2011 Security Trends: Bad Times with Refined Phishing and Mobile Apps

Cyber security will be no easier in the new year than it is now, as malware proprietors get more sophisticated in their phishing attempts, malware-as-a-service becomes the norm, and smart phones and tablets draw increased attention from cyber criminals. That's the prediction of security software vendor M86 Security, which has released a report summarizing its threat predictions for 2011.

Security experts at the company said they expect spam campaigns to increasingly mimic legitimate mail from popular Web sites. Gone will be the obvious misspellings, double exclamation points, textual spacing gaffes, and other tiny clues signaling that a message has come from a spammer instead of a legitimate mailer. Examples cited in the report include e-mail that perfectly mimics communications from Amazon, FedEx, and LinkedIn, luring users to click on a link, thereby downloading malware or delivering a malicious payload. "We observed that the headers and body templates were taken from actual LinkedIn messages," the report's authors wrote. "Therefore, it's nearly impossible for the average user to distinguish between the legitimate LinkedIn messages and the nefarious ones."

The growth of the Smartphone and tablet markets is making those devices increasingly attractive to cyber bad guys, reported M86. Although both Apple and Google have a restrictive approval process for applications placed in their respective stores, both companies have begun to see more vulnerabilities in their platforms. For example, in October 2010 a group of researchers tested Android apps specifically and found that private information was being delivered without their users' knowledge. "So far, Android has seen rogue applications such as a 'Movie Player,' which secretly sends SMS messages to a premium rate number, costing the end user several dollars per message," M86 stated. "Other applications have harvested information such as a user's SIM card number and voicemail password, sending it to a server in another country."

Although mobile malware has focused on smart phones, the report's authors expect to see more illegal activity targeted to tablets in the coming year. For both types of devices, organizations may face "more pains" as users gain broader access to the wireless network. To counter potential ill effects, the company advised IT professionals to set "clearly defined policies and [put] remediation in place for usage of these devices on the corporate network."

A third trend for 2011 is the increasing use of online services that provide a one-stop-shop for malware tools. According to M86 research findings, cyber criminals are teaming up to offer their products as services alongside traditional applications. With the Neosploit kit, for example, "customers can purchase a specific Web server configuration that redirects victims' requests to a Neosploit back-end server, which is apparently handled by the NeoSploit team," the report stated.

Social networks will also grow as a target in the coming year, as will stolen digital certificates. According to Bradley Anstis, vice president of technical strategy at M86, "To outsmart the bad guys, organizations need to first understand where the threats are likely to come from, and then second define exactly what needs to be protected, and how critical it is. But just as important, they must lay out their best practice strategies and policies for proactively combating and staying ahead of the emerging security threats."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • interconnected geometric human figures forming a network

    CoSN: School Staffing Is the Top Hurdle to K-12 Innovation

    Hiring and keeping educators and IT staff remains the top challenge for K-12 education in 2025, according to the latest Driving K-12 Innovation Report from the Consortium for School Networking (CoSN).

  • stylized human profiles, tablets, and floating icons

    From Feedback to Flexibility: 5 AI Tools Teachers Should Try

    As a fifth-grade teacher and AI School Champion in the St. Vrain Valley School District, I've seen firsthand how artificial intelligence (AI) is transforming education. Here are five AI-enabled tools I've found especially powerful in my classroom and professional practice.

  • DreamBox Math

    Discovery Education Announces Accessibility Enhancements for DreamBox Math

    Discovery Education has updated DreamBox Math, an online math program for K–8 students to supplement core instruction, to improve accessibility for K–5 students, according to a news release. DreamBox Math provides personalized instruction by adapting to individual learners’ responses and providing an engaging, dynamic learning environment.

  • SXSW EDU

    3 Opportunities to Get Hands-on with AI at SXSW EDU 2025

    This March 3-6 in Austin, TX, the SXSW EDU Conference & Festival celebrates its 15th year of exploring the most critical issues in education and providing a forum for creativity, innovation, and expression.