McAfee predicts rapid evolution of cyberthreats in 2013
TweetFollow Us on Twitter

McAfee predicts rapid evolution of cyberthreats in 2013

McAfee has released its annual "2013 Threat Predictions" report, highlighting the top threats McAfee Labs foresees for 2013.

Using its proprietary Global Threat Intelligence (GTI), the McAfee Labs team analyzed data on malware, vulnerabilities and online threats in 2012 to predict which trends will increase in 2013. In the coming year, McAfee Labs expects that threats to mobile devices will become even more of a focus of cybercriminals, the influence of the hacktivist group "Anonymous" will decline, and large-scale attacks that attempt to destroy infrastructure will increase.

"Cybercriminals and hacktivists will strengthen and evolve the techniques and tools they use to assault our privacy, bank accounts, mobile devices, businesses, organizations and homes," says said Vincent Weafer, senior vice president of McAfee Labs. "Our 2013 Threat Predictions provides the general public, governments and businesses not only with the top risks in the year to come to be aware of, but also the preventative measures that should be taken to avoid those risks from occurring. Only by understanding and preparing for threats, can we empower people to secure their information."

McAfee Labs foresees the following trends for 2013:

° Rapid evolution and growth in mobile malware

In 2012 McAfee Labs saw the number of mobile threats increase dramatically as ransomware expanded into mobile devices. The development and deployment of increasingly sophisticated ransomware technologies that will "lock up" a phone or tablet, and threaten to keep it that way until a ransom is paid, will be a prominent trend in 2013.

The harsh reality of these schemes is that users have no way of knowing if their device will be unlocked even if they do meet the perpetrator’s demands. Since attackers hijack the users’ ability to access data, victims will be faced with either losing their data or paying a ransom in the hope of regaining access.

° A new mobile worm will go on a major shopping spree in 2013

With the Android/Marketpay, a Trojan horse program buys apps without user permission. In 2013 cyber-crooks will take this malware’s app-buying payload and add it to a mobile worm so attackers won’t need victims to install a piece of malware. In addition, mobile phones with NFC-enabled “digital wallets” are an easy target for cyber-thieves.

Attackers will create mobile worms with NFC capabilities to steal money via the "bump and infect" method, most commonly used in areas with dense populations like airports and malls.

° Hacktivism -- The decline of Anonymous

Due to many uncoordinated and unclear operations and false claims, the Anonymous hacktivist movement will slow down in 2013. Anonymous’ level of technical sophistication has stagnated and its tactics are better understood by its potential victims, and as such, the group’s level of success will decline. While hacktivist attacks won’t end in 2013, if ever, they are expected to decline in number and sophistication.

° Nation states and armies will be more frequent actors and victims of cyberthreats

Patriot groups self-organized into cyberarmies have had little impact up until this point, but their actions will improve in sophistication and aggressiveness. In 2013, many more of the world’s military units will be on the front line of social networks communicating more frequently. State-related threats will increase and make the headlines while suspicions about government-sponsored attacks will grow.

° Crimeware and hacking as a service expand

Cybercriminals are notorious for going onto public forums to make business deals with other criminals in to offer not only software, but also hacking as a service. As the number of invitation-only criminal forums requiring registration fees is increasing to make forums more secure and anonymous, these offers will be easier to find on the Internet in 2013.

Citadel will become the Trojan of choice among cybercriminals

With the recent release of Citadel Rain, the Trojan can now dynamically retrieve configuration files, enabling a fraudster to send a targeted payload to a single victim or a selection of victims. Detection will become more difficult as the footprint on the endpoint is minimal until the attack actually occurs.

Big scale attacks increase

Recently, McAfee Labs has seen several attacks in which the only goal was to cause as much damage as possible- a behavior that is expected to grow exponentially in 2013. If attackers can install destructive malware on a large number of machines, the result can be devastating. To keep the business running, production networks and SCADA industrial control systems should remain completely separate from the normal network, to prevent it from getting hit in the first place.

For a full copy of the 2013 Threat Predictions report from McAfee Labs, with additional threats, please visit: http://www.mcafee.com/us/resources/reports/rp-threat-predictions-2013.pdf .

 
AAPL
$100.35
Apple Inc.
-0.06
GOOG
$732.66
Alphabet Inc.
+8.54
MSFT
$52.32
Microsoft Corporation
+0.43
MacNews Search:
Community Search:
view counter

view counter
view counter
view counter
view counter
view counter
view counter

How to become the ultimate robot warrior...
Chrono Strike is a delightfully immersive beat ‘em up with a sense of humor (any game with a good Sims reference gets points in my book). [Read more] | Read more »
Tips and tricks to get a higher score in...
Snow Roll is a devilish endless runner very much in the vein of Flappy Bird. It revels in its dastardly level of difficulty, and doesn’t really care how angry you get at it as it knows you’ll keep coming back for more. [Read more] | Read more »
How to win big in Slots Deluxe
Cheating while gambling is illegal and morally wrong, and in some parts of the world it leads to men with names like Vinnie "Six Knuckles" Manchenzo beating you to a pulp in a dark alley. [Read more] | Read more »
How to take over the world in Dictator 2
Running a country isn't easy - especially when you're a dictator who wants to take over the world and crush everyone in your path while you do it. [Read more] | Read more »
Tips and tricks to get a higher score in...
Tank.iois - you guessed it! - another multiplayer arena battler likeAgar.io and Slither.io. It does differentiate itself by putting you in a tiny tank though, so it's not exactly the same. To help you get that all-important high score, we've got a few tips and tricks for you. [Read more] | Read more »
How to unlock characters in One Tap Tenn...
As the title suggests, One Tap Tennis requires only a single tap to play its particular brand of tennis, and rewards you with a ton of unlockable characters if you perform well. Fortunately for you, we at 148Apps have got a few tips and tricks to help get you up to speed. [Read more] | Read more »
Grab it now: Game Craft’s Legend of War...
The real time strategy game is now available for you to sink your teeth into, through the App Store and Google Play. Combining elements of skill, strategy and empire building, Legend of War is a real gamers’ game. [Read more] | Read more »
Skateboard Party 3 ft. Greg Lutzka (Gam...
Skateboard Party 3 ft. Greg Lutzka 1.0 Device: iOS Universal Category: Games Price: $1.99, Version: 1.0 (iTunes) Description: Skateboard Party is back! This third edition of the popular sports franchise features professional skater Greg Lutzka. Skateboard Party 3 brings the thrill of skateboarding to your mobile device! Hop on your... | Read more »
Cubious (Games)
Cubious 1.0 Device: iOS Universal Category: Games Price: $.99, Version: 1.0 (iTunes) Description: Cubious – How smart are you? How high is your IQube?Solve the impossible puzzles to find out, and help a lost little cube find his family. | Read more »
Goat Simulator Waste of Space (Games)
Goat Simulator Waste of Space 1.1 Device: iOS Universal Category: Games Price: $4.99, Version: 1.1 (iTunes) Description: ** IMPORTANT - SUPPORTED DEVICESiPhone 4S, iPad 2, iPod Touch 5 or better.** | Read more »
All contents are Copyright 1984-2010 by Xplain Corporation. All rights reserved. Theme designed by Icreon.