Top Threat Predictions for 2013 Revealed

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8
Next Next

APTs, also known as advanced persistent threats, are defined by their ability to use sophisticated technology and multiple methods and vectors to reach specific targets to obtain sensitive or classified information. The most recent examples include Stuxnet, Flame and Gauss.

In 2013, Fortinet predicts that we'll see APTs targeted at the civilian population, which includes CEOs, celebrities and political figures. Verifying this prediction will be difficult, however, because after attackers get the information they're looking for, they can quietly remove the malware from a target device before the victim realizes that an attack has even occurred. What's more, individuals who do discover they have been victims of an APT will likely not report the attack to the media. Because these attacks will first affect individuals and not directly critical infrastructure, governments or public companies, some types of information being targeted will be different. Attackers will look for information they can leverage for criminal activities such as blackmail, threatening to leak information unless payment is received.

Topics : Network Security, Unified Threat Management

Fortinet, a leader in high-performance network security, recently revealed FortiGuard Labs' 2013 threat predictions, highlighting six threats to watch out for next year. Expected trends include mobile advanced persistent threats, IPv6 safe havens and exploits through machine-to-machine communications.

 

More Slideshows

Security28-290x195 Nine Questions to Ask When Selecting a Security Vendor

You need it. They claim to have it. What questions should you be asking as you hunt for the "just right" vendor to help you defend against the most sophisticated and determined adversaries?  ...  More >>

Telecommuting2-290x195 Five Ways to Ensure Remote Workers Are Sharing and Accessing Files Securely

The increase in organizations encouraging or offering telecommuting programs demonstrates a strong, immediate need for secure remote access and file-sharing strategies for the enterprise. ...  More >>

Security25-290x195 Five Digitally Vulnerable Areas Your Business May Be Overlooking

Data breaches cost millions of dollars. Here are five commonly overlooked digital devices that could be a point of access for a security breach. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.