Top Threat Predictions for 2013 Revealed

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8
Next Next

APTs, also known as advanced persistent threats, are defined by their ability to use sophisticated technology and multiple methods and vectors to reach specific targets to obtain sensitive or classified information. The most recent examples include Stuxnet, Flame and Gauss.

In 2013, Fortinet predicts that we'll see APTs targeted at the civilian population, which includes CEOs, celebrities and political figures. Verifying this prediction will be difficult, however, because after attackers get the information they're looking for, they can quietly remove the malware from a target device before the victim realizes that an attack has even occurred. What's more, individuals who do discover they have been victims of an APT will likely not report the attack to the media. Because these attacks will first affect individuals and not directly critical infrastructure, governments or public companies, some types of information being targeted will be different. Attackers will look for information they can leverage for criminal activities such as blackmail, threatening to leak information unless payment is received.

Fortinet, a leader in high-performance network security, recently revealed FortiGuard Labs' 2013 threat predictions, highlighting six threats to watch out for next year. Expected trends include mobile advanced persistent threats, IPv6 safe havens and exploits through machine-to-machine communications.

 

Related Topics : Network Security, Unified Threat Management

 
More Slideshows

SurfWatch2014Q3IT0x IT Industry Shellshocked in Q3: How to Plan for What's Next

Making the right investments can minimize the cyber risks your organization faces, but this requires looking at the complete picture and not just a few pieces. ...  More >>

Security48-290x195 Five Myths Holding Your Security Program Back

In reviewing this list, continue to ask yourself how to apply the advice to your organization and its unique cybersecurity ecosystem. ...  More >>

Misc40-190x128 Ten Vulnerabilities that Impact Enterprise Cloud Apps

With increased popularity comes more attention from malicious hackers trying to access PII and other sensitive data. It's more critical than ever before to understand how -- and where -- you're storing your data, and the variety of vulnerabilities that can exist in the apps in your network. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Close
Thanks for your registration, follow us on our social networks to keep up-to-date