{"id":26683,"date":"2013-01-17T16:26:33","date_gmt":"2013-01-17T06:26:33","guid":{"rendered":"http:\/\/power-up.space\/?p=26683"},"modified":"2013-01-17T16:26:33","modified_gmt":"2013-01-17T06:26:33","slug":"avgs-predictions-for-2013","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=26683","title":{"rendered":"AVG\u2019s Predictions for 2013"},"content":{"rendered":"<p>The start of a new year is a good time to look ahead and forecast what will be the biggest developments in the threat landscape in 2013.<\/p>\n<p>AVG predicts the \u2018traditional\u2019 threats targeting businesses and consumers will be accompanied by more recent developments such as attacks on virtualised cloud infrastructure; and threats to privacy from both legitimate and criminal sources as they seek to profit from personal data.<\/p>\n<p>Michael McKinnon, Security Advisor at AVG Technologies AU, said: \u201cOur lives are becoming more closely intertwined with online services and so the potential rewards for cybercriminals in that area grow too. I expect to see more attacks on the cloud services that businesses and consumers rely on day-to-day, both to cause disruption and to steal personal and financial data.\u201d<\/p>\n<p>McKinnon warns that consumers must expect to also find their privacy under attack from legitimate businesses seeking to maximise profits by using personal data without users\u2019 consent.<\/p>\n<p>AVG\u2019s top five digital threats facing businesses and consumers in 2013 are:<\/p>\n<ol start=\"1\">\n<li><b>Privacy:<\/b> Online \u00a0\u00a0\u00a0\u00a0 advertising on PCs, tablets and smartphones will become even more \u00a0\u00a0\u00a0\u00a0 aggressively personalised as businesses seek to increase capitalise on \u00a0\u00a0\u00a0\u00a0 users\u2019 privacy. Advertisers will use browser tracking, social media \u00a0\u00a0\u00a0\u00a0 trawling and geo-location data to identify individual users, and then \u00a0\u00a0\u00a0\u00a0 serve them a customised program of ads, all without the users\u2019 consent.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><b>Cloud security: <\/b>Attacks \u00a0\u00a0\u00a0\u00a0 against virtualised cloud infrastructure will expose the risks in public \u00a0\u00a0\u00a0\u00a0 cloud services and the large additional investments needed to better \u00a0\u00a0\u00a0\u00a0 secure them. Well-known cloud systems such as <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=ELxbEiSbQhul-2B9RMLvYl6im-2BHPblZoYNIN671FWaNTpjkEyyOcfj9iPNlTaKQnBTN8NetbjlKXKqxxayM1WgfOZTa9S0McR8IDbZRNyNeIsEGUDhBaulmGsNRPWELlcjLt-2BNF5pZFp-2B-2BtJXCck69-2BAxXJ0gQ34VhtsyXL4fSUDY-3D_O7ROD4svS-2BWtZVG4Rcp0Qm-2FQytvP54PVk8PxPte8iqLbJGU9QCsBLLli2CDwk2H1XZbhHBVHuUExRW8md0Z-2BqEwJBSScByEWDgTfbdyA5xseHxk-2BeIu5cQhMFyAVBAlyfta8JUUUhFW1fY6-2FEC-2FwV9g7NW0seZqnVn-2FmTbOvwZ8NUQvBBk3SQvYlWDahkph5oK0E4WfDzOKDoSuZ8zUssLwRgJy5DYQ9Y9f1tbBYbJY-3D\">Dropbox<\/a>, \u00a0\u00a0\u00a0\u00a0 <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8odsTdXpiVdDEJZsH5DloySe9W6CH-2BdqihFYZqDU5wJ2YwHnLuIFS-2BGXDQ0DmELZ9LOnoT5zQy4FFORJDeL0v2wCjvqv5U5M3OIRtKMJM1g0_O7ROD4svS-2BWtZVG4Rcp0Qm-2FQytvP54PVk8PxPte8iqLbJGU9QCsBLLli2CDwk2H1XZbhHBVHuUExRW8md0Z-2BqIJ4bdQ3mdzRPUwQhMHiPDg9ZjchSedgeTYjvKjUIERZgJ4mQYctRw1eLbgALIb6CkQvmu4eXHqWXHpPk24AUHlTCv-2BnwqKSscVeDS3iIJ0q7GjxJVWlquFPu2EHFGfx5xtg03MmenpA98KnMI0sXn8-3D\">SkyDrive<\/a>, \u00a0\u00a0\u00a0\u00a0 <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8lqBKe9Gqcq4h1kkU-2BRQUYw8DXorefd7ZXfXaJWGEbS8mWAYh8kkSIAQHNvsfSvRDk5uvRJA6XNASbbiynQwO9M0DVzzA1FuHMrVuNFWCCUq_O7ROD4svS-2BWtZVG4Rcp0Qm-2FQytvP54PVk8PxPte8iqLbJGU9QCsBLLli2CDwk2H1XZbhHBVHuUExRW8md0Z-2BqA15LiWwchzEFUuj8CAlryTw1IG3iXoNpK2f1L4vBHT2490cIVjlEU-2FQMJIgD2sS7XK9fwzj5JjZ50QmV3OJWhiK-2FfiwVD5WBFdT-2F9dFb7RK6-2FQiPcu47xGf8ycxPT8qfunGatAr7v4Ppw20qx2gIVo-3D\">Cloud \u00a0\u00a0\u00a0\u00a0 Drive (Amazon)<\/a> and <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8vyfS5xT-2Bd3rPjgsJngzgKe6-2B-2FnR5RzMd0OcfnGfvOi3hQ7I603ilkzdyzmgDYX-2FE2VZGHj42qs-2FbVnUrhYFYoR0USOZFVeayCd7T8NP9gaOzkroFDwzmMbbGof3R23XEZ2MHPUB5rBVFYklZFBNlQs-3D_O7ROD4svS-2BWtZVG4Rcp0Qm-2FQytvP54PVk8PxPte8iqLbJGU9QCsBLLli2CDwk2H1XZbhHBVHuUExRW8md0Z-2BqE5WsT-2FrXxEKNWZUf11BqylGh0tEJ3FBUnUTYp76xRLpESCs5eqvhWIGKngXZu3EQfrjirAZHWU9I30Pz0wx4pfFtOQi6-2Fa9nu2LHx2n5mzJsiNkHR0atD8Wn-2Bqbmk9uUQCa1ZEO5n1IhvEBs7vxL8M-3D\">Google \u00a0\u00a0\u00a0\u00a0 Drive<\/a> have reportedly been attacked by malware, and we will see an \u00a0\u00a0\u00a0\u00a0 increase in attacks against such systems from Denial of Service (DoS) \u00a0\u00a0\u00a0\u00a0 \/Distributed Denial of Service (DDoS) attacks.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><b>Mobile threats:<\/b> As the \u00a0\u00a0\u00a0\u00a0 world\u2019s most popular mobile operating system, Google\u2019s Android OS is now \u00a0\u00a0\u00a0\u00a0 the prime target for smartphone and tablet malware. Due to security \u00a0\u00a0\u00a0\u00a0 enhancements in Android 4.2, threats will become more sophisticated and \u00a0\u00a0\u00a0\u00a0 use polymorphic code that is designed to mutate in order to avoid \u00a0\u00a0\u00a0\u00a0 detection by traditional app store security.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li><b>PC threats:<\/b> The \u00a0\u00a0\u00a0\u00a0 steady increase in popularity of Windows 8 will inspire hackers to reveal \u00a0\u00a0\u00a0\u00a0 new vulnerabilities, develop new-style malware and fraudware, and present \u00a0\u00a0\u00a0\u00a0 new proof-of-concept exploits. The number of infected websites targeting \u00a0\u00a0\u00a0\u00a0 PCs will also increase with the growing popularity of \u2018commercial\u2019 exploit \u00a0\u00a0\u00a0\u00a0 kits such as Blackhole, while users\u2019 problems will be compounded by an \u00a0\u00a0\u00a0\u00a0 increased reliance on built-in security systems.<\/li>\n<\/ol>\n<ol start=\"5\">\n<li><b>Mobile-to-PC threats:<\/b> \u00a0\u00a0\u00a0\u00a0 Increased connectivity between mobile devices and PCs, combined with the \u00a0\u00a0\u00a0\u00a0 growing Bring Your Own Device trend will make it much easier for malware \u00a0\u00a0\u00a0\u00a0 and viruses to spread across business and home networks. We also expect to \u00a0\u00a0\u00a0\u00a0 register <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=SisQ4Toqdc2674LJ8xtRjKDtZ4YvBaRazIPo2m0s1wRYY1Engh-2FCCYSHuTHHgeDQy1jPiBuErXv9kCnU-2FsXTYF6IRdoPvmxH38-2B2-2FddnC6stlvFempmEkDQe3jELwDoQ_O7ROD4svS-2BWtZVG4Rcp0Qm-2FQytvP54PVk8PxPte8iqLbJGU9QCsBLLli2CDwk2H1XZbhHBVHuUExRW8md0Z-2BqHHpymbkc2udHQy-2BxHtUHrN8xc2I5VU-2BCVdBpggrn4qa-2FoJhko4wiH591eHKo3NBXqUqhWMrgQxnFKQLRvBi6SXGIDumwhdnEWdpXjnxMy3NITmNbyf6UxhNvFaeiUpACrWVONQPt9KAxSPMi-2F23V-2B4-3D\">more \u00a0\u00a0\u00a0\u00a0 MITMO (Man-In-The-Mobile) attacks<\/a> that target PC and mobile internet banking \u00a0\u00a0\u00a0\u00a0 apps. These multi-factor authentication attacks will be stealthier, more \u00a0\u00a0\u00a0\u00a0 polished and more location-oriented.<\/li>\n<\/ol>\n<p>Michael McKinnon said: \u201cAs cybercriminals and hackers use ever more sophisticated attack tools, so too should users of the latest technologies do everything they can to protect their personal information and finances. You may have data in the cloud but keep your feet on the ground! To have the best chance of beating the criminals, run always on, automatically updating antivirus on every one of your Internet-connected devices &#8211; be they house bound or mobile.\u201d<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The start of a new year is a good time to look ahead and forecast what will be the biggest developments in the threat landscape in 2013. AVG predicts the \u2018traditional\u2019 threats targeting businesses and consumers will be accompanied by more recent developments such as attacks on virtualised cloud infrastructure; and threats to privacy from<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=26683\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-26683","post","type-post","status-publish","format-standard","hentry","category-software-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/26683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=26683"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/26683\/revisions"}],"predecessor-version":[{"id":26688,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/26683\/revisions\/26688"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=26683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=26683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=26683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}