With 2012 just about round-the-corner, security concerns are also rather new and are being considered more than menacing in their outlook ever before. What’s more, adding to already burgeoning security hassles are the influx of bring your own devices (BYOD), social media, cloud computing and other operational challenges. In short, all we can say is buckle up, for if 2011 was a shocker, then 2012 is likely to be a motherload of all security issues.
What’s 2012 got in store?
2012 is for sure going to pain in the neck or the IT guys dealing with the security scenario. Since, as it goes the year will end up promising hassles galore in fields such as:
It goes without saying identity may prove more valuable to cybercriminals than credit cards. For at the end of the day, bad guys would be actively involved in the activity of buying and selling social media credentials on online forums. And if facts are anything to go by then with Facebook nearly boasting of more than 800 million active users and over half of them logging on to the site daily, with every user nearly boasting of as many 130 friends on an average, a less than favorable scenario is not far away. And yes with trust ending up being the foundation of social networking, if in case a bad guy does end up compromising with the logins, there is a good chance a manipulation on friends list is in the pipeline.
· Blended Attacks
This method is considered as one of the most advanced attacks trying to sneak its way past elements social media elements such as ‘friends’, ‘mobile devices’ and the cloud. Blended attacks are generally a considered as a mix of two elements, namely E-mail and the Web. In the coming year advanced attacks are increasingly going to rely on at least two and sometimes all the emerging technologies such as social media, cloud platforms and mobile.
· Volley of Attacks in 2012
End up expecting an increase in exposed vulnerabilities from black hats and white hats in coming year for mobile devices. In 2012, if estimates are anything to go by then nearly 1,000 different variants of exploits, malicious applications, and botnets would be ready to infect hand held devices and those plugged to the head. And yes with nearly a new variant every day the number of people falling victim to believable social engineering scams will rise manifold.
· Containment is the new prevention
For years, security defenses have focused on keeping cybercrime and malware out. There’s been much less attention on watching outbound traffic for data theft and evasive command and control communications. Organizations on the leading edge will implement outbound inspection and will focus on adapting prevention technologies to be more about containment, severing communications, and data loss mitigation after an initial infection.
· Social Event Magnets
The London Olympics, U.S. presidential elections, Mayan calendar and apocalyptic predictions are events cyber criminals will try and exploit to the hilt. SEO poisoning has become an everyday occurrence and one just needs to the name the trend and it is for sure going to be poisoned. Further, as the bigger search engines have become savvier towards removing poisoned results; criminals in 2012 will end up using the same techniques ported to new platforms. So, in short Twitter feeds, Facebook posts/emails, LinkedIn updates, YouTube video comments, and forum conversations need to be handled with extreme caution. Better still searches, wall posts, forum discussions, and tweets dealing with topics listed above, as well as any celebrity death or other surprising news are considered to be magnets for unsuspecting netizens.
{ 0 komentar... read them below or add one }
Posting Komentar