Those were the findings made by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2013. The report was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.
According to GTISC, GTRI and the experts cited in the report, specific threats to follow over the coming year include, among others:
• Cloud-based Botnets – The ability to create vast, virtual computing resources will further convince cyber criminals to look for ways to co-opt cloud-based infrastructure for their own ends. One possible example is for attackers to use stolen credit card information to purchase cloud computing resources and create dangerous clusters of temporary virtual attack systems.
• Search History Poisoning – Cyber criminals will continue to manipulate search engine algorithms and other automated mechanisms that control what information is presented to Internet users. Moving beyond typical search-engine poisoning, researchers believe that manipulating users’ search histories may be a next step in ways that attackers use legitimate resources for illegitimate gains.
• Mobile Browser and Mobile Wallet Vulnerabilities – While only a very small number of U.S. mobile devices show signs of infection, the explosive proliferation of smartphones will continue to tempt attackers in exploiting user and technology-based vulnerabilities, particularly with the browser function and digital wallet apps.
• Malware Counteroffensive – The developers of malicious software will employ various methods to hinder malware detection, such as hardening their software with techniques similar to those employed in Digital Rights Management (DRM), and exploiting the wealth of new interfaces and novel features on mobile devices.
“Every year, security researchers and experts see new evolutions in cyber threats to people, businesses and governments,” said Wenke Lee, director of GTISC. “In 2013, we expect the continued movement of business and consumer data onto mobile devices and into the cloud will lure cyber criminals into attacking these relatively secure, but extremely tempting, technology platforms. Along with growing security vulnerabilities within our national supply chain and healthcare industry, the security community must remain proactive, and users must maintain vigilance, over the year ahead.”
"Our adversaries, whether motivated by monetary gain, political/social ideology or otherwise, know no boundaries, making cyber security a global issue,” said Bo Rotoloni, director of GTRI’s Cyber Technology and Information Security Laboratory (CTISL). “Our best defense on the growing cyber warfront is found in cooperative education and awareness, best-of-breed tools and robust policy developed collaboratively by industry, academia and government.”
Today’s Georgia Tech Cyber Security Summit is one forum where the IT security ecosystem can gather together to discuss and debate the evolving nature of cyber threats, and to chart the course for creating solutions through collaborations among industry, government and academia. The 2012 Summit was keynoted by Brendan Hannigan, IBM Internet Security and included a panel of security experts from Damballa, AirWatch, E*TRADE, MAAWG, Pindrop Security and Symantec Research Lab.
The Georgia Institute of Technology is one of the nation's leading public research universities and the home of groundbreaking cyber security research and academic initiatives through GTISC, GTRI and other facilities across campus. These efforts are focused on producing technology and innovation that will help drive economic growth, while improving human life on a global scale.
The report can be downloaded by visiting http://www.gtsecuritysummit.com/report.html
Further Reports about: computing resource > Cyber Chemistry > Cyber Security > Economic Forecast > GTISC > GTRI > information technology > Internet user > mobile device > Releases > Security Forum > Solar Summits Freiburg > technology platform > Threats
More articles from Information Technology:
Hipster, surfer or biker? Computers may soon be able to tell the difference
11.12.2013 | University of California - San Diego
Electronic mandates for SEPA direct debit transactions
09.12.2013 | Fraunhofer-Institut für Arbeitswirtschaft und Organisation IAO
The molecular architecture of three key proteins and their complexes reveals how plants fine-tune their immune response to pathogens
Plants rarely get sick in their natural environment. When the threat of infection arises, a quick decision is made about the necessary countermeasures. The course is set by a protein which forms complexes with its partner proteins for this purpose.
Jane Parker from the Max Planck Institute for Plant Breeding ...
Researchers studying speciation of butterfly orchids on the Azores have been startled to discover that the answer to a long-debated question "Do the islands support one species or two species?" is actually "three species".
Hochstetter's Butterfly-orchid, newly recognized following application of a battery of scientific techniques and reveling in a complex taxonomic history worthy of Sherlock Holmes, is arguably Europe's rarest orchid species. Under threat in its mountain-top retreat, the orchid urgently requires conservation recognition.
A lavishly illustrated publication, titled "Systematic revision of Platanthera in ...
Researchers from Brown University and the University of Hawaii have found some mineralogical surprises in the Moon's largest impact crater.
Data from the Moon Mineralogy Mapper that flew aboard India's Chandrayaan-1 lunar orbiter shows a diverse mineralogy in the subsurface of the giant South Pole Aitken basin.
The differing mineral signatures could be reflective of the minerals dredged up at the time of the giant impact 4 billion years ago, ...
In power electronics systems bonded connections create the central electrical connections between adjoining surfaces.
The quality of these bonded connections is one of the main factors that determines the reliability and availability of drive systems in electric vehicles, and hence constitutes a major design challenge for German auto manufacturers aiming to electrify their vehicles.
Now the partners participating in the RoBE (Robust Bonds in ...
International team of scientists develops new feedback method for optimizing the laser pulse shapes used in the control of chemical reactions
In many ways, traditional chemical synthesis is similar to cooking. To alter the final product, you can change the ingredients or their ratio, change the method of mixing ingredients, or change the temperature or pressure of the environment of the ingredients.
Like an accomplished chef, chemists have become very skilled ...
11.12.2013 | Information Technology
11.12.2013 | Life Sciences
11.12.2013 | Agricultural and Forestry Science
11.12.2013 | Event News
10.12.2013 | Event News
05.12.2013 | Event News