Lavasoft’s list of security predictions for 2010 anticipates the top threats that Internet users should be aware of this coming year as cyber criminals adapt their tactics, finding new ways to con people while they use the Internet.
Expectations for 2010 include not only an increase in malicious Internet attacks, but the online attackers will bolster their tactics using new twists on traditional methods, as well as focusing on newly emerging platforms.
Lavasoft Malware Labs’ analysts anticipate that the following five threat trends will dominate the security landscape in 2010:
1. Malware attacks on Windows 7. With the release of their latest operating system, Microsoft aims to replace Windows XP as the operating system of choice. As users move to Windows 7, malware authors will shift their attention to find ways to exploit the new operating system with targeted attacks.
2. Application vulnerability exploits. Should Windows 7 prove to be more secure – in other words, more difficult for malware authors to exploit – exploiting application vulnerabilities, such as web browser vulnerabilities, will be the next best thing. To compound this, while users have begun to understand the importance of applying operating system patches, they are less aware of the need to apply security updates to applications; patches fixing application vulnerabilities are typically slow to appear, and it’s not always apparent to the user that an update is available and that action needs to be taken – making it an easier malware target.
3. Scareware and rogue (fake) security products. Rogue security software, also known as scareware, take the form of legitimate-looking anti-virus, anti-spyware and anti-malware products and appear to be beneficial from a security perspective; in reality, they provide little or no protection, generate misleading alerts, or attempt to lure users into fraudulent transactions. The money made from this malware model ensures that cyber criminals will not abandon this profitable endeavor. If anything, expect that these attacks will become more stealthy and complex.
4. Compromising non-Windows platforms. Due to increasing discontent with Windows, PC users are experimenting with other operating systems. Ubuntu is one operating system of choice for users new to Linux. Although the quantity of users is limited compared to Windows users, if the attack surface becomes broad enough on a non-Windows operating system, malware writers will investigate ways to compromise those systems.
5. Mobile malware. Smartphones are becoming more ubiquitous and, as more services involving financial transactions are made available to handsets, exploits that leverage vulnerabilities on smartphone operating systems are sure to be targets for cyber criminals. While smartphone security threats have been monitored by malware researchers for some time, recent attacks have brought the issue into focus, stressing the need for additional security. Without a doubt, this is a threat venue to watch in 2010.