8 Security Trends For 2010
Sign in

8 Security trends for 2010

1. Web 2.0 attacks will increase in sophistication

In the coming year, Websense Security Labs predicts a greater volume of spam and attacks on the social Web and real-time search engines such as Topsy.com, Google and Bing.com. Spammers and hackers use of Web 2.0 sites have been successful because of the high level of trust users place in the platforms and the other users. The security firm anticipates this trend to continue in 2010.

2. Botnet gangs to fight turf wars

In the past year, Websense Security Labs noted an increase in botnet groups following each other and using similar spam/Web campaigns tactics such as fake DHL and USPS notifications and other copy-cat behavior. We expect this to continue in 2010. In addition, we anticipate more aggressive behavior between different botnet groups including bots with the ability to detect and actively uninstall competitor bots.

3. Email to become top vector for malicious attacks

In 2010, email used as a vector for spreading malicious attacks will evolve in sophistication. During 2009, Websense Security Labs saw a huge uptake in emails being used to spread files and deliver Trojans as email attachments, after being nearly non-existent for several years.

4. Targeted attacks on Microsoft properties

With the expected fast adoption of Windows 7, we will see more malicious attacks targeting the new operating system with specific tricks to bypass User Access Control warnings, and greater exploitation of Internet Explorer 8. The User Access Control in Vista was originally implemented to prevent malware from making permanent changes to the system such as startup files.

5. Don't trust your Search results

A malicious SEO poisoning attack, also known as a Blackhat SEO attack, occurs when hackers compromise search engine results to make their links appear higher than legitimate results. As a user searches for related terms, the infected links appear near the top of the search results, generating a greater number of clicks to malicious Web sites. In the last year, attackers have used this technique to poison search results on everything from MTV VMA awards and Google Wave invites, to iPhone SMS features and Labor Day sales.

6. Smartphones: Hackers' next playground

At the end of 2009 Websense Security Labs documented four iPhone exploits in a span of a few weeks -- representing the first major attacks on the iPhone platform and the first iPhone data-stealing malware with bot functionality. Smartphones such as the iPhone and Android, which are used increasingly for business purposes, are essentially miniature personal computers and in 2010 will face the same types of attacks that target traditional computing.

7. Malvertising gains

In a high-profile incident in 2009, visitors to the New York Times Web site saw a pop-up box warning them of a virus that directed them to an offer for antivirus software, which was actually rogue AV. This attack was served up through an advertisement purchased by someone posing as a national advertiser.

The successful attack was a worthwhile investment for the criminals and so in 2010 more malicious ads will be legitimately purchased by the bad guys.

8. Macs no longer immune to exploits

Hackers have noticed Apple's rapid growth in market share in both the consumer and corporate segments. There exists additional risk for Mac users because many assume Macs are immune to security threats and therefore employ less security measures and patches, so attackers have additional incentive to go after the OS X platform. During 2009, Apple released six large security updates for Macs showing the potential for attacks. In 2010, there will be even more security updates as hackers ramp up attacks targeting the platform. There is also the potential for the first drive-by malware created to target Apple's Safari browser.
prevnew
start_blog_img