{"id":10832,"date":"2011-11-17T21:55:21","date_gmt":"2011-11-18T01:55:21","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=10832"},"modified":"2022-08-19T16:12:33","modified_gmt":"2022-08-19T20:12:33","slug":"georgia-tech-predict-cyber-threats-for-2012","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/georgia-tech-predict-cyber-threats-for-2012\/","title":{"rendered":"Georgia Tech Predicts Cyber Threats For 2012"},"content":{"rendered":"<p style=\"text-align: left;\"><a href=\"https:\/\/community.ebay.com\/t5\/Archive-The-Soapbox\/Let-me-look-into-my-crystal-ball\/td-p\/18899771\/page\/5\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-102570 size-medium\" title=\"Georgia Tech Predicts Cyber Threats For 2012\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball.jpg?resize=150%2C124&#038;ssl=1\" alt=\"Georgia Tech Predicts Cyber Threats For 2012\" width=\"150\" height=\"124\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball.jpg?resize=150%2C124&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball.jpg?resize=768%2C636&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball.jpg?resize=1024%2C848&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball.jpg?w=1181&amp;ssl=1 1181w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>The <a title=\"Georgia Tech Emerging Cyber Threats Report for 2012\" href=\"http:\/\/web.archive.org\/web\/20130811164447\/http:\/\/gtsecuritysummit.com\/report.html\" target=\"_blank\" rel=\"noopener noreferrer\">Georgia Tech Emerging Cyber Threats Report for 2012<\/a> predicts that 2012 will feature new and increasingly sophisticated means to capture and exploit user data. &#8220;Our adversaries, whether motivated by monetary gain, political\/social ideology or otherwise are becoming increasingly sophisticated and better funded,\u201d said Bo Rotoloni, director of the <a title=\"Georgia Tech Research Institute\" href=\"http:\/\/www.gtri.gatech.edu\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Georgia Tech Research Institute<\/a>&#8216;s (GTRI) <a title=\"Cyber Technology and Information Security Laboratory\" href=\"http:\/\/www.gtri.gatech.edu\/ctisl\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Technology and Information Security Laboratory<\/a> (CTISL).<\/p>\n<p><a href=\"http:\/\/www.soniseo.com\/black-hat-seo-techniques\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102564 size-thumbnail\" title=\"Search Poisoning\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/black-hat-seo.jpg?resize=75%2C40&#038;ssl=1\" alt=\"Search Poisoning\" width=\"75\" height=\"40\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/black-hat-seo.jpg?resize=75%2C40&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/black-hat-seo.jpg?resize=150%2C80&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/black-hat-seo.jpg?w=465&amp;ssl=1 465w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>\u201c<em>We can no longer assume our data is safe sitting behind perimeter-protected networks. Attacks penetrate our systems through ubiquitous protocols, mobile devices, and social engineering, circumventing the network perimeter.<\/em>\u201d<\/p>\n<h3>Threats <a title=\"www.gatech.edu\" href=\"https:\/\/web.archive.org\/web\/20120304162618\/http:\/\/www.gatech.edu\/newsroom\/release.html?nid=71075\" target=\"_blank\" rel=\"noopener noreferrer\">according<\/a> to Georgia Tech<\/h3>\n<p><a title=\"Search poisoning\" href=\"http:\/\/web.archive.org\/web\/20120121151018\/http:\/\/www.readwriteweb.com:80\/archives\/search_engine_poisoning_1_vector_for_malware.php\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Search Poisoning<\/strong><\/a> \u2013 Attackers will increasingly use <a title=\"Search engine optimization\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Search_engine_optimization\" target=\"_blank\" rel=\"noopener noreferrer\">SEO techniques<\/a> to optimize malicious links among search results so that users are more likely to click on a URL because it ranks highly on <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) or other search engines.<\/p>\n<p><strong><a href=\"https:\/\/web.archive.org\/web\/20130901033716\/http:\/\/www.mobilepedia.com.br\/noticias\/virus-no-celular\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102567 size-thumbnail\" title=\"Mobile Web\u00a0based Attacks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus.jpg?resize=75%2C61&#038;ssl=1\" alt=\"Mobile Web\u00a0based Attacks\" width=\"75\" height=\"61\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus.jpg?resize=75%2C61&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus.jpg?resize=150%2C123&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_virus.jpg?w=270&amp;ssl=1 270w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a><a title=\"Mobile Web\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_Web\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Mobile Web-<\/a>based Attacks<\/strong> \u2013 Expect increased attacks aimed specifically against <a title=\"Mobile web browser\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Mobile_browser\" target=\"_blank\" rel=\"noopener noreferrer\">mobile Web browsers<\/a> as the tension between usability and security, along with device constraints (including small screen size), make it difficult to solve <a title=\"Mobile browser\" href=\"http:\/\/webtrends.about.com\/od\/mobileweb20\/tp\/list_of_mobile_web_browsers.htm\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">mobile Web browser<\/a> security flaws.<\/p>\n<p><strong>Stolen Cyber Data Use for Marketing<\/strong> \u2013 The market for stolen cyber data will continue to evolve as <a title=\"searchsecurity.techtarget.com\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/botnet\" target=\"_blank\" rel=\"noopener noreferrer\">botnets<\/a> capture private user information shared by social media platforms and sell it directly to legitimate business channels such as lead generation and marketing.<\/p>\n<p><a href=\"http:\/\/www.meccahosting.com\/print_ready.php?url=\/gg\/services\/web_hosting\/fast\/bot_blocking\/index.php&amp;lang=en\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"botnets\" src=\"https:\/\/i0.wp.com\/www.meccahosting.com\/images\/robots.jpg?resize=95%2C74\" alt=\"botnets\" width=\"95\" height=\"74\" \/><\/a>\u201c<em>We continue to witness <a title=\"Cyberwarfare\" href=\"http:\/\/en.wikipedia.org\/wiki\/Cyberwarfare\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">cyber attacks<\/a> of unprecedented sophistication and reach, demonstrating that malicious actors have the ability to compromise and control millions of computers that belong to governments, private enterprises, and ordinary citizens,<\/em>\u201d said Mustaque Ahamad, director of <a title=\"Georgia Tech Information Security Center\" href=\"https:\/\/web.archive.org\/web\/20170611101825\/https:\/\/www.gtisc.gatech.edu\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Georgia Tech Information Security Center<\/a> (GTISC).<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.physorg.com\/news\/2011-10-georgia-tech-cyber-threats.html\" target=\"_blank\" rel=\"noopener noreferrer\">Georgia Tech releases cyber threats forecast for 2012<\/a> (physorg.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n<div id=\"_mcePaste\" class=\"mcePaste\" style=\"position: absolute; left: -10000px; top: 133px; width: 1px; height: 1px; overflow: hidden;\">Georgia Tech Predicts Cyber Threats For 2012<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Georgia Tech predicts that 2012 threats will see sophisticated means to steal user data by Search Poisoning Mobile Web-based Attacks Stolen Cyber Data by botnets<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,4],"tags":[849,846,844,845,92,847,23,848,4],"class_list":["post-10832","post","type-post","status-publish","format-standard","hentry","category-malware","category-security","tag-data","tag-georgia-institute-of-technology","tag-georgia-tech-information-security-center","tag-georgia-tech-research-institute","tag-google","tag-information-security","tag-malware","tag-mobile-browser","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=10832"}],"version-history":[{"count":8,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10832\/revisions"}],"predecessor-version":[{"id":129191,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10832\/revisions\/129191"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=10832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=10832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=10832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}