The 8 Biggest Security Threats for 2010 - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next 5. Increased use of multi-link relays to deliver malware-6 Next

5. Increased use of multi-link relays to deliver malware

Attacks that feature multiple relays (from search results to one or more hacked blog pages to the malware deliverable) will become more prolific and complex in 2010. These types of attacks expect users to come from a specifically defined path and will not execute if the user does not follow that path. This 'path-awareness' makes it very difficult for traditional Web crawlers to find and identify threats. Multi-link attacks will become part of more complex, blended threats in 2010 as cybercriminals employ more layered approaches to avoid detection.

Blue Coat Systems has released a comprehensive list review of security for 2009, and included in the mix are its predictions for the biggest security threats for the coming year.

Among the more notable trends Blue Coat cites:

  • As e-mail continues to get more secure, the bad guys will shift increasingly to social media and even smartphones as their attack vectors of choice.
  • Multi-relay attacks will continue to grow in prevalence.
  • Mobile workers will still be the most vulnerable to attack.

Click through this slideshow for even more information on Blue Coat's predictions for 2010.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.