The 8 Biggest Security Threats for 2010 - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next 5. Increased use of multi-link relays to deliver malware-6 Next

5. Increased use of multi-link relays to deliver malware

Attacks that feature multiple relays (from search results to one or more hacked blog pages to the malware deliverable) will become more prolific and complex in 2010. These types of attacks expect users to come from a specifically defined path and will not execute if the user does not follow that path. This 'path-awareness' makes it very difficult for traditional Web crawlers to find and identify threats. Multi-link attacks will become part of more complex, blended threats in 2010 as cybercriminals employ more layered approaches to avoid detection.

Blue Coat Systems has released a comprehensive list review of security for 2009, and included in the mix are its predictions for the biggest security threats for the coming year.

Among the more notable trends Blue Coat cites:

  • As e-mail continues to get more secure, the bad guys will shift increasingly to social media and even smartphones as their attack vectors of choice.
  • Multi-relay attacks will continue to grow in prevalence.
  • Mobile workers will still be the most vulnerable to attack.

Click through this slideshow for even more information on Blue Coat's predictions for 2010.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.