Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.
  • 14 November 2012 10:09

Seven 2013 Cybersecurity Predictions from Websense Security Labs

Malicious mobile apps, government-sponsored attacks and sandbox avoidance expected

SAN DIEGO - November 13, 2012 - From mass compromises of Wordpress to a spear-phishing attack on the White House, there is no doubt cybercriminals gained confidence and momentum in 2012. To help organisations prepare for next year, the Websense® Security Labs today announced seven predictions for the 2013 threat landscape. Highlights include:

1. Mobile devices will be the new target for cross-platform threats.

The top three mobile platforms cybercriminals will target are Windows 8, Android and iOS. Web-based cross platform exploits will make it easier. In 2013, threats to Microsoft mobile devices will see the highest rate of growth. Cybercriminals are similar to legitimate application developers in that they focus on the most profitable platforms. As development barriers are removed, mobile threats will be able to leverage a huge library of shared code. Attacks will also continue to increasingly use social engineering lures to capture user credentials on mobile devices.

2. Cybercriminals will use bypass methods to avoid traditional sandbox detection.

More organisations are utilising virtual machine defences to test for malware and threats. As a result, attackers are taking new steps to avoid detection by recognising virtual machine environments. Some potential methods will attempt to identify a security sandbox, just as past attacks targeted specific AV engines and turned them off. These advanced attacks will remain hidden until they are sure they aren’t in a virtual security environment.

3. Legitimate mobile app stores will host more malware in 2013.

Malicious apps will increasingly slip through validation processes. They will continue to pose risks to organisations enabling bring your own device (BYOD) policies. In addition, jail-broken/rooted devices and non-sanctioned app stores will pose significant risk to enterprises as more allow BYOD.

4. Government-sponsored attacks will increase as new players enter.

Expect more governments to enter the cyber-warfare arena. In the wake of several publicised cyber-warfare events, there are a number of contributing factors that will drive more countries toward these strategies and tactics. While the effort to become another nuclear superpower may be insurmountable, almost any country can draft the talent and resources to craft cyber-weapons. Countries and individual cybercriminals all have access to the blueprints for previous state-sponsored attacks like Stuxnet, Flame and Shamoon.

5. Expect hacktivists to move to the next level as simplistic opportunities dwindle.

Driven by highly publicised hacktivist events in recent years, organisations have deployed increasingly better detection and prevention policies, solutions and strategies. Hacktivists will move to the next level by increasing their sophistication.

6. Malicious emails are making a comeback.

Timed and targeted spear-phishing email attacks, along with an increase in malicious email attachments, are providing new opportunities for cybercrime. Malicious email will make a comeback. Domain generation algorithms will also bypass current security to increase the effectiveness of targeted attacks.

7. Cybercriminals will follow the crowds to legitimate content management systems and web platforms.

Vulnerabilities in Wordpress have frequently been exploited with mass compromises. As other content management systems (CMS) and service platforms increase in popularity, the bad guys will routinely test the integrity of these systems. Attacks will continue to exploit legitimate web platforms, requiring CMS administrators to pay greater attention to updates, patches, and other security measures. Cybercriminals compromise these platforms to host their malware, infect users and invade organisations to steal data.

Charles Renert, vice president of Websense Security Labs, Websense, said, “The past year illustrated how quickly the threat landscape continues to evolve, with attacks and exploits redefining the concepts of crime, business espionage and warfare. The risk to organisations continues to be amplified by the frailty of human curiosity. It’s now expanding across diverse mobile platforms, evolving content management systems and an ever-increasing population of online users.

2013 will absolutely reinforce the fact that traditional security measures are no longer effective in thwarting advanced cyberattacks. Organisations and security providers need to evolve toward more proactive real-time defences that stop advanced threats and data theft.”

About Websense, Inc.

Websense, Inc. (NASDAQ: WBSN), a global leader in unified web security, email security, mobile security, and data loss prevention (DLP), delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of enterprise, mid-market and small organisations around the world. Distributed through a global network of channel partners and delivered as appliance-based software or SaaS-based cloud services, Websense content security solutions help organisations leverage social media and cloud-based communication, while protecting from advanced persistent threats and modern malware, preventing the loss of confidential information, and enforcing internet use and security policies. Websense is headquartered in San Diego, California with offices around the world. For more information, visit www.websense.com

Submit a media release
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Risk Management Solutions

Protect resources and ensure security compliance through incident detection, response, and remediation.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.