Security threats to beware in 2011

We take a look ahead to what threats await us in 2011.

Whilst Windows will remain the chief target for hackers, in terms of operating systems, cyber criminals will look to spread their net further as Microsoft's market share is eaten away by the likes of Apple's different offerings.

Already this year there has been a significant rise in malware targeting Apple users and a specialist version of the notorious Koobface worm was spotted.

"As the Apple OS becomes more commonly used, there will be a nasty worm or virus which is going to target it specifically," said Stonesoft's Airamo.

Of course, Windows will remain the central target for hackers given the dominance it has over competitors, but there will be a change in tactics amongst cyber criminals, explained David Harley, senior research fellow at ESET.

"While there won't be a big shift towards specific targeting of other operating systems, as more people start using them, there will be increased interest in finding weaknesses." Harley said.

Mobile and consumerisation

As workers get increasingly mobile and as they use the same device for personal and business use, the more threats IT administrators are likely to face.

The fact is, with manufacturers like Apple, Google and Microsoft trying to cater to both businesses and consumers, and with the move to the cloud, people are entering the workspace expecting to be able to use a range of devices for work and pleasure.

"With the blurring of the lines between business and personal use, the increased sophistication of the devices and the consolidation of mobile platforms, it is inevitable that attackers will key in on mobile devices in 2011 and mobile devices will become a leading source of confidential data loss," Symantec said in a blog post.

In a Symantec survey, over half of respondents said they will install security software on their mobile device in the future, so at least some are realising the threat facing smartphones and tablets.

Hopefully, 2011 will also be the year when everyone begins to understand the importance of securing their companies' and their own data.

Featured Resources

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures

Download now

The role of modern storage in a multi-cloud future

Research exploring the impact of modern storage in defining cloud success

Download now

Enterprise data protection: A four-step plan

An interactive buyers’ guide and checklist

Download now

The total economic impact of Adobe Sign

Cost savings and business benefits enabled by Adobe Sign

Download now

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
malware

Google removes 17 apps infected with evasive ‘Joker’ malware

28 Sep 2020