McAfee: Threats get small
The days of the mega-outbreak are over as financial motives rule
Computerworld New Zealand - The days of big virus outbreaks like MyDoom, Melissa and SQL Slammer are gone, said Joe Telafici, director of operations for McAfee Inc.'s Avert Labs.
Telafici was speaking at the recent AVAR (Association of Antivirus Asia Researchers) conference, which was held in Auckland. Today's cyber criminals don’t want to draw attention to themselves as the main motivation for cybercrime now is money, not fame, he said.
They are "clearly getting more devious," he said, but law enforcement cooperation across borders is also getting more efficient.
Telafici’s team of around 100 security experts in 16 countries builds McAfee’s security content. But they also educate and cooperate with law enforcement.
At the end of last month, McAfee Avert Labs made 10 security threat predictions for 2007. They are:
- The use of bots, computer programs that perform automated tasks, will increase. Botnetworks will also increase, but there will be a move away from internet relay chat (IRC) towards less obtrusive instant messaging and peer-to-peer communication, said Telafici.
- The number of rootkits on 32-bit platforms will increase, but protection and remediation capabilities will increase too. Telafici said that rootkits are becoming a de facto standard in malicious programs and that they will increase over the next couple of years.
- Vulnerabilities will continue to cause concern, fuelled by the underground market for them. McAfee Avert Labs thinks the number of vulnerabilities will grow because of the increased use of fuzzers -- automated tools and technologies that allow for large-scale testing of applications -- and "bounty programs" that reward researchers for finding vulnerabilities. McAfee is not involved in any such initiatives, said Telafici.
This year, Microsoft Corp. has already announced 140 vulnerabilities, compared with 62 in 2004 and 2005 combined, said McAfee. Also, zero-day attacks are being released soon after "Patch Tuesday" to get the most out of the vulnerability’s window of opportunity, said the company.
- Identity theft and data loss will continue to be issues --computer theft, loss of backups and compromised information systems are at the result of these crimes. According to the U.S. Federal Trade Commission, 10 million Americans are victims of identity fraud each year, said Telafici.
- The number of password-stealing Web sites will increase, using fake sign-in pages for popular online services such as eBay.
- The volume of spam, particularly bandwidth-eating image spam, will continue to increase.
- The popularity of video-sharing on the Web makes it inevitable that hackers will target MPEG files as a way of distributing malicious code.
- Mobile-phone attacks will become more prevalent as mobile devices become "smarter" and more connected.
- Adware will go mainstream, following the increase in commercial Potentially Unwanted Programs (PUPs).
- Parasitic malware that modifies existing files on a disk will make a comeback.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!