{"id":5483,"date":"2011-11-17T03:00:17","date_gmt":"2011-11-17T10:00:17","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=5483"},"modified":"2024-01-24T14:05:57","modified_gmt":"2024-01-24T21:05:57","slug":"top-7-cybersecurity-predictions-for-2012","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/11\/17\/top-7-cybersecurity-predictions-for-2012\/","title":{"rendered":"Top 7 Cybersecurity Predictions for 2012"},"content":{"rendered":"<p><strong><em>By Mel Morris<\/em><\/strong><\/p>\n<p>From Stuxnet to Sony, a number of cyberattacks emerged in 2011 that experts have predicted for quite some time. I predict 2012 will be even more pivotal, thrusting cybersecurity into the spotlight. These are my top seven forecasts for the year ahead:<\/p>\n<p><strong>1) Targeted, zero-day attacks will be the norm.<br \/>\n<\/strong>Looking back over the past year, an increasing number of <a href=\"http:\/\/krebsonsecurity.com\/2011\/05\/rsa-among-dozens-of-firms-breached-by-zero-day-attacks\/\">breaches<\/a> were the result of custom malware and exploits targeting specific enterprises. I predict 2012 will be the year of targeted attacks, which have slowly evolved from large-scale threats to unique attacks designed to infect a handful of very specific people.\u00a0 Traditional blacklist and signature approaches have already become ineffective; once a virus is spotted, malware writers simply create a new one. As targeted, zero-day attacks intensify, more security vendors will realize the pressing need to analyze threats and behavior more holistically.<\/p>\n<p><strong>2)\u00a0<\/strong><strong>2012 will be the start of a revolution.<br \/>\n<\/strong>For the last several years, the security industry and cybercriminals have had a symbiotic relationship that has kept the market in balance. The \u201cgood guys\u201d have done just enough to thwart attacks \u2013 and the bad guys haven\u2019t needed to dramatically evolve as they\u2019re still making money doing exactly what they\u2019re doing. I predict the scales will tip in the coming year. More innovative and effective security technology will drive a revolution and we\u2019ll see a heated battle emerge between security companies and cybercriminals. It\u2019s survival of the fittest.\u00a0 As soon as cloud-based technology and behavioral protection strengthen their foothold in the antimalware sector, hackers and cyber mafias will up the ante and scope out new vulnerabilities.<\/p>\n<p><strong>3) Cyber threats will gain political traction.<br \/>\n<\/strong>The <span style=\"text-decoration: underline;\">Stuxnet worm <\/span>is an example of something we detected long ago, and its impact has now taken on a whole new meaning. The virus\u2019s sophisticated ability to infiltrate government systems, silently gather information, and disable nuclear power plants has prompted a <a href=\"http:\/\/www.npr.org\/2011\/11\/02\/141908180\/stuxnet-raises-blowback-risk-in-cyberwar\">wakeup call<\/a>, driving leaders to reassess federal technology standards and regulations. Stuxnet gives us a very real and very scary glimpse of what\u2019s to come.<\/p>\n<p><strong>4) \u00a0<\/strong><strong>Masses will migrate to cloud platforms<\/strong>.<br \/>\nNow that <a href=\"http:\/\/www.apple.com\/icloud\/\">Cloud has an \u201ci\u201d front of it<\/a>, the cloud will truly hit the mainstream. The appeal of file sharing and remote access will be a major draw for an increasingly tech savvy population that connects to the Internet from tablets, smartphones, and multiple PCs. This will not only drive widespread adoption of cloud-based tools and applications amongst consumers, but it will dramatically accelerate migration in the business world. Many companies are already on board with cloud platforms and applications, but the power of the masses will act as a tipping point, pushing the vast majority of IT professionals to shun old-school, on-premise approaches and look to the cloud for infrastructure and data solutions.<\/p>\n<p><strong>5)\u00a0<\/strong><strong>Your smartphone will be a target. <\/strong>Security companies have done a fairly good job of stopping attacks at the endpoint, and this will lead cybercriminals to focus their efforts more heavily on mobile devices, which are still quite vulnerable in today\u2019s environment. We will see an increase in Android and iPhone attacks: <a href=\"http:\/\/blog.webroot.com\/2011\/11\/04\/i-dont-think-it-means-what-you-think-it-means-websites-hosting-android-trojans\/\">rogue apps<\/a>, malicious links, and spyware targeted at smartphones and tablets. It\u2019s all about data, and business users and consumers alike store an abundance of highly sensitive and poorly guarded information on their mobile devices.<\/p>\n<p><strong>6) Legitimate applications will be used for illegitimate activities.<\/strong><br \/>\nRogue Android apps are just the tip of the iceberg. We load our mobile devices with applications that are designed to simplify our lives, yet we don\u2019t stop to consider what else they are capable of \u2013 or what someone is capable of manipulating them to do. Even legitimate apps can grab information and use it without our permission. A simple glance at an application like <a href=\"http:\/\/itunes.apple.com\/gb\/app\/plane-finder\/id336477530?mt=8\">Plane Finder<\/a> illustrates the vast amount of data that is at anyone\u2019s fingertips. And that\u2019s not to mention the many other opportunities roaming devices present; a criminal could leverage a mobile device to pick up data from a nearby network, or hack into a plane\u2019s WiFi connection and send signals to devices left in improper flight mode.<\/p>\n<p><strong>7) Our weakest link will be strengthened<\/strong>.<br \/>\nWhen it comes to security, the weakest link has always been people. In 2012, indifference toward security will diminish. Businesses will invest in security and strengthen duty of care measures. Employees and consumers will see the ramifications of breaches and begin incorporating smart Internet practices into their everyday behaviors.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Mel Morris From Stuxnet to Sony, a number of cyberattacks emerged in 2011 that experts have predicted for quite some time. I predict 2012 will be even more pivotal, thrusting cybersecurity into the spotlight. These are my top seven forecasts for the year ahead: 1) Targeted, zero-day attacks will be the norm. Looking back [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17050,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[6171,5267,3565,4725,9135,3769,3517,3523,3511,9141,9127,3479,9133,9139,7787,9129,9125,3481,9137,9131],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5483"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=5483"}],"version-history":[{"count":4,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5483\/revisions"}],"predecessor-version":[{"id":32615,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5483\/revisions\/32615"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17050"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=5483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=5483"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=5483"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=5483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}