Security trends for 2012

Here is my collection of security trends for 2012 from different sources:

Windows XP will be the biggest security threat in 2012 according to Sean Sullivan, security advisor at F-Secure: “People seem to be adding new systems without necessarily abandoning their old XP machines, which is great news for online criminals, as XP continues to be their favourite target.”

F-Secure also says also that it might not be long before the cyber criminals turn their attentions to tablet devices. Attacks against mobile devices have become more common and I expect this to continue this year as well.

Americans more susceptible to online scams than believed, study finds. A recent survey from The Ponemon Institute and PC Tools dives into this question and reveals a real gap between how aware Americans think they are of scams and how likely they actually are to fall for them.

Fake antivirus scams that have plagued Windows and Mac OSX during the last couple of years and now it seems that such fake antivirus scams have spread to Android. Nearly all new mobile malware in Q3 2011 was targeted at Android.. When antivirus software becomes a universally accepted requirement (the way it is on Windows is the day), has the platform has failed and missed the whole point of being mobile operating system?

crystalball

Cyber ​​criminals are developing more sophisticated attacks and the police will counterattack.

Mobile phone surveillance will increase and more details of it will surface. Last year’s findings have included Location data collecting smart-phones, Carrier IQ phone spying busted and Police Surveillance system to monitor mobile phones. In USA the Patriot Act lets them investigate anything, anywhere, without a warrant. Now they are on your devices and can monitor everything. Leaked Memo Says Apple Provides Backdoor To Governments: “in exchange for the Indian market presence” mobile device manufacturers, including RIM, Nokia, and Apple (collectively defined in the document as “RINOA”) have agreed to provide backdoor access on their devices.

Geo-location tagging in smartphones to potentially cause major security risks article says that geo-location tagging security issues are likely to be a major issue in 2012—and that many users of smartphones are unaware of the potentially serious security consequences of their use of the technology. When smartphones images to the Internet (to portals such Facebook or Flickr) there’s a strong chance they will also upload the GPS lcoation data as well. This information could be subsequently misused by third parties.

You need to find your balance between freedom and security (
Vapauden ja turvallisuuden tasapaino). Usernames poured out for all to see, passwords and personal identification numbers are published. A knowledge of access management is even more important: who has the right to know when and where the role of functioning? Access, identity and role management are essential for the protection of the whole system. Implementation of such systems is still far from complete.

When designing networked services, the development of safety should taken into account in the planning stage, rather than at the end of execution. Even a secure network and information system can not act as operating a vacuum.

crystalball

Reliability of the server certificates will face more and more problems. We can see more certificate authority bankruptcies due cyber attacks to them. Certificate attacks that have focused on the PC Web browsers, are now proven to be effective against mobile browsers.

Stonesoft says that advanced evasion techniques (AET) will be a major threat. Stonesoft discovered that with certain evasion techniques (particularly when combined in particular combinations) they could sneak common exploits past many IDS/IPS systems (including their own, at the time last summer). Using the right tool set (including a custom TCP/IP stack) attackers could sneak past our best defenses. This is real and they foresee a not too distant future where things like botnet kits will have this as a checkbox feature.

Rise of Printer Malware is real. Printer malware: print a malicious document, expose your whole LAN says that sending a document to a printer that contained a malicious version of the OS can send your sensitive document anywhere in Internet. Researchers at Columbia University have discovered a new class of security flaws that could allow hackers to remotely control printers over the Internet. Potential scenario: send a resume to HR, wait for them to print it, take over the network and pwn the company. HP does have firmware update software for their printers and HP Refutes Inaccurate Claims; Clarifies on Printer Security. I wonder how many more years until that old chain letter, where some new insidious virus infects everything from your graphics card to your monitor cable, becomes true.

Unauthorized changes in the BIOS could allow or be part of a sophisticated, targeted attack on an organization, allowing an attacker to infiltrate an organization’s systems or disrupt their operations. How Do You Protect PCs from BIOS Attacks? The U.S. National Institute of Standards and Technology (NIST) has drafted a new computer-security publication that provides guidance for computer manufacturers, suppliers, and security professionals who must protect personal computers as they start up “out of the box”: “BIOS Integrity Measurement Guidelines,” NIST Special Publication 800-155.

According to Stonesoft security problems threaten the lives and the year 2012 may be the first time when we lose lives because of security offenses. According to the company does this happen remains to be seen, but the risk is due to industrial SCADA systems attacks against targets such as hospitals or automated drug delivery systems. I already posted around month ago about SCADA systems security issues.

849 Comments

  1. website Designer for hire says:
    Hello there, just turned into aware of your blog thru Google, and found that it is truly informative. I am gonna be careful for brussels. I will be grateful if you proceed this in future. Lots of folks will likely be benefited out of your writing. Cheers!
    Reply
  2. sleeping bag clearance says:
    Woah! I’m really loving the template/theme of this website. It’s
    simple, yet effective. A lot of times it’s hard to get that “perfect balance” between superb usability and visual appeal. I must say that you’ve
    done a very good job with this. Also, the blog loads very fast for me on Safari.

    Outstanding Blog!

    my blog post: sleeping bag clearance

    Reply
  3. proactiv ebay says:
    It’s hard to come by educated people about this subject, but you sound like you know what you’re talking
    about! Thanks

    Reply
  4. George Hibbler says:
    I precisely wished to thank you so much yet again. I am not sure the things I would have implemented in the absence of the actual ideas documented by you about my area. It had become a very daunting concern for me personally, however , taking a look at your expert way you managed that forced me to jump for contentment. Now i am thankful for the guidance and thus trust you really know what a great job that you’re putting in training people today through the use of your webblog. I am certain you haven’t come across any of us.
    Reply
  5. Guest posting services says:
    Fantastic publish, very informative. I’m wondering why the opposite specialists of this sector don’t understand this. You should continue your writing. I am sure, you have a huge readers’ base already!|What’s Going down i’m new to this, I stumbled upon this I’ve found It absolutely useful and it has aided me out loads. I’m hoping to give a contribution & aid different users like its helped me. Good job.
    Reply
  6. Top Eleven Hack says:
    Hello. I came across a person’s blog page the employment of windows live messenger. That is a very savvy document. My business is guaranteed to search for the item in addition to go back to master added of one’s information. Thanks for the actual publish. I will certainly return.
    Reply
  7. Patrick Adamyan says:
    Consequently as a mother or father be sure to pick a game which make your son or daughter enjoy as well as which also shows him/her different abilities. The most efficient strategy to teach your kids is with the ‘learning through playing’ technique. Toys which conform to this technique include a idea. Whenever your child performs with such playthings he slowly unravels the idea. You will find different video games for example the actual monopoly video game, the family games game etc that actually helps children to develop his making decisions abilities, develop term power and so on
    Reply
  8. gaming laptops says:
    On the A8, however, you’ll receive the full package. Dell has integrated Subwoofer in this speaker system as well as has an integrated headphone jack, which can also be connected with MP3 player. Lenovo laptop debate has been going on for quite sometime now. The proprietary laptop hard drive installation cage must be able to screw onto the new hard drive the same way. Instead of playing with abandon and commitment, you play merely to hold onto what you already have.

    Have a look at my weblog – gaming laptops

    Reply
  9. www.usefulinsurancetips.net says:
    Hello. I uncovered your blog using yahoo. This is a rather well prepared report. We will be bound to search for it accessible back in know more of this beneficial information and facts. Thanks for the submit. I will surely go back.
    Reply
  10. Belle Offner says:
    magnificent points altogether, you simply gained a new reader. What would you suggest in regards to your publish that you made some days in the past? Any sure?
    Reply
  11. Hugh Fiegel says:
    own website and would love to know where you got this from or what the theme
    Reply
  12. Zada Schauble says:
    I’m just fascinated to uncover what blog platform you happen to be using? I am having to deal with various smallish reliability troubles with my newest website and I would want to see some thing far more safe. Have you got any kind of remedies?
    Reply
  13. mesothelioma cancer explained says:
    Hi I am so delighted I found your webpage, I really found you by error, while I was looking on Bing for something else, Regardless I am here now and would just like to say thanks a lot for a incredible post and a all round exciting blog (I also love the theme/design), I don’t have time to go through it all at the moment but I have book-marked it and also included your RSS feeds, so when I have time I will be back to read more, Please do keep up the fantastic job.
    Reply
  14. Verdie Razey says:
    I hate it when your ipad screen is broken. You have to get it repaired that day. Can’t live without it!
    Reply
  15. plagiarism avenger plugin says:
    Very great post. I simply stumbled upon your blog and wanted to say that I have really loved surfing around your blog posts. After all I will be subscribing in your rss feed and I’m hoping you write once more very soon!
    Reply
  16. firmy SEO says:
    Hey there You site is really excellent some really intesting articles. Thanks and keep up the good work . Added you to my Bookmarks
    Reply
  17. Agripina Zeyer says:
    The following time I learn a blog, I hope that it doesnt disappoint me as much as this one. I mean, I do know it was my option to learn, but I truly thought youd have one thing fascinating to say. All I hear is a bunch of whining about something that you might repair if you happen to werent too busy in search of attention.
    Reply
  18. news and updates says:
    We are a gaggle of volunteers and starting a brand new scheme in our community. Your website offered us with valuable information to work on. You’ve done an impressive process and our entire community can be grateful to you.
    Reply
  19. Vitamins says:
    Undeniably consider that that you said. Your favorite justification appeared to be on the net the easiest thing to take into account of. I say to you, I certainly get irked even as folks think about concerns that they just don’t understand about. You managed to hit the nail upon the top and defined out the whole thing with no need side-effects , people could take a signal. Will likely be back to get more. Thanks
    Reply
  20. in dash computer says:
    How are cellphones in the tracked car connected with the use of GPS tracking devices? Must the cellphone be on for the GPS device to track the car?
    Reply
    • tomi says:
      Many GPS tracking devices seem to have GPS module combined with some GSM module that does the communication through mobile phone network.
      You can see that as the GPS tracking device has it’s own built-in cell phone in it.
      Reply
  21. xxxstar says:
    Usually I don’t read post on blogs, however I wish to say that this write-up very pressured me to take a look at and do so! Your writing style has been surprised me. Thank you, quite nice article.
    Reply
  22. Full Pack Press release writing and distribution says:
    Somebody essentially lend a hand to make seriously articles I would state. This is the first time I frequented your web page and thus far? I surprised with the analysis you made to make this particular submit amazing. Fantastic activity!
    Reply
  23. hacker facebook says:
    Merci bien pour ce sujet il est vrai que je ne suis pas un pro sur le sujet mais votre sujet ma donné envie d’en apprendre plus . Il est si rare de voir un article écrit sans faute . Je vais poursuivre ma navigation sur votre site . En espérant pouvoir vous revoir , bonne chance pour la suite. Cordialement .
    Reply
  24. Aubrey Carpinelli says:
    Your site has many good information. Can I link to you? Do you prefer nofollow or dofollow link?
    Reply
  25. en iyi oyunlar says:
    I’d must examine with you here. Which isn’t one thing I normally do! I enjoy studying a publish that can make folks think. Also, thanks for permitting me to remark!
    Reply
  26. zeka oyunlari says:
    Spot on with this write-up, I truly assume this web site wants far more consideration. I’ll in all probability be once more to read far more, thanks for that info.
    Reply
  27. Brain Nordgren says:
    Basta controllare sui commenti degli altri lettori del blog.
    Reply
  28. locksmith austin says:
    hi!,I love your writing very a lot! percentage we keep in touch more about your article on AOL? I need a specialist on this area to unravel my problem. Maybe that is you! Taking a look forward to peer you.
    Reply
  29. Android telefon veya says:
    For latest information you have to visit world wide web and on
    the web I found this site as a best website for most recent updates.
    Reply
  30. bitcoin generator says:
    There is definately a great deal to find out about this subject.
    I really like all the points you’ve made.
    Reply
  31. Anonymous says:
    One thing is always that one of the most popular incentives for applying your card is a cash-back or perhaps rebate present. Generally, you’ll receive 1-5 back upon various purchases. Depending on the credit card, you may get 1 in return on most expenses, and 5 back on acquisitions made from convenience stores, filling stations, grocery stores and also ‘member merchants’.
    Reply
  32. storables containers says:
    First of all I would like to say great blog!
    I had a quick question that I’d like to ask if you don’t mind.
    I was curious to know how you center yourself and clear your thoughts prior to writing.
    I’ve had difficulty clearing my mind in getting my thoughts out.
    I truly do take pleasure in writing however it just seems like the first 10 to 15 minutes tend to be wasted
    just trying to figure out how to begin. Any ideas or hints?
    Kudos!
    Reply
  33. Myntra Coupons says:
    Right now it looks like Drupal is the preferred blogging platform out there right now.

    (from what I’ve read) Is that what you are using on your blog?

    Reply
  34. strata management services sydney says:
    I am actually pleased to read this website posts which carries tons of useful facts, thanks for providing such statistics.
    Reply
  35. web pages says:
    I do agree with all the concepts you’ve presented to your post.
    They’re really convincing and can definitely work. Nonetheless, the posts are very quick for novices.
    Could you please lengthen them a bit from subsequent time?
    Thank you for the post.
    Reply
  36. Nichelle Polo says:
    Hey there and thanks for your info . I feel this is among the most vital info for me. And i am happy reading your article.
    Reply
  37. corporate private limo service toronto says:
    Every weekend i ued to pay a quick visit this website, bedause i wish for
    enjoyment, as this this sute conations truly fastidious funny material too.
    Reply
  38. Body Revolution says:
    It’s amazing for me to have a web site, which is
    beneficial in support of my knowledge. thanks admin
    Reply
  39. Sophia says:
    Howdy I am so delighted I found your weblog, I really found
    you by mistake, while I was searching on Yahoo for something else, Nonetheless I am here now and would just like to
    say cheers for a incredible post and a all round entertaining blog (I also love the theme/design), I don’t
    have time to look over it all at the moment but I have saved it and also included your
    RSS feeds, so when I have time I will be back to read more, Please do keep up the superb work.
    Reply
  40. i.ex.lv says:
    It’s actually a nice and useful piece of information. I’m satisfied that you simply shared this useful information with us.
    Please stay us up to date likke this. Thank you foor sharing.
    Reply
  41. Kenneth says:
    I just like the helpful info you supply on your articles.
    I’ll bookmark your blog and test again right here regularly.
    I’m reasonably sure I’ll be told many new stuff proper right here!

    Best of luck for the next!

    Reply
  42. tomi says:
    Thank you for your comment pointed to interesting article:

    Google and the NSA Connection
    http://www.moneynewsnow.com/2013/05/google-and-the-nsa-connection/

    The data mining technology that is integral to the Google AdWords experience is a power tool in creating an individual profile for anyone who surfs the web. The amazing capacity to target specific ads to personal search topics, geographic locations and web history is the harbinger of a total recall on your personality. If the benefits of getting relevant advertisement that maximize sales opportunities were the only purpose of the process, the relatively benign intrusion of a materialistic message might be tolerable to most internet users. However, the bull in the china shop is not merely in the business of making a commercial profit. Google is a wonder creation of the calculate surveillance society.

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

*

*