January 12, 2011 [Singapore] Kaspersky Lab, a leading developer of secure content and threat management solutions, today announced its predictions for the internet security landscape for 2011.
- CYBER CRIMINAL SHAKEUP
- The year 2010 saw malicious programs reach a whole new level of functionality, which is likely to bring about a major shakeup in the types of criminals orchestrating cyber attacks as well as their aims and the methods they use. The arrival of this new generation of cybercriminals means those tasked with counteracting such cyber threats will need to raise their game considerably.
- STEAL EVERYTHING SPYWARE
- We are now faced with the widespread use of a new class of spyware programs, the aim of which can be defined quite simply as ‘steal everything’. They will gather any information that they can about users, right down to the color of their hair and eyes, and will examine every document stored on infected computers.
- THE RISE OF INDUSTRIAL ESPIONAGE
- Industrial and state espionage will become more pervasive, with less emphasis on precision attacks. Cybercriminals will start targeting a much broader range of organizations, no longer concentrating solely on online banks and electronic payment systems. The principal aim of many new virus writers and their clients will be the acquisition of someone or something’s complete profile, rather than making a quick buck by stealing credit card details or distributing spam.
- NEXT GENERATION STUXNET
- The emergence in 2010 of the technologically sophisticated Stuxnet worm that attacked industrial-class programmable logic controllers, was an impressive demonstration to the whole world of just what the cybercriminals’ arsenals contain, as well as a wake-up call to the IT security industry because of how difficult it was to counteract. It cannot be ruled out that governments and commercial organizations will make use of Stuxnet-like programs for their own ends.
- MORE THREATS TARGETING 64-BIT PLATFORMS
- The primary method of carrying out malware and hacker attacks will make use of vulnerabilities in legitimate software and will be carried out via browsers. There will be an increase in the number of threats targeting 64-bit platforms, as well as more attacks on mobile devices, mobile operating systems and users of social networks. However, DDoS attacks will remain one of the biggest problems plaguing the Internet