Those were the findings made by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2013. The report was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.
According to GTISC, GTRI and the experts cited in the report, specific threats to follow over the coming year include, among others:
• Cloud-based Botnets – The ability to create vast, virtual computing resources will further convince cyber criminals to look for ways to co-opt cloud-based infrastructure for their own ends. One possible example is for attackers to use stolen credit card information to purchase cloud computing resources and create dangerous clusters of temporary virtual attack systems.
• Search History Poisoning – Cyber criminals will continue to manipulate search engine algorithms and other automated mechanisms that control what information is presented to Internet users. Moving beyond typical search-engine poisoning, researchers believe that manipulating users’ search histories may be a next step in ways that attackers use legitimate resources for illegitimate gains.
• Mobile Browser and Mobile Wallet Vulnerabilities – While only a very small number of U.S. mobile devices show signs of infection, the explosive proliferation of smartphones will continue to tempt attackers in exploiting user and technology-based vulnerabilities, particularly with the browser function and digital wallet apps.
• Malware Counteroffensive – The developers of malicious software will employ various methods to hinder malware detection, such as hardening their software with techniques similar to those employed in Digital Rights Management (DRM), and exploiting the wealth of new interfaces and novel features on mobile devices.
“Every year, security researchers and experts see new evolutions in cyber threats to people, businesses and governments,” said Wenke Lee, director of GTISC. “In 2013, we expect the continued movement of business and consumer data onto mobile devices and into the cloud will lure cyber criminals into attacking these relatively secure, but extremely tempting, technology platforms. Along with growing security vulnerabilities within our national supply chain and healthcare industry, the security community must remain proactive, and users must maintain vigilance, over the year ahead.”
"Our adversaries, whether motivated by monetary gain, political/social ideology or otherwise, know no boundaries, making cyber security a global issue,” said Bo Rotoloni, director of GTRI’s Cyber Technology and Information Security Laboratory (CTISL). “Our best defense on the growing cyber warfront is found in cooperative education and awareness, best-of-breed tools and robust policy developed collaboratively by industry, academia and government.”
Today’s Georgia Tech Cyber Security Summit is one forum where the IT security ecosystem can gather together to discuss and debate the evolving nature of cyber threats, and to chart the course for creating solutions through collaborations among industry, government and academia. The 2012 Summit was keynoted by Brendan Hannigan, IBM Internet Security and included a panel of security experts from Damballa, AirWatch, E*TRADE, MAAWG, Pindrop Security and Symantec Research Lab.
The Georgia Institute of Technology is one of the nation's leading public research universities and the home of groundbreaking cyber security research and academic initiatives through GTISC, GTRI and other facilities across campus. These efforts are focused on producing technology and innovation that will help drive economic growth, while improving human life on a global scale.
The report can be downloaded by visiting http://www.gtsecuritysummit.com/report.html
Further Reports about: computing resource > Cyber Chemistry > Cyber Security > Economic Forecast > GTISC > GTRI > information technology > Internet user > mobile device > Releases > Security Forum > Solar Summits Freiburg > technology platform > Threats
More articles from Information Technology:
Wayne State University researcher’s technique helps robotic vehicles find their way, help humans
15.05.2013 | Wayne State University - Office of the Vice President for Research
DMTF, ETSI, OASIS, OCEAN, OGF, OW2 and SNIA announce Cloud Interoperability Week
15.05.2013 | FOKUS - Fraunhofer-Institut für Offene Kommunikationssysteme
University of Würzburg physicists have succeeded in creating a new type of laser.
Its operation principle is completely different from conventional devices, which opens up the possibility of a significantly reduced energy input requirement. The researchers report their work in the current issue of Nature.
It also emits light the waves of which are in phase with one another: the polariton laser, developed ...
Innsbruck physicists led by Rainer Blatt and Peter Zoller experimentally gained a deep insight into the nature of quantum mechanical phase transitions.
They are the first scientists that simulated the competition between two rival dynamical processes at a novel type of transition between two quantum mechanical orders. They have published the results of their work in the journal Nature Physics.
“When water boils, its molecules are released as vapor. We call this ...
Researchers have shown that, by using global positioning systems (GPS) to measure ground deformation caused by a large underwater earthquake, they can provide accurate warning of the resulting tsunami in just a few minutes after the earthquake onset.
For the devastating Japan 2011 event, the team reveals that the analysis of the GPS data and issue of a detailed tsunami alert would have taken no more than three minutes. The results are published on 17 May in Natural Hazards and Earth System Sciences, an open access journal of ...
A new study of glaciers worldwide using observations from two NASA satellites has helped resolve differences in estimates of how fast glaciers are disappearing and contributing to sea level rise.
The new research found glaciers outside of the Greenland and Antarctic ice sheets, repositories of 1 percent of all land ice, lost an average of 571 trillion pounds (259 trillion kilograms) of mass every year during the six-year study period, making the oceans rise 0.03 inches (0.7 mm) per year. ...
About 99% of the world’s land ice is stored in the huge ice sheets of Antarctica and Greenland, while only 1% is contained in glaciers.
However, the meltwater of glaciers contributed almost as much to the rise in sea level in the period 2003 to 2009 as the two ice sheets: about one third. This is one of the results of an international study with the involvement of geographers from the University of Zurich.
21.05.2013 | Studies and Analyses
21.05.2013 | Life Sciences
21.05.2013 | Studies and Analyses
17.05.2013 | Event News
15.05.2013 | Event News
08.05.2013 | Event News