As we reach the final month of the year, it's time to reflect on the year gone by and look ahead to what the next year might hold.
So here's a look at what 2011 holds in store for security - with a little help from some outside sources.
Malware attacks in general have already evolved over the years from a napalm, carpet-bombing approach designed for maximum disruption and notoriety to attacks focused on remaining undetected and stealing money or identity information (in order to steal money in most cases). That evolution is continuing, though, with even more precise attacks.
A MessageLabs blog explains:"One of the most threatening advances in malware during 2010 broadened the range of targets beyond PCs and servers when the Stuxnet Trojan attacked programmable logic controllers. This specialised malware written to exploit physical infrastructures will continue in 2011 driven by the huge sums of money available to criminal enterprises at low risk of prosecution."
2010 saw the Stuxnet worm - apparently developed specifically with the goal of compromising Iranian nuclear reactor functionality, and the attack launched against Google (and a number of other companies) - seemingly orchestrated by the government of China if the WikiLeaks documents are accurate. Malware attacks are now a tool for both corporate and government espionage, giving IT admins one more thing to worry about.
Ripped from the headlines
Social engineering is all about catching users off guard and luring them into clicking on malicious links or sharing sensitive information. It is common for attackers to exploit breaking news as malware bait. Events like the World Cup or the BP oil spill in the Gulf of Mexico are popular topics that generate broad interest. Headline news often becomes the bait for malicious spam and phishing attacks, duping unsuspecting victims.
Attackers have a new way to exploit current events, though, and that trend will continue in 2011. Malware developers have figured out how to game search engines to get malicious links featured prominently in search results. MessageLabs suggests that in 2011 rather than "just promoting compromised websites through search engine optimisation they will proactively identify websites likely to see higher than normal levels of traffic based on current events or hot topics on the internet".
Beware the web
Attackers figured out long ago that the web is the easiest way into most networks. Firewalls are designed to restrict unauthorised traffic, and generally block network activity on virtually all ports - except port 80. The web is so commonly used that attacks travelling through port 80 are much less likely to be detected.
Now, the web is not only commonly used as the web, but increasingly it is becoming the everything. Web-based -mail and productivity applications, and cloud storage are part of the mainstream now, making the web an even more attractive target.
A spokesperson from Palo Alto Networks describes how current trends increase the security concern. "Consolidation of various messaging platforms (chat, social media, email) into web services (Gmail, Facebook etc) will increase - making it an attractive target for hackers who want to break into the corporate network."
NEXT PAGE: Low-hanging fruit
- What's in store for security next year
- Low-hanging fruit
As we reach the last month of the year, it's time to reclect on the year gone by and look ahead to what the next year might hold. So here's a look at what 2011 holds in store for security - with a little help from some outside sources.
Why bother banging your head against the wall trying to figure out how to blast through a locked steel door if the window is open? That about sums up the mentality of malware developers and attackers when it comes to breaking into PCs.
Palo Alto Networks explains: "Hackers will prefer to break-in through the back door or side window instead of a full frontal attack on the front door of Facebook and other social media sites".
That is true for PCs and mobile devices as well. IT admins will still have to monitor and protect the primary platforms - be it Windows, Facebook, an Android smartphone etc - but will also have to scramble to ensure that the various networks and applications those platforms are connected to don't leave a window open for attackers.
Aside from the threat posed by insecure network partners and poorly-coded third-party applications, the general trend from users sitting at fixed locations safely tucked inside an office building inside of the 'network perimeter' poses an increased risk.
Laptops and netbooks - are becoming the norm and replacing desktops as the standard issue hardware in many organisations. Combined with the explosion of smartphones and tablets, users are now connecting to email, files and other network resources from virtually anywhere.
While setting up office from a neighbourhood coffee shop or hotel reception while on the go is obviously convenient, it is a security nightmare. Public wireless networks are prone to snooping, and just accessing sensitive information in a public area can unwittingly expose it.
IT admins can guard against those threats by requiring a secure VPN connection to connect with company resources, and by implementing policies preventing users from conducting work in public areas. However, dealing with the sensitive data stored on the mobile devices is a more difficult issue.
The same small size and portability that makes mobile computing devices like netbooks, tablets and smartphones so convenient also makes them easily lost or stolen. These devices commonly have gigabytes upon gigabytes of storage capacity, and may hold sensitive data. Attackers know this, and mobile devices will be a common target for theft - both casual theft for the value of the device itself, as well as more targeted attacks aimed at mobile devices of executive managers or key personnel.
- What's in store for security next year
- Low-hanging fruit