Cyberthreat Forecasts for 2010: More Complex with New Targets
Russian security experts Kaspersky ventures a forecast for malware development in 2010 and sees new types of attacks coming our way.
Cyberterrorists will be seeking filesharing opportunities in the coming year, such as peer-to-peer networks, for victimization, according to Kaspersky Lab. First indications have already emerged during 2009: working over Torrent portals, malware such as TDSS and Virut, and in its premiere, the first backdoor Trojan horse for Mac OS X, have already wreaked havoc.
Meanwhile criminals known as botnet providers are busily competing over turf. The Kaspersky report indicates, "Cybercriminals will continue to compete for traffic. The modern cybercriminal world is making more and more of an effort to legalize itself and there are lots of ways to earn money online using the huge amount of traffic that can be generated by botnets."
If the forecasts materialize, the contrary trend has nevertheless been that the number of fake antivirus programs foisted on users are falling off. In 2009 the phenomenon reached its highpoint with the Kido/Conficker worm, where its huge installation base saturated the market, while causing a shakeup of security providers with law enforcement authorities. The trick to the rogue antivirus programs was in their "discovery" of an alleged vulnerability on the PC, thereby eliciting user panic and recourse to an anti-malware program for a price that proceeded to install just more malware and reduce the computer to a bot.
What should be expected alongside are more complex malware and sophisticated rootkit technologies, says Alex Gostev, director of Kaspersky Lab's Global Research & Analysis Team.
Much of the upcoming focus for budding cybercriminals might end up being Google's Wave web service. Kaspersky sees atacks on the Google service in the usual three phases: sending spams, starting phishing attacks and spreading malware by exploiting vulnerabilities. However, the equally new Chrome web service is not expected to attract much attention among cybercriminals, at least not in the near term.
2010 might be a different story for the iPhone and Android mobile phones. The first malware for these devices appearing in 2009 supports the fact that these mobile systems are certainly in the malware industry cross hairs, predicts Kaspersky. One definite point of entry is unsecured third party software. The strategy supports Kasperky's credo that cybercriminals are professionals undertaking their own form of market analysis: Android devices are gaining popularity in China. Further Kaspersky analyses are available on its website.
Vendor D-Wave scores big with a sale to NASA's Quantum Intelligence Lab.
Many package updates and Steam integration highlight the latest from the Mandriva-based community Linux.
Richard Stallman calls for the W3C to remain independent of vendor interests.
The new release supports nine architectures, 73 human languages, and zero non-Free components.
Fedora developers release the first alpha version of Fedora 19, known as Schrödinger’s Cat, for general testing. The final release is expected in July 2013.
ack is a grep-like, command-line tool that has been optimized for programmers to search large trees of source code.
New features in SUSE Studio 1.3 include enhanced cloud integration, VM platform support, and lifecycle management.
The Linux Foundation recently announced that the Xen Project is becoming a Linux Foundation Collaborative Project.
Open source version of LiveCode is now available for developing apps, games, and utilities for all major platforms.
OpenDaylight is an open source software-defined networking project committed to furthering adoption of SDN and accelerating innovation in a vendor-neutral and open environment.