SlideShare a Scribd company logo
14 cyber threats!
 http://business.rediff.com/slide-show/2009/nov/25/slide-show-1-tech-beware-
                                  of-these-cyber-threats.htm
Cyber threats continue to haunt Internet users across the world. The bad news is that this
will continue to wreak havoc taking new forms and approaches.
As long as humans are programming computer code, flaws will be introduced, no matter
how thorough pre-release testing is. Microsoft's new operating system is no exception, and
as Windows 7 hits the pavement and gains traction in 2010, attackers will undoubtedly find
ways to exploit its users, says a Symantec report.
Security software scammers can take their efforts to the next level, by even hijacking users'
computers and rendering them useless. "Cyber terrorism is the next big threat for India.
Pakistani cyber criminals are able to deface 50 to 60 Indian websites a day. Though, India
leads in IT services, it is lags behind as far as cyber security is concerned," ethical hacker
Ankit Fadia said in an interview to Business Standard.
The most popular instant messaging will largely be comprised of unsolicited spam messages
containing malicious links, especially attacks aimed at compromising legitimate IM accounts.
By the end of 2010, Symantec predicts that one in 300 IM messages will contain a URL.
Symantec Corp has released its 2010 Security Predictions report. The reports states that
malicious programs are actually being created at a higher rate than good programs.
Here are 14 threats that you must be aware of. . .
1. Anti-virus is not enough
With the rise of polymorphic threats and the explosion of unique malware variants in 2009,
the industry is quickly realizing that traditional approaches to antivirus, both file signatures
and heuristic/behavioural capabilities, are not enough to protect against today's threats.
We have reached an inflection point where new malicious programs are actually being
created at a higher rate than good programs. As such, we have also reached a point where
it no longer makes sense to focus solely on analyzing malware. Instead, approaches to
security that look to ways to include all software files, such as reputation-based security,
will become key in 2010.
2. Social engineering as the primary attack vector
More attackers are going directly after the end user and attempting to trick them into
downloading malware or divulging sensitive information under the auspice that they are
doing something perfectly innocent.
Social engineering's popularity is at least in part spurred by the fact that what operating
system and Web browser rests on a user's computer is largely irrelevant, as it is the actual
user being targeted, not necessarily vulnerabilities on the machine.
Social engineering is already one of the primary attack vectors being used today, and
Symantec estimates that the number of attempted attacks using social engineering
techniques will increase in 2010.
3. Rogue security software vendors escalate their efforts
In 2010, expect to see the propagators of rogue security software scams take their efforts
to the next level, even by hijacking users' computers, rendering them useless and holding
them for ransom. A less drastic next step, however, would be software that is not explicitly
malicious, but dubious at best.
For example, Symantec has already observed some rogue antivirus vendors selling
rebranded copies of free third-party antivirus software as their own offerings. In these
cases, users are technically getting the antivirus software that they pay for, but the reality
is that this same software can actually be downloaded for free elsewhere.
4. Social networking third-party applications will be the target of fraud
With the popularity of social networking sites poised for another year of unprecedented
growth, there will be more frauds being leveraged against site users to grow. In the same
vein, expect owners of these sites to create more proactive measures to address these
threats.
As this occurs, and as these sites more readily provide third-party developer access to their
APIs, attackers will likely turn to vulnerabilities in third-party applications for users' social
networking accounts, just as we have seen attackers leverage browser plug-ins more as
Web browsers themselves become more secure.
5. Windows 7 will come into the cross-hairs of attackers
Microsoft has already released the first security patches for the new operating system. As
long as humans are programming computer code, flaws will be introduced, no matter how
thorough pre-release testing is, and the more complex the code, the more likely that
undiscovered vulnerabilities exist.
Microsoft's new operating system is no exception, and as Windows 7 hits the pavement and
gains traction in 2010, attackers will undoubtedly find ways to exploit its users.
6. Fast Flux Botnets increase
Fast flux is a technique used by some botnets, such as the Storm botnet, to hide phishing
and malicious web sites behind an ever-changing network of compromised hosts acting as
proxies.
Using a combination of peer-to-peer networking, distributed command and control, web-
based load balancing and proxy redirection, it makes it difficult to trace the botnets' original
geo-location. As industry counter measures continue to reduce the effectiveness of
traditional botnets, expect to see more using this technique being used to carry out attacks.
7.URL shortening services become the phisher's best friend
Phishers are able to disguise links that the average security conscious user might think
twice about clicking on, because users often have no idea where a shortened URL is actually
sending them, .
Symantec is already seeing a trend toward using this tactic to distribute misleading
applications and we expect much more to come. Also, in an attempt to evade antispam
filters through obfuscation, expect spammers to leverage shortened URLs shorteners to
carry out their own evil deeds.
8. Mac and mobile malware will increase
The number of attacks designed to exploit a certain operating system or platform is directly
related to that platform's market share, as malware authors are out to make money and
always want the biggest bang for their buck.
In 2009, Macs and smartphones targeted more by malware authors, for example the Sexy
Space botnet aimed at the Symbian mobile device operating system and the OSX. Iservice
Trojan targeting Mac users.
As Mac and smartphones continue to increase in popularity in 2010, more attackers will
devote time to creating malware to exploit these devices.
9. Spammers breaking the rules
As the economy continues to suffer and more people seek to take advantage of the loose
restrictions of the Can Spam Act, we'll see more organisations selling unauthorised e-mail
address lists and more less-than-legitimate marketers spamming those lists.
10. Spam volumes will fluctuate
Since 2007, spam has increased on average by 15 percent. While this significant growth in
spam e-mail may not be sustainable in the long term, it is clear that spammers are not yet
willing to give up as long an economic motive is present.
Spam volumes will continue to fluctuate in 2010 as spammers continue to adapt to the
sophistication of security software, the intervention of responsible ISPs and government
agencies across the globe.
11. Specialised malware
Highly specialised malware was uncovered in 2009 that was aimed at exploiting certain
ATMs, indicating a degree of insider knowledge about their operation and how they could be
exploited.
Expect this trend to continue in 2010, including the possibility of malware targeting
electronic voting systems, both those used in political elections and public telephone voting,
such as that connected with reality television shows and competitions.
12. CAPTCHA Technology will improve
As this happens and spammers have a more difficult time breaking CAPTCHA codes through
automated processes, spammers in emerging economies will devise a means to use real
people to manually generate new accounts for spamming, thereby attempting to bypass the
improved technology.
Symantec estimates that the individuals employed to manually create these accounts will be
paid less than 10 percent of the cost to the spammers, with the account-farmers charging
$30-40 per 1,000 accounts.
13. Instant messaging spam
As cyber criminals exploit new ways to bypass CAPTCHA technologies, instant messenger
(IM) attacks will grow in popularity. IM threats will largely be comprised of unsolicited spam
messages containing malicious links, especially attacks aimed at compromising legitimate
IM accounts.
By the end of 2010, Symantec predicts that one in 300 IM messages will contain a URL.
Also, in 2010, Symantec predicts that overall, one in 12 hyperlinks will be linked to a
domain known to be used for hosting malware.
Thus, one in 12 hyperlinks appearing in IM messages will contain a domain that has been
considered suspicious or malicious. In mid 2009, that level was 1 in 78 hyperlinks.
14. Non-English spam will increase
As broadband connection penetration continues to grow across the globe, particularly in
developing economies, spam in non-English speaking countries will increase. In some parts
of Europe, Symantec estimates the levels of localised spam will exceed 50 percent of all
spam.

More Related Content

What's hot

HinDroid
HinDroidHinDroid
HinDroid
HinDroid
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
Symantec
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
Комсс Файквэе
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising Attacks
Bee_Ware
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
Комсс Файквэе
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
Agnieszka Guźniczak-Beim
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
n|u - The Open Security Community
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
Anatoliy Tkachev
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
Комсс Файквэе
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
Symantec Italia
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
iosrjce
 
P01761113118
P01761113118P01761113118
P01761113118
IOSR Journals
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
RapidSSLOnline.com
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
delamm2
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
Symantec
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
Arrow ECS UK
 

What's hot (20)

HinDroid
HinDroidHinDroid
HinDroid
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising Attacks
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
 
P01761113118
P01761113118P01761113118
P01761113118
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 

Viewers also liked

EMIC Project - Presentation
EMIC Project - PresentationEMIC Project - Presentation
EMIC Project - Presentation
EMICPT
 
Presentazione ra
Presentazione raPresentazione ra
Presentazione ra
Juri Rocco
 
Mdeforge slides
Mdeforge slidesMdeforge slides
Mdeforge slides
Juri Rocco
 
Power point
Power pointPower point
Power point
laura652000
 
Presentatie Symbaloo mobiel
Presentatie Symbaloo mobielPresentatie Symbaloo mobiel
Presentatie Symbaloo mobielGiftomatic
 
EMIC Project - Presentation
EMIC Project - PresentationEMIC Project - Presentation
EMIC Project - Presentation
EMICPT
 
Mdeforge
MdeforgeMdeforge
Mdeforge
Juri Rocco
 
Commercial Entities Information Overview
Commercial Entities Information OverviewCommercial Entities Information Overview
Commercial Entities Information Overview
Dennis_Chandler
 
Symbaloo presentation PLE
Symbaloo presentation PLESymbaloo presentation PLE
Symbaloo presentation PLE
Giftomatic
 
Uutispelien suunnittelu
Uutispelien suunnitteluUutispelien suunnittelu
Uutispelien suunnittelu
Jukka Varsaluoma
 
1007324 chew faktor hutan
1007324 chew faktor hutan1007324 chew faktor hutan
1007324 chew faktor hutan
Atie Art
 

Viewers also liked (15)

EMIC Project - Presentation
EMIC Project - PresentationEMIC Project - Presentation
EMIC Project - Presentation
 
Bqtn1367870018
Bqtn1367870018Bqtn1367870018
Bqtn1367870018
 
Presentazione ra
Presentazione raPresentazione ra
Presentazione ra
 
Test file
Test fileTest file
Test file
 
I am a horse
I am a horseI am a horse
I am a horse
 
Mdeforge slides
Mdeforge slidesMdeforge slides
Mdeforge slides
 
Power point
Power pointPower point
Power point
 
Presentatie Symbaloo mobiel
Presentatie Symbaloo mobielPresentatie Symbaloo mobiel
Presentatie Symbaloo mobiel
 
EMIC Project - Presentation
EMIC Project - PresentationEMIC Project - Presentation
EMIC Project - Presentation
 
Mdeforge
MdeforgeMdeforge
Mdeforge
 
Commercial Entities Information Overview
Commercial Entities Information OverviewCommercial Entities Information Overview
Commercial Entities Information Overview
 
Symbaloo presentation PLE
Symbaloo presentation PLESymbaloo presentation PLE
Symbaloo presentation PLE
 
Cv nure
Cv nureCv nure
Cv nure
 
Uutispelien suunnittelu
Uutispelien suunnitteluUutispelien suunnittelu
Uutispelien suunnittelu
 
1007324 chew faktor hutan
1007324 chew faktor hutan1007324 chew faktor hutan
1007324 chew faktor hutan
 

Similar to 14 cyber threats

BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
- Mark - Fullbright
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Pixel Crayons
 
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
Aditya K Sood
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
K7 Computing Pvt Ltd
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
Andreas Hiller
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
dogallama
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
Dan Oblak
 
Botnet
BotnetBotnet
Botnet
lokenra
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011
subramanian K
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
anbersattar
 
Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012
Ayu Anita
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
EMC
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
manoharparakh
 
File000145
File000145File000145
File000145
Desmond Devendran
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Connecting Up
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
Cigniti Technologies Ltd
 

Similar to 14 cyber threats (20)

BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
 
Botnet
BotnetBotnet
Botnet
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
 
Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
File000145
File000145File000145
File000145
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 

Recently uploaded

A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 

Recently uploaded (20)

A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 

14 cyber threats

  • 1. 14 cyber threats! http://business.rediff.com/slide-show/2009/nov/25/slide-show-1-tech-beware- of-these-cyber-threats.htm Cyber threats continue to haunt Internet users across the world. The bad news is that this will continue to wreak havoc taking new forms and approaches. As long as humans are programming computer code, flaws will be introduced, no matter how thorough pre-release testing is. Microsoft's new operating system is no exception, and as Windows 7 hits the pavement and gains traction in 2010, attackers will undoubtedly find ways to exploit its users, says a Symantec report. Security software scammers can take their efforts to the next level, by even hijacking users' computers and rendering them useless. "Cyber terrorism is the next big threat for India. Pakistani cyber criminals are able to deface 50 to 60 Indian websites a day. Though, India leads in IT services, it is lags behind as far as cyber security is concerned," ethical hacker Ankit Fadia said in an interview to Business Standard. The most popular instant messaging will largely be comprised of unsolicited spam messages containing malicious links, especially attacks aimed at compromising legitimate IM accounts. By the end of 2010, Symantec predicts that one in 300 IM messages will contain a URL. Symantec Corp has released its 2010 Security Predictions report. The reports states that malicious programs are actually being created at a higher rate than good programs. Here are 14 threats that you must be aware of. . . 1. Anti-virus is not enough With the rise of polymorphic threats and the explosion of unique malware variants in 2009, the industry is quickly realizing that traditional approaches to antivirus, both file signatures and heuristic/behavioural capabilities, are not enough to protect against today's threats. We have reached an inflection point where new malicious programs are actually being created at a higher rate than good programs. As such, we have also reached a point where it no longer makes sense to focus solely on analyzing malware. Instead, approaches to security that look to ways to include all software files, such as reputation-based security, will become key in 2010. 2. Social engineering as the primary attack vector More attackers are going directly after the end user and attempting to trick them into downloading malware or divulging sensitive information under the auspice that they are doing something perfectly innocent. Social engineering's popularity is at least in part spurred by the fact that what operating system and Web browser rests on a user's computer is largely irrelevant, as it is the actual user being targeted, not necessarily vulnerabilities on the machine. Social engineering is already one of the primary attack vectors being used today, and Symantec estimates that the number of attempted attacks using social engineering techniques will increase in 2010. 3. Rogue security software vendors escalate their efforts In 2010, expect to see the propagators of rogue security software scams take their efforts to the next level, even by hijacking users' computers, rendering them useless and holding them for ransom. A less drastic next step, however, would be software that is not explicitly malicious, but dubious at best. For example, Symantec has already observed some rogue antivirus vendors selling rebranded copies of free third-party antivirus software as their own offerings. In these cases, users are technically getting the antivirus software that they pay for, but the reality is that this same software can actually be downloaded for free elsewhere. 4. Social networking third-party applications will be the target of fraud With the popularity of social networking sites poised for another year of unprecedented growth, there will be more frauds being leveraged against site users to grow. In the same vein, expect owners of these sites to create more proactive measures to address these threats.
  • 2. As this occurs, and as these sites more readily provide third-party developer access to their APIs, attackers will likely turn to vulnerabilities in third-party applications for users' social networking accounts, just as we have seen attackers leverage browser plug-ins more as Web browsers themselves become more secure. 5. Windows 7 will come into the cross-hairs of attackers Microsoft has already released the first security patches for the new operating system. As long as humans are programming computer code, flaws will be introduced, no matter how thorough pre-release testing is, and the more complex the code, the more likely that undiscovered vulnerabilities exist. Microsoft's new operating system is no exception, and as Windows 7 hits the pavement and gains traction in 2010, attackers will undoubtedly find ways to exploit its users. 6. Fast Flux Botnets increase Fast flux is a technique used by some botnets, such as the Storm botnet, to hide phishing and malicious web sites behind an ever-changing network of compromised hosts acting as proxies. Using a combination of peer-to-peer networking, distributed command and control, web- based load balancing and proxy redirection, it makes it difficult to trace the botnets' original geo-location. As industry counter measures continue to reduce the effectiveness of traditional botnets, expect to see more using this technique being used to carry out attacks. 7.URL shortening services become the phisher's best friend Phishers are able to disguise links that the average security conscious user might think twice about clicking on, because users often have no idea where a shortened URL is actually sending them, . Symantec is already seeing a trend toward using this tactic to distribute misleading applications and we expect much more to come. Also, in an attempt to evade antispam filters through obfuscation, expect spammers to leverage shortened URLs shorteners to carry out their own evil deeds. 8. Mac and mobile malware will increase The number of attacks designed to exploit a certain operating system or platform is directly related to that platform's market share, as malware authors are out to make money and always want the biggest bang for their buck. In 2009, Macs and smartphones targeted more by malware authors, for example the Sexy Space botnet aimed at the Symbian mobile device operating system and the OSX. Iservice Trojan targeting Mac users. As Mac and smartphones continue to increase in popularity in 2010, more attackers will devote time to creating malware to exploit these devices. 9. Spammers breaking the rules As the economy continues to suffer and more people seek to take advantage of the loose restrictions of the Can Spam Act, we'll see more organisations selling unauthorised e-mail address lists and more less-than-legitimate marketers spamming those lists. 10. Spam volumes will fluctuate Since 2007, spam has increased on average by 15 percent. While this significant growth in spam e-mail may not be sustainable in the long term, it is clear that spammers are not yet willing to give up as long an economic motive is present. Spam volumes will continue to fluctuate in 2010 as spammers continue to adapt to the sophistication of security software, the intervention of responsible ISPs and government agencies across the globe. 11. Specialised malware Highly specialised malware was uncovered in 2009 that was aimed at exploiting certain ATMs, indicating a degree of insider knowledge about their operation and how they could be exploited.
  • 3. Expect this trend to continue in 2010, including the possibility of malware targeting electronic voting systems, both those used in political elections and public telephone voting, such as that connected with reality television shows and competitions. 12. CAPTCHA Technology will improve As this happens and spammers have a more difficult time breaking CAPTCHA codes through automated processes, spammers in emerging economies will devise a means to use real people to manually generate new accounts for spamming, thereby attempting to bypass the improved technology. Symantec estimates that the individuals employed to manually create these accounts will be paid less than 10 percent of the cost to the spammers, with the account-farmers charging $30-40 per 1,000 accounts. 13. Instant messaging spam As cyber criminals exploit new ways to bypass CAPTCHA technologies, instant messenger (IM) attacks will grow in popularity. IM threats will largely be comprised of unsolicited spam messages containing malicious links, especially attacks aimed at compromising legitimate IM accounts. By the end of 2010, Symantec predicts that one in 300 IM messages will contain a URL. Also, in 2010, Symantec predicts that overall, one in 12 hyperlinks will be linked to a domain known to be used for hosting malware. Thus, one in 12 hyperlinks appearing in IM messages will contain a domain that has been considered suspicious or malicious. In mid 2009, that level was 1 in 78 hyperlinks. 14. Non-English spam will increase As broadband connection penetration continues to grow across the globe, particularly in developing economies, spam in non-English speaking countries will increase. In some parts of Europe, Symantec estimates the levels of localised spam will exceed 50 percent of all spam.