Cyberthreat Forecasts for 2010: More Complex with New Targets
Russian security experts Kaspersky ventures a forecast for malware development in 2010 and sees new types of attacks coming our way.
Cyberterrorists will be seeking filesharing opportunities in the coming year, such as peer-to-peer networks, for victimization, according to Kaspersky Lab. First indications have already emerged during 2009: working over Torrent portals, malware such as TDSS and Virut, and in its premiere, the first backdoor Trojan horse for Mac OS X, have already wreaked havoc.
Meanwhile criminals known as botnet providers are busily competing over turf. The Kaspersky report indicates, "Cybercriminals will continue to compete for traffic. The modern cybercriminal world is making more and more of an effort to legalize itself and there are lots of ways to earn money online using the huge amount of traffic that can be generated by botnets."
If the forecasts materialize, the contrary trend has nevertheless been that the number of fake antivirus programs foisted on users are falling off. In 2009 the phenomenon reached its highpoint with the Kido/Conficker worm, where its huge installation base saturated the market, while causing a shakeup of security providers with law enforcement authorities. The trick to the rogue antivirus programs was in their "discovery" of an alleged vulnerability on the PC, thereby eliciting user panic and recourse to an anti-malware program for a price that proceeded to install just more malware and reduce the computer to a bot.
What should be expected alongside are more complex malware and sophisticated rootkit technologies, says Alex Gostev, director of Kaspersky Lab's Global Research & Analysis Team.
Much of the upcoming focus for budding cybercriminals might end up being Google's Wave web service. Kaspersky sees atacks on the Google service in the usual three phases: sending spams, starting phishing attacks and spreading malware by exploiting vulnerabilities. However, the equally new Chrome web service is not expected to attract much attention among cybercriminals, at least not in the near term.
2010 might be a different story for the iPhone and Android mobile phones. The first malware for these devices appearing in 2009 supports the fact that these mobile systems are certainly in the malware industry cross hairs, predicts Kaspersky. One definite point of entry is unsecured third party software. The strategy supports Kasperky's credo that cybercriminals are professionals undertaking their own form of market analysis: Android devices are gaining popularity in China. Further Kaspersky analyses are available on its website.
New release comes with better semantic search and improvements to Kontact.
Annual code quality report shows FOSS is more secure at all project size levels.
The Raspberry Pi Foundation has announced an even smaller version of the tiny computer that will fit into a DIMM slot.
A new class of problems lets a malicious app pre-configure an invisible privilege update.
New Hack language adds static typing and other conveniences.
New crypto policy system will offer easier configuration and more uniform security.
Ubuntu founder denounces insecurity in proprietary, close-source software blobs.
Vulnerability affects many Linux web servers
The Bavarian capital shuns Microsoft, Google, and other alternatives to implement an open source groupware solution.
Phone vendor partnerships bring Mark Shuttleworth's dream of Ubuntu on a phone a step closer to reality.