Top Threat Predictions for 2013 Revealed

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8
Next Next

APTs, also known as advanced persistent threats, are defined by their ability to use sophisticated technology and multiple methods and vectors to reach specific targets to obtain sensitive or classified information. The most recent examples include Stuxnet, Flame and Gauss.

In 2013, Fortinet predicts that we'll see APTs targeted at the civilian population, which includes CEOs, celebrities and political figures. Verifying this prediction will be difficult, however, because after attackers get the information they're looking for, they can quietly remove the malware from a target device before the victim realizes that an attack has even occurred. What's more, individuals who do discover they have been victims of an APT will likely not report the attack to the media. Because these attacks will first affect individuals and not directly critical infrastructure, governments or public companies, some types of information being targeted will be different. Attackers will look for information they can leverage for criminal activities such as blackmail, threatening to leak information unless payment is received.

Fortinet, a leader in high-performance network security, recently revealed FortiGuard Labs' 2013 threat predictions, highlighting six threats to watch out for next year. Expected trends include mobile advanced persistent threats, IPv6 safe havens and exploits through machine-to-machine communications.

 

Related Topics : Network Security, Unified Threat Management

 
More Slideshows

Security62-290x195 Seven Ways to Improve Cybersecurity Through Behavioral Analysis

No matter how advanced SIEM tools become, security pros must back up their findings with data rooted in the company's daily IT activities in order to glean valuable insights. ...  More >>

LogicalisSecurityBizEnabler0x Beyond Protection: Security as a Business Enabler

What if security tools could do more? What if they could enable the business by providing deeper visibility and a better understanding of how corporate compute resources are being used? ...  More >>

Security60-190x128 Seven Data and Information Security Mistakes Even Smart Companies Make

It's not always lack of resources that leads to vulnerabilities, although for some that's an issue -- it's often about common traps that are easily avoidable. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date