The 8 Biggest Security Threats for 2010 - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next 4. Search engine manipulation will continue to drive malware-5 Next

4. Search engine manipulation will continue to drive malware

Search engine manipulation is a method cybercriminals use to exploit search engine algorithms to position hacked sites higher in the results. It provides an easy way to drive users to malicious sites, particularly bait pages that offer fake antivirus, fake video codecs or other 'warez' (most commonly pirated software, games, music or other products). Malware spread through search engines is expected to increase in 2010 due to the high degree of trust users place on search engines, as well as the relative ease with which results can be manipulated.

Blue Coat Systems has released a comprehensive list review of security for 2009, and included in the mix are its predictions for the biggest security threats for the coming year.

Among the more notable trends Blue Coat cites:

  • As e-mail continues to get more secure, the bad guys will shift increasingly to social media and even smartphones as their attack vectors of choice.
  • Multi-relay attacks will continue to grow in prevalence.
  • Mobile workers will still be the most vulnerable to attack.

Click through this slideshow for even more information on Blue Coat's predictions for 2010.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.