AVG predicts the ‘traditional’ threats targeting businesses and consumers will be accompanied by more recent developments such as attacks on virtualised cloud infrastructure; and threats to privacy from both legitimate and criminal sources as they seek to profit from personal data.
Michael McKinnon, Security Advisor at AVG Technologies AU, said: “Our lives are becoming more closely intertwined with online services and so the potential rewards for cybercriminals in that area grow too. I expect to see more attacks on the cloud services that businesses and consumers rely on day-to-day, both to cause disruption and to steal personal and financial data.”
McKinnon warns that consumers must expect to also find their privacy under attack from legitimate businesses seeking to maximise profits by using personal data without users’ consent.
AVG’s top five digital threats facing businesses and consumers in 2013 are:
1. Privacy: Online advertising on PCs, tablets and smartphones will become even more aggressively personalised as businesses seek to increase capitalise on users’ privacy. Advertisers will use browser tracking, social media trawling and geo-location data to identify individual users, and then serve them a customised program of ads, all without the users’ consent.
2. Cloud security: Attacks against virtualised cloud infrastructure will expose the risks in public cloud services and the large additional investments needed to better secure them. Well-known cloud systems such as Dropbox, SkyDrive, Cloud Drive (Amazon) and Google Drive have reportedly been attacked by malware, and we will see an increase in attacks against such systems from Denial of Service (DoS) /Distributed Denial of Service (DDoS) attacks.
3. Mobile threats: As the world’s most popular mobile operating system, Google’s Android OS is now the prime target for smartphone and tablet malware. Due to security enhancements in Android 4.2, threats will become more sophisticated and use polymorphic code that is designed to mutate in order to avoid detection by traditional app store security.
4. PC threats: The steady increase in popularity of Windows 8 will inspire hackers to reveal new vulnerabilities, develop new-style malware and fraudware, and present new proof-of-concept exploits. The number of infected websites targeting PCs will also increase with the growing popularity of ‘commercial’ exploit kits such as Blackhole, while users’ problems will be compounded by an increased reliance on built-in security systems.
5. Mobile-to-PC threats: Increased connectivity between mobile devices and PCs, combined with the growing Bring Your Own Device trend will make it much easier for malware and viruses to spread across business and home networks. We also expect to register more MITMO (Man-In-The-Mobile) attacks that target PC and mobile internet banking apps. These multi-factor authentication attacks will be stealthier, more polished and more location-oriented.
Michael McKinnon said: “As cybercriminals and hackers use ever more sophisticated attack tools, so too should users of the latest technologies do everything they can to protect their personal information and finances. You may have data in the cloud but keep your feet on the ground! To have the best chance of beating the criminals, run always on, automatically updating antivirus on every one of your Internet-connected devices - be they house bound or mobile.”
About AVG — www.avg.com.au
AVG Technologies’ mission is to simplify, optimise and secure the Internet experience, providing peace of mind to a connected world. AVG’s powerful yet easy-to-use software and online services put users in control of their Internet experience. By choosing AVG’s software and services, users become part of a trusted global community that benefits from inherent network effects, mutual protection and support. AVG has grown its user base to 143 million active users as of September 30, 2012 and offers a product portfolio that targets the consumer and small business markets and includes Internet security, PC performance optimisation, online backup, mobile security and identity protection.
AVG Media Contacts:
Michael McKinnon AVG 03 9581 0845 email@example.com
Shuna Boyd BoydPR 02 9418 8100 firstname.lastname@example.org
Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)