CyberheistNews vol2, #53
CyberheistNews Vol 2, #54
[caption id="attachment_1367" align="alignleft" width="150" caption="Stu"]
2013 Security Predictions"
Some of you may know that I wrote the WServerNews e-zine for 15 years,
and one of my traditions is to make predictions for the coming year in the
last issue of the year. We're going to continue that with CyberheistNews,
so here they are, and see you in 2013.
A big THANK YOU to you, our readers, for helping us continue to make
CyberheistNews the most fun security newsletter in the world.
Happy New Year!
In Memoriam of excellent science-fiction writer Ray Bradbury who passed
away in 2012: "People ask me to predict the future, when all I want to do
is prevent it. Better yet, build it. Predicting the future is much too
easy, anyway. You look at the people around you, the street you stand on,
the visible air you breathe, and predict more of the same. To hell with
more. I want better." Ray Bradbury
Here Are Your 13 Predictions For 2013
- First Quantity, Now Quality: In 2013, cybercrime will focus more on
quality than before. They will opt for increasingly smart malware,
and more focused attacks.
- BYOD Target Number One: As part of cybercrime's focused attacks, they
will be looking to infect the private mobile devices of employees who have
access to the company network. BYOD will be a bear for IT the coming year.
Toll fraud, malware that charges money to a users mobile phone bill will
be the leading monetization strategy for mobile malware writers.
- Advanced Persistent Threats (APT) usually coming from China, will expand
from enterprise to the civilian population, specifically celebrities,
politicians and business leaders. The APT goal will be to either create
or find offenses they can blackmail the victim with. Things like first
putting child pornography on someones phone, and then threatening
with revealing that information to police and press. Politicians and
CEOs need to be extra careful as surveillanceware (like FinFisher)
for espionage will increase.
- Malware for Apple Goes Global: It has been tested well enough now,
and will make headlines in 2013 as the vast majority of Apple users
are still not using any antivirus. They will regret that the coming
- The old Windows-centric computing environment has literally gone out
the window, and people are now using various sizes of computing slabs
(phones, tablets) each with their own operating system, causing update
fatigue and many leaving all the defaults in place. Hackers rejoice
with a million Android-based malware variants, one of which will have
a critical bug and bricks phones.
- Just like the last 10 years, you will not see an omnibus cybersecurity
bill getting through Congress, but in 2013 President Obama will come
out with controversial Executive Orders that give DHS a much stronger
role in cybersecurity governance.
- South Carolina's tax IT system breach where 4 million taxpayers were
exposed, is making top officials in other local and state governments
very, very nervous. Expect a wave of fresh security awareness training
for all employees in those organizations.
- The United Nations-sanctioned International Telecommunication Union's
recent vote allows more regulatory power to authoritarian governments
around the world, which will disrupt the Web's very infrastructure. Syria
dropping off the Net recently is a good example.
- Cross-platform Botnets: If you look at mobile botnets like Zitmo, they
look a lot like the old PC-based botnets. Next year, we will see new
types of Denial of Service (DoS) attacks that will use both PC and
mobile devices at the same time, with both devices sharing the same
command and control server. At the same time, mobile spam will become
a major threat vector.
- The Password Is Dead. Next year you will see a wave of organizations
that deploy a form of two-factor authentication for both customers
and employees. It will be a Web-based login with a password together
with a secondary passkey that will be sent to a user's phone.
- 2013 will be the year that the enterprise will finally get the concept
of compute-on-demand and the cloud is actually ready for enterprise
workloads. While big companies move them there, they omit cloud security
best practices so there will be a massive cloud security breach.
- 2013 will be the year of mobile shopping, and most retail companies
will enable mobile commerce the next twelve months with mobile wallets.
Cyber criminals are rubbing their hands with anticipation, because now
some shoulder surfing and stealing someones smartphone is enough to
go for an illegal shopping spree.
- Hackers will pull off a massive Cyberheist in 2013 creating fake
bank transactions harming you with the very same protocols that were
designed to protect you.
Wild-ass Guesses Department
- A major brand of Internet-enabled TV's will be totally pnwed and
people's TV's will be spying on them in their living room.
- The expected iPhone 6 will have blistering fast A7 processor and a
brand new oblong home button that will check your fingerprint. In
2013 there will be an android-based bendable (flexible) phone.
- Russian Cyber Mafia will open shop in Nigeria. Lax local law and
law enforcement combined with a corrupt government is crime Nirvana.
- Facebook is going to acquire something BIG like Twitter. They need
to do something with all that money from the IPO.
- Apple will release a TV Set, technically it will be brilliant, but
commercially it will be a failure.
- Google will become an ISP after their successful fiber trial in
Kansas City. Unfortunately only select select U.S. cities will benefit.
- Because of a cyber attack that ruins its reputation, we will see
a global IT consumer brand go belly-up, someone big like Dropbox.
Quotes of the Week
"Let our New Year's resolution be this: we will be there for one another
as fellow members of humanity, in the finest sense of the word." - Goran Persson
"Your success and happiness lies in you. Resolve to keep happy, and
your joy and you shall form an invincible host against difficulties." - Helen Keller
"Celebrate what you want to see more of." - Tom Peters
Please tell your friends about CyberheistNews! They can subscribe here:
You can read this newsletter online at the KnowBe4 Blog:
The Best ROI Bang For That Last Bit Of Budget!
If you have some budget left at the end of this year, and you want
to literally get the best bang for your budget bucks, spend it on Kevin
Mitnick Security Awareness Training for your employees. Having them
trained to not fall for hacker tricks, making them into a 'human firewall'
gives you two major benefits: 1) A much more secure network. 2) Less
support tickets requiring IT-hours. Best yet, Security Awareness Training
usually pays back for itself in just a few months.
Benefit now from some GREAT End-of-Year Offers! Click on the orange
Get A Quote Button Now:
Cyberheist 'FAVE' LINKS:
* This Week's Links We Like. Tips, Hints And Fun Stuff.
Car Safety - The Jeremy Foley 2012 Pikes Peak Story. Both drivers walked
away unscathed after their Mitsubishi Evo skidded off a cliff during
the "Pikes Peak International Hill Climb". WOW:
Google's Zeitgeist 2012 shows you what was trending this last year in
the U.S, based on numbers, not on some pundit's opinions. Interesting:
And here it is in a video format: 1.2 trillion searches. What did the world
search for in 2012? A review of 2012 covering all the major events of the
year which were popular on Google:
A bit of snow is not going to stop the mighty Audi in Vidzeme, Latvia.
Wait for it
NASA was so confident that the world would not end on December 21, 2012 that
they released a "told you so" video a week early:
Popular Mechanics has a fun one: 110 Predictions For the Next 110 Years:
This is a very useful slide show. A walking tour: 33 questions to ask about
your company's security:
This 25-GPU cluster cracks every standard Windows password in <6>6>