The top 10 security threats ( source: Newnimproved )
The 2008 Olympics is likely to spur a flurry of hacker activity, says Websense Inc, which specializes in web filtering and security software, releasing the top ten computer security threats for 2008.
"Looking at the current attack trends, cyber criminal techniques are evolving quickly and efficiently to not only evade detection, but to steal data and manipulate trusted content such as Web sites and applications," said Dan Hubbard, vice president of security research, Websense, in a media release. "It's critical that organizations and individuals recognize that attackers are changing techniques and launching targeted attacks."
The top 10 security threats are:
1. Olympics: New cyber attacks, phishing and fraud
Event-based attacks and scams are popular, and with the whole world watching, the 2008 Olympics may fuel a surge in cyberattacks. As the Olympic torch burns, researchers predict the possibility of large scale denial-of-service attacks on Beijing Olympic-related sites as political statements and fraud attempts through email and the Web surrounding the Olympics. Additionally, researchers predicts compromises of popular Olympic news or other sports sites -- attacks designed to install malicious code on end-users' machines and steal personal or confidential business information.
2. Malicious spam invades blogs, search engines, forums and Web sites
Researchers predicts that hackers will increasingly use Web spam to post URLs to malicious sites within forums, blogs, in the commentary or 'talk-back' sections of news sites and on compromised Web sites. This activity not only drives traffic to the infected Web sites but also assists in the purveyor's site sitting higher on search engine rankings, increasing the risk that users will visit the site.
3. Attackers use Web's 'weakest links' to launch attacks
The Web is an entanglement of links and content. The advent of Web 2.0 additions such as Google Adsense, mash-ups, widgets, and social networks along with the massive amounts of Web advertisements linked to Web pages have increased the likelihood of 'weak links' -- or Web sites and content that are vulnerable to compromises.
Researchers predicts that attackers will increasingly exploit the weakest links within the Web infrastructure in order to target the greatest number of Internet users. Most vulnerable to these attacks are search engines and large user networks such as MySpace, Facebook or other social networking sites.
4. Number of compromised Web sites will surpass number of created malicious sites
The Web as an attack vector has been steadily increasing for the last five years and now attackers are using compromised sites as their launching platforms -- even more than their own created sites. Compromising sites -- particularly, sites well-visited by end-users, such as the Dolphin Stadium attack that occurred a few days prior to the 2007 Super Bowl XLI in Miami, provides attackers with built-in Web traffic and minimizes the need for lures through email, instant messaging or Web posts.
5. Cross-platform Web attacks: Mac, iPhone popularity spurs increase
With the brand popularity and growing use of iPhones and Macintosh computers, researchers predict attackers will increasingly launch cross-platform Web attacks that detect the operating system in use and serve up code specifically targeting that operating system instead of attacks based on just the Web browser. Operating systems that are targeted now include Mac OSX, iPhone, and Windows.
6. Rise in targeted Web 2.0 special interest attacks:
Hackers targeting specific groups of people based on interests and profile
Web 2.0 has spawned a proliferation of Web users that visit chat rooms, social networking sites, and special interest Web sites such as travel sites, automotive, and more. These sites provide attackers with potential victims that fall within a certain age group, wealth bracket, or people with particular purchasing habits. In 2008, researchers from leading companies, predict targeted attacks will rise toward specific social networking or special interest sites that have a higher probability of delivering a payoff.
7. Morphing JavaScript to evade anti-virus scanners
Hackers are upping the ante with evasion techniques that use poly-morphic JavaScript (Polyscript) -- which means that a uniquely-coded Web page is served up for each visit by a user to a malicious Web site. By changing the code every visit, signature-based security scanning technologies have difficulty detecting Web pages as malicious and hackers can extend the length of time their malicious site evades detection.
8. Data concealment methods increase in sophistication
Researchers predicts an increased use of crypto-virology and sophistication in data concealment including the use of stenography, embedding data within standard protocols, and potentially within media files. Toolkits widely available on the Web will be used to embed proprietary information and steal data.
9. Global law enforcement will crack down on key hacker groups and individuals
In 2007, large-scale Internet-based attacks garnered the attention of law enforcement officials around the world. Researchers anticipates that through the global cooperation of enforcement agencies, in 2008 the biggest crackdown and arrests of key members of a hacker group will occur.
10. Vishing and voice spam will combine and increase
The vast cell phone user population has grown into a lucrative market to exploit with spamming and "vishing" for financial gain. To date, researchers have seen an increased number of vishing attacks but not a lot of spam -- or pro-active automated calling. In 2008 Researchers predicts that 'vishing,' or the practice of using social engineering and Voice over IP (VoIP) to gain personal and financial information, and voice spam will combine and increase -- users will receive automated voice calls on LAN lines with voice spam to lure them to input their credentials through the telephone.
Top 10 computer security threats for 2008
Labels:
Top 10
Subscribe to:
Post Comments (Atom)
My Categories
- Accidents (6)
- Advice (55)
- Aircraft (3)
- Airports (3)
- Amazing (527)
- Animals (80)
- Aquariums (3)
- Around the world (72)
- Art (50)
- Arts (25)
- Asclepiad (1)
- Babes (14)
- Beaches (8)
- Belgium (6)
- Believe it or not (130)
- Belize (2)
- Biggest (24)
- Bike (19)
- Bikini (5)
- Body Art (1)
- Bodybuilder (1)
- Bolivia (2)
- Bollywood (235)
- Brazil (6)
- Brunei (1)
- Bulgaria (3)
- Cambodia (2)
- Canada (4)
- Carnivorous (1)
- Cars (168)
- Celebrities (499)
- Celebrity (715)
- Chile (3)
- China (4)
- Cities (19)
- Colombia (2)
- Costa Rica (5)
- Countries (170)
- Creative (71)
- Critters (2)
- Denmark (5)
- Design (57)
- Designs (8)
- Dominican Republic (1)
- Dubai (4)
- Ecuador (2)
- Electronics (1)
- Events (4)
- Fashin (4)
- Fashion (1)
- Finland (4)
- Foods (34)
- France (14)
- Funny (43)
- Gadgets (6)
- Germany (13)
- Gratest (1)
- Greece (4)
- Guatemala (3)
- Guns (2)
- Haircut (8)
- Hairstyles (17)
- Highest (5)
- Hollywood (360)
- Home (6)
- Homes (2)
- Hong Kong (3)
- Hotels (16)
- House (3)
- Hungary (5)
- India (4)
- Infographics (1)
- Information (3)
- Interesting (1)
- Kazakhstan (3)
- Kenya (1)
- Kuwait (1)
- Laos (2)
- Largest (13)
- Latvia (3)
- Lebanon (1)
- Libya (2)
- Lifestyle (1)
- Lithuania (1)
- Longest (5)
- Luxembourg (2)
- Luxury (27)
- Mexico (11)
- Mobile (29)
- Mobiles (33)
- Models (1149)
- Montenegro (1)
- Morocco (4)
- Most Expensive (379)
- Motorcycles (2)
- Nature (9)
- New Zealand (13)
- News (114)
- Orchid (5)
- Painting (14)
- Paranormal (18)
- Peopels (249)
- Peoples (979)
- Photographs (6)
- Pictures (1193)
- Places (25)
- Russia (1)
- Ship (1)
- Ships (1)
- Smallest (10)
- Sport (7)
- Sports (23)
- Tallest (3)
- Tattoo (16)
- Tattoos (8)
- Teapots (1)
- Technology (120)
- Temple (4)
- Tips (6)
- Top 10 (113)
- Top-10 (84)
- Top10 (41)
- Train (1)
- Travel (26)
- Tricks (3)
- Truck (4)
- Trucks (5)
- USA (1)
- Videos (13)
- Women (9)
- Womens (6)
- World (494)
- World Cup (7)
- World Records (14)
- Worlds (55)
My Archives
-
▼
2010
(3071)
-
▼
July
(109)
- Top 10 deepest lakes in the world
- Ten Things about Cell Phones
- Ten Types of Pen Drive
- Top 10 Things That I Know About Women
- Top 10 Bizarre Military Experiments
- Faces of Kamal Hasan in Dasavatharam Movie
- Top 10 Highest Paid Football Players in the World ...
- Top 10 Ways to Prevent Fuel Wastage
- Top 10 Expensive Island
- Top 10 Essential qualities for a person in Life
- Top 10 Brain damaging habits
- Top 10 Impressive Airport Lounges in the world
- Top 10 Amazing sculptures By Ron Mueck
- Top 10 Official Emblem and Mascots of the Olympic ...
- Top 10 Official Emblem and Mascots of the Olympic ...
- Top 10 Amazing sculptures By Ron Mueck
- Top 10 video game
- Top 10 olympic opening ceremony Photos 2008
- Top 10 interesting statue For ever
- Top 10 Olympic stadium in Beijing in China
- Top 10 most important search engines For visual im...
- Top-10 Awesome white wallpapers 2009
- Top-10 Most paid Male Athletes in America 2008-2009
- Top-10 Websites How They Look Like 10 Years Ago
- Top-10 Richest Person in America 2008-2009
- The 10 Richest Persons of India
- Top 10 Longest Rivers in the world
- Top-10 Safest Car in 2009
- 10 Fun Facts About the UN
- Top-10 World's Best Paid Authors in 2008-2009
- TOP -10 Most Viewed Space Photos of 2008-2009
- Top-10 Social Awareness Advertaisement
- Top-10 Hubble Telescope's space photographs
- Top 10 Inventions 2008
- Top 10 Most Expensive Human Error in History
- Top-10 Hollywood's Most Earning Couples
- Top-10 Most Fuel-Efficient Cars In the world -2009
- Top 10 Startup Companies Worth Watching in 2008
- Top 10 Patent Holders (Alive) of the World
- Top 10 computer security threats for 2008
- Top 10 Songs, I wish the world to watch at least once
- Top 10 Astronomy Pictures of 2007
- Top 10 Breakthroughs in Science - 2007
- Top 10 Emerging Environmental Technologies
- Gastrochilus (obliquus ?)
- Colugo in the night
- Baby tarts
- Leader of the pack
- Sleeping with the enemy
- Unknown Borneo Bulbophyllum
- Masdevalia
- Bulbophyllum vaginatum
- Top 10 World's Most Expensive Cars in 2009
- Top 10 Best Hospitals in the world
- Top 10 World's Best|Most Exclusive Hotels
- Top 10 Hotels in the world
- Top 10 America's Most Promising Young Companies
- Top 10 Basketball’s billionaire owners
- Top 10 Green Companies for 2010
- Top 10 Most Powerful Billionaires in the world 2010
- Top 10 Biggest Oil Reserves in the world
- Top 10 Richest person in Japan 2010
- Top-10 Most Expensive luxury Car’s 2010
- Top-10 World’s Strangest and Safest Buildings
- Top-10 World’s Strangest and Safest Buildings
- Top 10 Richest person in Japan 2010
- Top-10 Most Expensive luxury Car’s 2010
- Top-10 Hollywood's Most Earning Couples 2010
- Top 10-Top Earning Athletes Of The 2010 Winter Oly...
- Top 10 Sexiest|Hottest Female Athletes
- Top 10 Technology's Richest person in the world 2010
- Top 10 Youngest Tech Billionaires
- Top 10 Richest peoples in Asia 2010
- Top 10 Most Powerful Young CEO’s in America
- Top 10 World’s Most Corrupt Countries
- Top 10 Richest person in the world 2010
- Top 10 largest Skyscraper Hotels in the world
- Top10 Websites That Changed the Internet
- Top 10 World's Leading Companies
- Top 10 Leading |Biggest Companies in India
- Top 10 Models in the world
- Top 10 Richest People In The Philippines 2010
- Top 10 companies in the world
- Top 10 Most Expensive Watches in the world
- Top 10 World's Biggest, Busiest Ports |Harbor
- Top 10 Richest Person In Malaysia
- Top 10 Most Earning American Idol
- Room in a Box: Ultra-Portable Piece of Pull-Out Fu...
- Tree (in) House: Eccentric Elevated Los Angeles Hi...
- 50-Cushion Couch: Super-Soft Convertible Sofa + Sl...
- Secret Garden: Sublime Japanese Green-Roof Deck De...
- (Laser) Cutting Edge: Custom Built-In Wood Wall Sh...
- Secure Your Cube: Lock-and-Leave-It ‘Safe Desk’ De...
- Cases for War: Toy Soldiers Slinging Nuclear Shelv...
- 15 Hot Cups of Art: Magic Markers on Coffee-Cup ‘C...
- Craftastic: 3 Unique Works of Custom-Made Wood Fur...
- Subtle Sunken Beach House, Shipwreck or Ruin by th...
- Water Balloon Luminary: Clever DIY Candle-Making C...
- Weavers Nest: Tree House or the Work of a Very Big...
- Sweet Modernism: 6 Holiday Gingerbread House Designs
-
▼
July
(109)
No comments:
Post a Comment