Tag Archive for Embedded

McAfee Labs 2012 Threat Predictions

McAfee Labs 2012 Threat PredictionsComputer security company McAfee unveiled its Threat Predictions report (PDF), outlining the top cybersecurity threats organizations and individuals are likely to face in 2012. McAfee, a wholly-owned subsidiary of Intel (INTC), says that for the most part, 2012 looks like it will look like 2011 only worse, with many of the recent threats gaining momentum. Here are the predictions:

Industrial Attacks:Industrial Attacks: Cyber-criminals will target Water, electricity, oil, and gas utilities. These are essential services to everyday lives, yet many industrial systems are not ready for cyber-attacks according to McAfee. Many of the environments where SCADA (supervisory control and data acquisition) systems are deployed don’t have stringent security practices. McAfee predicts attackers will leverage this lack of preparedness with greater frequency, if only for blackmail or extortion in 2012.

Legalized Spam: McAfee Labs says global spam volumes have declined in the past two years. However, legitimate advertisers are picking up where the spammers left off using the same spamming techniques, such as purchasing third-party email lists or databases from companies going out of business. McAfee Labs expects to see this “legal” spam and the technique known as “snowshoe spamming” continue to grow at a faster rate than illegal phishing and confidence scams.

Mobile ThreatsMobile Threats: 2011 has seen the largest levels in mobile malware history, McAfee Labs expects that continue in 2012. They expect mobile attackers to improve on their skill set and move toward mobile banking attacks. Techniques previously dedicated for online banking, such as stealing from victims while they are still logged on while making it seem that transactions are coming from the legitimate user, will now target mobile banking users. McAfee Labs expects attackers will bypass PCs and go straight after mobile banking apps, as more and more users handle their finances on mobile devices.

Embedded Hardware: Embedded systems are designed for a specific control function within a larger system, and are commonly used in automotive, medical devices, GPS devices, routers, digital cameras, and printers. McAfee Labs expects to see proofs-of-concept codes exploiting embedded systems to become more effective in 2012 and beyond. This will require malware that attacks at the hardware layer and will enable attacks to gain greater control and keep up long-term access to the system and its data. Sophisticated hackers will then have complete control over hardware.

countries prove their cyber war capabilitiesCyberwar: Countries are vulnerable due to massive dependence on computer systems and a cyber-defense that primarily defends only government and military networks. Many countries realize the crippling potential of cyber attacks against critical infrastructures, such as water, gas, and power, and how difficult it is to defend against them. McAfee Labs expects to see countries prove their cyberwar capabilities in 2012, to send a message.

Rogue Certificates: Organizations and individuals tend to trust digitally signed certificates, however, recent threats such as Stuxnet and Duqu used rogue certificates to evade detection. McAfee Labs expects to see the production and circulation of fake rogue certificates increase in 2012. Wide-scale targeting of certificate authorities and the broader use of fraudulent digital certificates will affect key infrastructure, secure browsing and transactions as well as host-based technologies such as whitelisting and application control.

Legislative IssuesLegislative Issues: DNSSEC (Domain Name System Security Extensions) is designed to protect a client computer from inadvertently communicating with a host as a result of a man-in-the-middle attack. Governing bodies around the globe are taking a greater interest in establishing “rules of the road” for Internet traffic, and McAfee Labs expects to see more and more instances where legislative issues hamper future solutions.

Hacktivism: McAfee Labs predicts that in 2012 digital disruptions like Anonymous will join forces with physical demonstrators and will target public figures such as politicians, industry leaders, judges, and law enforcement, more than ever before.

Virtual CurrencyVirtual Currency: McAfee Labs expects cryptocurrency will be an attractive target for cybercriminals.  to see threats evolve to steal money from unsuspecting victims or to spread malware.

Hardware Attacks: McAfee Labs expects to see more effort put into hardware and firmware exploits to create persistent malware in network cards, hard drives, and even system BIOS (Basic Input Output System). and their related real-world attacks through 2012.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Techs Add Ads In Everything

The New York Times is reporting that Apple Computers has filed an application with the U.S. Patent and Trademark Office to patent to puts ads in everything. They  are working on a technology called “Advertisement in Operating System.” Advertisement in Operating System will display advertising on almost anything that has a screen of some kind: computers, phones, televisions, media players, game devices, and other consumer electronics.

The patent application claims the distinctive feature of the patent is it that doesn’t simply invite a user to pay attention to an ad — it also compels attentionApple’s (AAPL) technology, according to the NYT, can freeze the device until the user clicks a button or answers a test question to prove that he or she has dutifully noticed the commercial message. Because this technology would be embedded in the innermost core of the device, the ads could appear on the screen at any time, no matter what one is doing.

Within this new technology, Apple has developed what it calls an “enforcement routine” that makes people watch ads they may not want to watch. What the application calls the “enforcement routine” entails administering periodic tests, like displaying on top of an ad a pop-up box with a response button that must be pressed within five seconds before disappearing to confirm that the user is paying attention.

These tests “can be made progressively more aggressive if the user has failed a previous test,” the application says. One option makes the response box smaller and smaller, requiring more concentration to find and banish. According to the NYT,  the system can require that the user press varying keyboard combinations, the current date, or the name of the advertiser upon command, again demonstrating “the presence of an attentive user.” The system also has a version for music players, inserting commercials that come with an audible prompt to press a particular button to verify the listener’s attentiveness.

The Apple inventors, including Apple CEO Steve Jobs, whose name is the first listed on the application, say the advertising would enable computers and other consumer electronics products to be offered to customers free or at a reduced price. In exchange, recipients would agree to view the ads (rb- and give their personal data). If down the road, users found the advertisements and the attentiveness tests unendurable, they could pay to make the device “ad-free” on a temporary or permanent basis.

Google logoThe Download Squad points out that over at Google (GOOG), a “highly praised” feature of the newly announced Chrome OS‘s “totally new” approach to security sounds similar to Apple’s plan for forced ads. Chrome OS is reported to be self-healing. If the OS detects something it does not like, a “verified boot” will restore files to their previous state as if nothing ever happened. Since it is Google’s OS they get to decide what is or isn’t malicious. It is easy to imagine that anything which interferes with the delivery of Google-powered content would be considered malicious. Applications like AdBlock or AdSweep which block Google ads may not be allowed. Chrome OS will put Google in complete control over the delivery platform its audience is using.

Microsoft logoMicrosoft (MSFT) has experimented with ads in software since June 2007 with Microsoft Works. Now Microsoft is working on placing advertisements in a more conspicuous location next year with a free version of Office. Office Starter 2010 is a free version of Office that is pre-installed on some PCs. It will include a small Microsoft display ad in the lower-right corner of the screen and offers versions of Word and Excel with fewer functions than the regular paid ones.

In Office Starter 2010, Microsoft is not seeking revenue from advertising. They are using the ads only to promote the full-featured, commercial versions of Office. The company plans to take customers “along a journey to educate them about the product,” said Bryson Gordon, a director on Microsoft’s Office team said in the NYT piece. Microsoft will use a gentle approach to the up-sell. Customers can ignore the ads, which will sit passively in the corner of the screen,

rb-

The tech world is moving backward taking cues from Free-PC and ZapMe because the public is cheap. Apple, Google and MSFT are counting on the fact their product are so “insanely great” and integrated into our lives that we as consumers can’t live without Gmail or iTunes. Now that we are all junkies of cheap tech, the tech firms are going to exploit this. The price of free starts with a text ad then it will be a banner ad then a pop-up and then a full video where you have to interact with the device to use it.

MSFT, Apple, and Google have huge organizations to run, CEO’s and Wall $treet bankers that need their bonuses so the move to monetize all their services has just begun. The big question is how far will this go? Will the pillars of tech add so many clicks, surveys, ads, and forced interactions to eventually make their products unwieldy and useless. Look where FreePC and ZapMe are today.

Forced advertising is not some new idea lots of malware force their victims to view web pages they did not request.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.