Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Apple MAC OS To Become More Prominent Malware Target In 2011

Stonesoft Networks : 19 January, 2011  (Technical Article)
Stonesoft sheds light on expected threats for 2011 including a rise in the profile of Apple's OS, Advanced Evasion Techniques increasing network vulnerabilities and the further development of stuxnet threatening infrastructure systems
Stonesoft reveals what organizations should prepare for in 2011. With more than 20 years of experience in network security, Stonesoft’s predictions shed light on the end of Apple OS invulnerability, the evolution of Stuxnet and advanced evasion techniques (AETs).



“The bearing themes in 2010 were definitely Stuxnet, social engineering attacks and advanced evasion techniques, and I am pretty confident that the threats of 2011 will evolve around these themes as well,” says Joona Airamo, chief information security officer at Stonesoft.



Stonesoft’s predictions include:



1. An Apple OS targeted virus. As the Apple OS becomes more commonly used, there will be a nasty worm or virus specifically targeted to this operating system.



2. Increased malware attacks for social media. There will be an increase in the number of malware related attacks through social networking sites like Facebook and Twitter, with a single attack affecting thousands (or even millions) of people. Just like the old email scams, the malicious file will look like it has been sent from the initial target so recipients will trust the source.



3. Political cyber warfare. We can expect to see more “information warfare”-type attacks on nation states. The political motivation in the attacks will increase, even though the attacks with a financial motivation will clearly remain dominative.



4. Social engineering against the enterprise. There will be a rise in targeted ’social engineering’ attacks. Sophisticated hackers will undertake thorough investigations of people in order to penetrate corporate networks for significant financial gain.



5. Stuxnet-like attack proliferation. We will see more attacks like Stuxnet. The target will be critical infrastructure, such as government and military systems. The attacks will remain rare because hackers need to be very well resourced in order to build a virus of this magnitude. Stuxnet was made up of four zero-day vulnerabilities and the one used also by the Conficker worm. Its complexity and the expense of developing the virus both point in the direction of it being a government sponsored attack.



6. Smartphone takes center stage. The smartphone is set to become a more prominent target for hackers, and understandably so. The number of smartphones sold may soon bypass the number of PCs sold.



7. Viruses become more sophisticated. Hackers will be even more promiscuous in quickly spreading viruses far and wide. They will try to improve their "return of investment" by making sure no vulnerability is left unused and by utilising the full window of opportunity when the security patches are not yet installed.



8. Advanced evasion techniques will grow if ignored by the network security vendor community. Stonesoft’s recent discovery of Advanced Evasion Techniques (AETs) means that the whole Intrusion Prevention System (IPS) vendor community will have to unite in order to build sufficient protection to mitigate against this new method of attack.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo