EDGE 2015 is starting in

Find out more EDGE 2015
Menu
Six security trends to watch for

Six security trends to watch for

The RSA security conference can be a great place to learn about the latest security threats. Here are some threats and trends to watch for.

For security researchers, there's never a dull moment; online criminals constantly find new security holes to exploit, and new ways to get at your personal data. At this year's RSA security conference in San Francisco, I got to speak with representatives from several companies about what to expect in the coming months. Here are some of the dangerous new malware trends to watch for in 2012.

SSL Not So Safe? When you see the padlock icon in your browser's toolbar, you might think that your data is safe, but hackers have found ways to get at your information before you send it securely on the internet.

These new forms of malware can identify when you've visited sites protected with SSL--the encryption technology used to keep data safe from prying eyes as it travels across the Internet--and it can grab your username and password before the encryption kicks in. In addition, these sorts of attacks, according to security software maker Webroot, will ignore all Web traffic except encrypted sites to filter out information that it isn't interested in.

More Targeted Baddies: Also on the rise is super-targeted malware. Some malware can access your browser history, and will only infect you if it sees that you've visited certain sites. For instance, a piece of malware designed to steal online banking login information might check to see if you visited a particular bank's website. Expect more malware that goes after certain groups of people or specific bits of information.

New Malware Harder to Spot and Remove: You may be infected with malware and not even realize it. While older malware used to make itself known on your PC, newer forms of malware may not even have an interface, and they may not seriously impact your PC's performance. Instead, it all runs in the background, seemingly invisible to you.

This hard-to-spot malware can also be hard to remove. For example, a relatively new rootkit called ZeroAccess buries itself deep into your system, and it's extremely difficult to disable, since it effectively kills any program that tries to access it (hence the name ZeroAccess).

Malware Holds Your PC for Ransom: Ransomware is nothing new--it's been around for a few years in various forms, including fake antivirus software that won't go away unless you pay up. But the guys at security software company Malwarebytes see it as a growing problem. The company pointed to one example where a piece of malware would lock you out of your computer entirely unless you pay up.

Of course, ransomware means you can get hit twice: If you pay to remove the infection, you will likely end up giving your credit card information to criminals who might go on to use your account fraudulently.

Old Problems Come Back: At the same time, look for some older types of malware to make a resurgence. Researchers with security company CheckPoint expect to see bots make a comeback in 2012. Meanwhile, Webroot expects to see an increase in dynamic, targeted threats similar in nature to the Storm worm from a few years ago.

What About Mobile Malware? One of the big stories out of last year's show was the rise of malware for Android, and we saw a large increase--at least in terms of growth rate--in malicious apps for Android over the last few months of 2011. Is it time to panic?

Not so fast, says CheckPoint. According to the company, there has yet to be a massive malware outbreak on Android, despite the overall increase in mobile malware. That said, the company says that mobile malware is the "logical next step," so while there's no need to panic, you do need to keep your guard up.

EDGE 2015:: For all the latest on EDGE 2015 including the keynote speakers visit the EDGE mini-site now

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Upcoming

Slideshows

In Pictures: 7 things we hate about Twitter

In Pictures: 7 things we hate about Twitter

You probably either love Twitter for its quirkiness and brevity or see it as a pointless waste of time. After nearly a decade on the social scene, Twitter still needs to improve its user experience and fill in notable gaps in the service. These seven problems are long overdue for a fix.

In Pictures: 7 things we hate about Twitter
IN PICTURES: EDGE 2015 - Sponsor Briefing

IN PICTURES: EDGE 2015 - Sponsor Briefing

With EDGE 2015 rapidly approaching, ARN and Reseller News NZ held a Sponsors Briefing where ARN publisher and president, Susan Searle, and Events Manager, Alexandra West, ran through the considerable logistics in detail. Attendees then enjoyed some splendid canapes and drinks. EDGE is designed to bring the A/NZ channel together in a collaborative and educational environment. Themed around channel channel leadership, EDGE will be held at the Sheraton Mirage, Port Douglas, July 20-23. Photos by MIKE GEE.

IN PICTURES: EDGE 2015 - Sponsor Briefing
In Pictures: Robots that cook, clean, sing and dance

In Pictures: Robots that cook, clean, sing and dance

Cooking, learning language and doing the laundry are a few of the human skills demonstrated by.real humanoid bots featured in the National Geographic movie Robots.

In Pictures: Robots that cook, clean, sing and dance

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments