Five Security Predictions for 2012 - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Security Predictions for 2012-4 Next

Want to know a secret for making security predictions? Take a look at what was being discussed at security conferences two to three years ago. At Black Hat DC 2009, Sutton discussed the dangers of persistent Web browser storage. One of the key technologies that will be taking browser storage to the next level is HTML5. In 2009, HTML5 apps were few and far between. Thanks in large part to mobile browsers, HTML5 is now much more mainstream. As with any new technology, developers are quickly rushing to play with the new kid on the block and publishing their goods, without taking the time to understand the security implications.

Prediction: We’ll see an increasing number of Web application vulnerabilities in HTML5 apps, not because the technologies behind it are insecure, but because it is not well understood from a security perspective.

From social media abuse to data breaches to mobile malware and hacktivist activity, 2011 was filled with a vast array of security threats. It’s likely that this activity will only increase as 2012 begins. Michael Sutton, vice president of security research at Zscaler, has joined other prognosticators in identifying the top security threats in store for the coming year.

More Slideshows:


Ten Tips for Better BI Reporting As more employees in a company become responsible for decision-making, easy access to reporting and analysis has become paramount.

Gamification: How 'Kid' Games Transform Business Keep these elements in mind as you help develop and deploy training modules and initiatives.

Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends Existing policies are highly complex, lengthy and written in language that is confusing for the average person to understand.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.