Security threats to beware in 2011

We take a look ahead to what threats await us in 2011.

Whilst Windows will remain the chief target for hackers, in terms of operating systems, cyber criminals will look to spread their net further as Microsoft's market share is eaten away by the likes of Apple's different offerings.

Already this year there has been a significant rise in malware targeting Apple users and a specialist version of the notorious Koobface worm was spotted.

"As the Apple OS becomes more commonly used, there will be a nasty worm or virus which is going to target it specifically," said Stonesoft's Airamo.

Of course, Windows will remain the central target for hackers given the dominance it has over competitors, but there will be a change in tactics amongst cyber criminals, explained David Harley, senior research fellow at ESET.

Advertisement
Advertisement - Article continues below

"While there won't be a big shift towards specific targeting of other operating systems, as more people start using them, there will be increased interest in finding weaknesses." Harley said.

Mobile and consumerisation

As workers get increasingly mobile and as they use the same device for personal and business use, the more threats IT administrators are likely to face.

The fact is, with manufacturers like Apple, Google and Microsoft trying to cater to both businesses and consumers, and with the move to the cloud, people are entering the workspace expecting to be able to use a range of devices for work and pleasure.

"With the blurring of the lines between business and personal use, the increased sophistication of the devices and the consolidation of mobile platforms, it is inevitable that attackers will key in on mobile devices in 2011 and mobile devices will become a leading source of confidential data loss," Symantec said in a blog post.

In a Symantec survey, over half of respondents said they will install security software on their mobile device in the future, so at least some are realising the threat facing smartphones and tablets.

Hopefully, 2011 will also be the year when everyone begins to understand the importance of securing their companies' and their own data.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/business/business-strategy/354252/huawei-takes-the-us-trade-sanctions-into-its-own-hands
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019