Dec 20, 201112:12 PMBlog

IID names top Internet security threats

Dec 20, 2011 - 12:12 PM
Online voting, the London Summer Olympics and exploits of enterprise top the list of Internet Identity's security concerns for 2012.
 
"Cyber criminals have gotten much smarter about capitalizing on current events to swindle victims. In this sense, cyber criminals are acting just as much like psychologists and pollsters as thieves," said IID President and CTO Rod Rasmussen. "In 2012, there are several events that cybercriminals have had years to prepare for."
The Tacoma-based company says the following are top enterprise security risks to watch out for during the coming year:
 
• London Summer Olympics cyber attacks:  Heading into the 2012 London Summer Olympics, cybercriminals will look to capitalize on the hype by tricking people with phishing scams impersonating the Summer Olympics official website and/or official Summer Olympics vendors.

• Elections altered: With 2012 being a U.S. presidential election year and many U.S. states allowing military and overseas voting via the Internet, cybercriminals are expected to try and take advantage. The greatest areas of concern involve direct attacks on voting machines, which have been shown in numerous examples to be easily accomplished; hacking of vote tally databases; or hijacking the network infrastructure between them all.
 
• 12/21/2012 danger: Much has been said and speculated about the Mayan "end of times" of Dec. 21, 2012. Bank on the fact that cyber criminals will play into this fear through targeted phishing and malware attacks playing on people's heightened awareness surrounding 12/21/2012.
 
• Internet infrastructure attacks for financial gain: While hacktivism will persist, expect Domain Name System and Border Gateway Protocol attacks for financial gain to grab headlines. Indicative of this trend is the December 2010 DNS hijacking of large European payment processor ChronoPay in which cyber criminals collected at least 800 credit card numbers of its customers.
 
• Physical infrastructure attacks carried out over the Internet: Expect to see real world infrastructure damage (power plants, utilities) and destruction of enterprises' physical assets, both threatened and caused, by hacking. Expect the criminal world to take advantage of cyber security holes to create real-world damage too, as they have long used techniques like distributed denial-of-service attacks to extort money from victims.

            

Edit Module
Advertisement
Bookmark and Share Email this page Email Print this page Print Feed Feed
Edit Module
Advertisement

About This Blog

Follow our blog for all the latest in local business news. To get the top local business news, subscribe to Daily Biz Briefs email newsletter. As a reader of this FREE email you get breaking business news each business day afternoon delivered right to your email inbox.

 

Feed

Atom Feed Subscribe to the Blog Feed »

Recent Posts

Archives

Categories