Top Threat Predictions for 2013 Revealed

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8
Next Next

APTs, also known as advanced persistent threats, are defined by their ability to use sophisticated technology and multiple methods and vectors to reach specific targets to obtain sensitive or classified information. The most recent examples include Stuxnet, Flame and Gauss.

In 2013, Fortinet predicts that we'll see APTs targeted at the civilian population, which includes CEOs, celebrities and political figures. Verifying this prediction will be difficult, however, because after attackers get the information they're looking for, they can quietly remove the malware from a target device before the victim realizes that an attack has even occurred. What's more, individuals who do discover they have been victims of an APT will likely not report the attack to the media. Because these attacks will first affect individuals and not directly critical infrastructure, governments or public companies, some types of information being targeted will be different. Attackers will look for information they can leverage for criminal activities such as blackmail, threatening to leak information unless payment is received.

Topics : Network Security, Unified Threat Management

Fortinet, a leader in high-performance network security, recently revealed FortiGuard Labs' 2013 threat predictions, highlighting six threats to watch out for next year. Expected trends include mobile advanced persistent threats, IPv6 safe havens and exploits through machine-to-machine communications.

 

More Slideshows

Misc40-290x195 Ten Vulnerabilities that Impact Enterprise Cloud Apps

With increased popularity comes more attention from malicious hackers trying to access PII and other sensitive data. It's more critical than ever before to understand how -- and where -- you're storing your data, and the variety of vulnerabilities that can exist in the apps in your network. ...  More >>

EmulexNetworkMonitoring0x Network Visibility Can Help Avoid the IT Blame Game

Study finds that nearly half of network operations staff do not use network monitoring tools, limiting visibility into network events and leading to finger pointing among IT groups. ...  More >>

AlienVaultCFOSecurityInvestment0x Five Ways a CFO Can Invest in Securing Their Organization

Considering the costs related to security, it's no wonder that the CFO might struggle a bit in regards to investing in this part of the business. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.