, zero-day threats were disturbingly common, affecting various pieces of much-used technology, including Adobe Reader, Windows and Internet Explorer.

This year, expect to see plenty more such sudden dangers and vendors scrambling to issue fixes.

"Zero-day vulnerabilities are widely considered something of a common occurrence. Sadly, that trend is set to continue in 2011, with zero-day threats becoming even more prevalent," said Kaspersky's Gostev.

"The rise in malicious exploits that seize on programming errors won't just be down to new vulnerabilities they will also occur because of the speed at which cyber criminals react to such loopholes."

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019