Top Threat Predictions for 2013 Revealed

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Next

APTs, also known as advanced persistent threats, are defined by their ability to use sophisticated technology and multiple methods and vectors to reach specific targets to obtain sensitive or classified information. The most recent examples include Stuxnet, Flame and Gauss.

In 2013, Fortinet predicts that we'll see APTs targeted at the civilian population, which includes CEOs, celebrities and political figures. Verifying this prediction will be difficult, however, because after attackers get the information they're looking for, they can quietly remove the malware from a target device before the victim realizes that an attack has even occurred. What's more, individuals who do discover they have been victims of an APT will likely not report the attack to the media. Because these attacks will first affect individuals and not directly critical infrastructure, governments or public companies, some types of information being targeted will be different. Attackers will look for information they can leverage for criminal activities such as blackmail, threatening to leak information unless payment is received.

Fortinet, a leader in high-performance network security, recently revealed FortiGuard Labs' 2013 threat predictions, highlighting six threats to watch out for next year. Expected trends include mobile advanced persistent threats, IPv6 safe havens and exploits through machine-to-machine communications.


Related Topics : Network Security, Unified Threat Management

More Slideshows

Security86-290x195 Reduce Data Breach Damage by Improving Detection and Response

The new age of security technology will focus on solutions that speed up, automate and ideally combine phases of the typical security process. ...  More >>

DistilNetworkWebAppSecurity0x 8 Web App Security Best Practices to Fight Off Bot Intrusions

Securing web apps from the millions of bad bots that attempt to penetrate them each year can seem like a daunting task, but there are steps that will help mitigate the risks. ...  More >>

Security83-290x195 What Risks Are Hiding in Your Data? Seven Scary Stories

Beyond the legal ramifications and expense of data exposure, a security breach can put sensitive data belonging to your clients, employees and partners in the wrong hands – leading to issues with online fraud, identity theft and more. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.