Featured Research

from universities, journals, and other organizations

Cyber threats forecast for 2012 released

Date:
October 12, 2011
Source:
Georgia Institute of Technology
Summary:
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy, according to computer security experts.

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2012. The report was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.

Related Articles


According to GTISC, GTRI and the experts cited in the report, specific threats to follow over the coming year include, among others:

  • Search Poisoning -- Attackers will increasingly use SEO techniques to optimize malicious links among search results, so that users are more likely to click on a URL because it ranks highly on Google or other search engines.
  • Mobile Web-based Attacks -- Expect increased attacks aimed specifically against mobile Web browsers as the tension between usability and security, along with device constraints (including small screen size), make it difficult to solve mobile Web browser security flaws.
  • Stolen Cyber Data Use for Marketing -- The market for stolen cyber data will continue to evolve as botnets capture private user information shared by social media platforms and sell it directly to legitimate business channels such as lead-generation and marketing.

"We continue to witness cyber attacks of unprecedented sophistication and reach, demonstrating that malicious actors have the ability to compromise and control millions of computers that belong to governments, private enterprises and ordinary citizens," said Mustaque Ahamad, director of GTISC. "If we are going to prevent motivated adversaries from attacking our systems, stealing our data and harming our critical infrastructure, the broader community of security researchers -- including academia, the private sector and government -- must work together to understand emerging threats and to develop proactive security solutions to safeguard the Internet and physical infrastructure that relies on it."

Today's Georgia Tech Cyber Security Summit is one forum where the IT security ecosystem can gather together to discuss and debate the evolving nature of cyber threats, and to chart the course for creating solutions through collaborations among industry, government and academia. The Summit was keynoted by Admiral William J. Fallon, U.S. Navy (retired) and included a panel of security experts from Equifax, The Financial Services Roundtable, Mobile Active Defense, Reputation.com and GTRI.

"Our adversaries, whether motivated by monetary gain, political/social ideology, or otherwise are becoming increasingly sophisticated and better funded," said Bo Rotoloni, director of GTRI's Cyber Technology and Information Security Laboratory (CTISL). "Acting as individuals or groups, these entities know no boundaries, making cyber security a global problem. We can no longer assume our data is safe sitting behind perimeter-protected networks. Attacks penetrate our systems through ubiquitous protocols, mobile devices and social engineering, circumventing the network perimeter. Our best defense on the growing cyber warfront is found in cooperative education and awareness, best-of-breed tools and robust policy developed collaboratively by industry, academia and government."

The Georgia Institute of Technology is one of the nation's leading public research universities and the home of groundbreaking cyber security research and academic initiatives through GTISC, GTRI and other facilities across campus. These efforts are focused on producing technology and innovation that will help drive economic growth, while improving human life on a global scale.

The complete 2012 Cyber Threat Report is available at: http://gtsecuritysummit.com/report.html


Story Source:

The above story is based on materials provided by Georgia Institute of Technology. Note: Materials may be edited for content and length.


Cite This Page:

Georgia Institute of Technology. "Cyber threats forecast for 2012 released." ScienceDaily. ScienceDaily, 12 October 2011. <www.sciencedaily.com/releases/2011/10/111011132050.htm>.
Georgia Institute of Technology. (2011, October 12). Cyber threats forecast for 2012 released. ScienceDaily. Retrieved October 25, 2014 from www.sciencedaily.com/releases/2011/10/111011132050.htm
Georgia Institute of Technology. "Cyber threats forecast for 2012 released." ScienceDaily. www.sciencedaily.com/releases/2011/10/111011132050.htm (accessed October 25, 2014).

Share This



More Science & Society News

Saturday, October 25, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Texas Nurse Nina Pham Cured of Ebola

Texas Nurse Nina Pham Cured of Ebola

AFP (Oct. 25, 2014) An American nurse who contracted Ebola while caring for a Liberian patient in Texas has been declared free of the virus and will leave the hospital. Duration: 01:01 Video provided by AFP
Powered by NewsLook.com
Ebola Protective Suits Being Made in China

Ebola Protective Suits Being Made in China

AFP (Oct. 24, 2014) A factory in China is busy making Ebola protective suits for healthcare workers and others fighting the spread of the virus. Duration: 00:38 Video provided by AFP
Powered by NewsLook.com
WHO: Millions of Ebola Vaccine Doses by 2015

WHO: Millions of Ebola Vaccine Doses by 2015

AP (Oct. 24, 2014) The World Health Organization said on Friday that millions of doses of two experimental Ebola vaccines could be ready for use in 2015 and five more experimental vaccines would start being tested in March. (Oct. 24) Video provided by AP
Powered by NewsLook.com
Microsoft Riding High On Strong Surface, Cloud Performance

Microsoft Riding High On Strong Surface, Cloud Performance

Newsy (Oct. 24, 2014) Microsoft's Q3 earnings showed its tablets and cloud services are really hitting their stride. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Science & Society

Business & Industry

Education & Learning

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins