{"id":14716,"date":"2012-03-29T20:03:07","date_gmt":"2012-03-30T00:03:07","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2024-06-08T15:19:42","modified_gmt":"2024-06-08T19:19:42","slug":"social-media-biggest-risk-in-2012","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/social-media-biggest-risk-in-2012\/","title":{"rendered":"Social Media Biggest Risk in 2012"},"content":{"rendered":"<p><a href=\"https:\/\/www.pricelessprofessional.com\/best-interview-questions.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-109112\" title=\"Social Media Biggest Risk in 2012\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-8.jpg?resize=100%2C83&#038;ssl=1\" alt=\"Social Media Biggest Risk in 2012\" width=\"100\" height=\"83\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-8.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-8.jpg?resize=150%2C124&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-8.jpg?resize=768%2C636&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-8.jpg?resize=1024%2C848&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-8.jpg?w=1181&amp;ssl=1 1181w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-8.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>The <a title=\"securitylabs.websense.com\" href=\"https:\/\/www.reuters.com\/article\/us-websense-m-a-raytheon\/raytheon-to-acquire-websense-for-1-9-billion-sources-idUKKBN0N901O20150418\" target=\"_blank\" rel=\"noopener noreferrer\">Security Labs<\/a> over at <a title=\"www.websense.com\" href=\"https:\/\/www.forcepoint.com\/websense\" target=\"_blank\" rel=\"nofollow noopener\"><strong>Websense<\/strong><\/a> (<a title=\"NASDAQ | WBSN\" href=\"https:\/\/www.zdnet.com\/article\/raytheon-websense-rebrands-as-forecepoint-acquires-intel-securitys-stonesoft\/\" target=\"_blank\" rel=\"nofollow noopener\">WBSN<\/a>) a provider of Web, data, and email content security have used the Websense ThreatSeeker Network (<a title=\"www.websense.com\" href=\"https:\/\/web.archive.org\/web\/20130403165821\/https:\/\/www.websense.com\/assets\/White-Papers\/WP_HoneyGrid_Computing.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>) which provides real-time reputation analysis, behavioral analysis, and real data identification to\u00a0announce (<a title=\"www.websense.com\" href=\"https:\/\/www.websense.com\/assets\/reports\/2012-Predictions-WS-Security-Labs.pdf?cmpid=prblog\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>) their picks for the top <a title=\"Computer security\" href=\"https:\/\/web.archive.org\/web\/20121220034914\/http:\/\/www.symantec.com:80\/endpoint-encryption-removable-storage-edition\" target=\"_blank\" rel=\"symantec noopener noreferrer\">IT security<\/a> threats for 2012. Social media is the #1 risk in 2012,.<\/p>\n<p>1. Websense says that stealing, buying, trading credit card, and social security numbers is old news. They say that your <strong>social media identity<\/strong> may prove more valuable to cybercriminals than your credit cards.<\/p>\n<p><a href=\"http:\/\/money.cnn.com\/2012\/03\/12\/technology\/linkedin-hackers\/index.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98392\" title=\"LinkedIn connections for sale\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/linkedin-connections-for_sale.jpg?resize=117%2C90&#038;ssl=1\" alt=\"LinkedIn connections for sale\" width=\"117\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/linkedin-connections-for_sale.jpg?w=150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/linkedin-connections-for_sale.jpg?resize=75%2C58&amp;ssl=1 75w\" sizes=\"auto, (max-width: 117px) 100vw, 117px\" \/><\/a>Today, your social identity may have greater value to the bad guys because <a title=\"Facebook\" href=\"https:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Facebook<\/a> (<a title=\"seekingalpha.com\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FB\/\" target=\"_blank\" rel=\"nofollow noopener\">FB<\/a>) has more than 800 million active users. More than half of FB users log on daily and they have an average of 130 friends. Trust is the basis of social networking, so if a bad guy compromises social media logins, the security firm says there is a good chance they can manipulate your friends. (<em><a title=\"twitter.com\" href=\"https:\/\/twitter.com\/StacyCowley\" target=\"_blank\" rel=\"noopener noreferrer\">Stacy Cowley<\/a> at <a title=\"money.cnn.com\" href=\"http:\/\/money.cnn.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CNN Money<\/a> has an excellent <a title=\"money.cnn.com\" href=\"http:\/\/money.cnn.com\/2012\/03\/12\/technology\/linkedin-hackers\/index.htm\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a> on how this can work with <a title=\"LinkedIn\" href=\"https:\/\/www.linkedin.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> (<a title=\"NYSE : LNKD\" href=\"https:\/\/www.investopedia.com\/news\/linkedin-delist-nyse-dec-19-lnkd-msft\/\" target=\"_blank\" rel=\"noopener noreferrer\">LNKD<\/a>). <\/em>Which leads to their second prediction.<\/p>\n<p>2. According to Websense most 2012 advanced attacks&#8217; primary <strong>attack vector will blend social media \u201cfriends,\u201d mobile devices, and the cloud<\/strong>. In the past, advanced persistent threats (<a title=\"searchsecurity.techtarget.com\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/advanced-persistent-threat-APT\" target=\"_blank\" rel=\"noopener noreferrer\">APTs<\/a>) blended email and web attacks together. In 2012, the researchers believe advanced attacks could use emerging technologies like: social media, cloud platforms, and <a title=\"www.computerworlduk.com\" href=\"http:\/\/www.computerworlduk.com\/slideshow\/mobile-wireless\/3267504\/milestones-in-the-history-of-mobile-computing\/\" target=\"_blank\" rel=\"noopener noreferrer\">mobile<\/a>. They warn that blended attacks will be the primary vector in most persistent and advanced attacks of 2012.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98394\" title=\"iPad malware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipad-virus.jpg?resize=89%2C89&#038;ssl=1\" alt=\"iPad malware\" width=\"89\" height=\"89\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipad-virus.jpg?w=150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipad-virus.jpg?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 89px) 100vw, 89px\" \/>3. The <a title=\"San Diego\" href=\"http:\/\/www.sandiego.gov\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">San Diego CA<\/a>-based firm says to expect increases in exposed <strong>vulnerabilities for mobile devices<\/strong> in 2012. They predict more than 1,000 different variants of exploits, malicious applications, and botnets will attack smartphones or tablets. Websense security investigators predict that a new variant of malware for mobile devices will appear every day.<\/p>\n<p>The Internet security firm stresses that application creators need to protectively <a title=\"tidbits.com\" href=\"http:\/\/tidbits.com\/article\/12810\" target=\"_blank\" rel=\"noopener noreferrer\">sandbox<\/a> their apps. Without sandbox technology malware will be able to get access to banking and social credentials as well as other data on the mobile device. This includes work documents and any cloud applications on that handy device. The firm believes that social engineering designed to specifically lure mobile users to infected apps and websites will increase. Websense predicts the number of mobile device users that will fall victim to social engineering scams will explode when attackers start to use mobile location-based services to design hyper-specific geolocation social engineering attempts.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98397 \" title=\"SSL\/TLS blindspot\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Key_ring.jpg?resize=92%2C61&#038;ssl=1\" alt=\"SSL\/TLS blindspot\" width=\"92\" height=\"61\" \/>4. <a title=\"technet.microsoft.com\" href=\"https:\/\/web.archive.org\/web\/20161120114158\/https:\/\/technet.microsoft.com\/en-us\/library\/cc784450(v=ws.10).aspx\" target=\"_blank\" rel=\"noopener noreferrer\">SSL\/TLS<\/a> will put net traffic into a corporate <strong>IT blind spot<\/strong>. Two items are increasing traffic over <strong>SSL\/TLS secure tunnels<\/strong> for privacy and protection. First, the disruptive growth of mobile and tablet devices is moving packaged software to the cloud and distributing data to new locations.<\/p>\n<p>Second, many of the largest, most commonly used websites, like <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> <a title=\"Google\" href=\"http:\/\/google.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">(<\/a><a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a><a title=\"Google\" href=\"http:\/\/google.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">) <\/a><a title=\"Google\" href=\"http:\/\/google.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Search<\/a>, Facebook, and <a title=\"twitter.com\" href=\"https:\/\/www.twitter.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a> have switched their sites to default to <a title=\"searchsoftwarequality.techtarget.com\" href=\"http:\/\/searchsoftwarequality.techtarget.com\/definition\/HTTPS\" target=\"_blank\" rel=\"noopener noreferrer\">HTTPS sessions<\/a>. This may seem like a positive since it encrypts the communications between the computer and destination. But as more traffic moves through encrypted tunnels, Websense correctly says that many traditional enterprise security defenses (like firewalls, IDS\/IDP, network AV, and passive monitoring) will be left looking for a threat needle in a haystack, since they cannot inspect the encoded traffic. These blind spots offer a big doorway for cybercriminals to walk through. (<em>We have started to battle this as we move from a <a title=\"acronyms.thefreedictionary.com\" href=\"http:\/\/acronyms.thefreedictionary.com\/POC\" target=\"_blank\" rel=\"noopener noreferrer\">POC<\/a> system from <del>McAfee<\/del> another vendor to a modem content filter to be nameless <a title=\"www.scmagazine.com\" href=\"https:\/\/web.archive.org\/web\/20150910190758\/http:\/\/www.scmagazine.com\/trustwave-buys-m86-to-bolster-research-managed-offerings\/article\/230896\/\" target=\"_blank\" rel=\"noopener noreferrer\">but was just bought<\/a> and we haven&#8217;t solved it yet, the <a title=\"support.google.com\" href=\"https:\/\/support.google.com\/websearch\/bin\/answer.py?hl=en&amp;answer=186669\" target=\"_blank\" rel=\"noopener noreferrer\">NoSSLSearch<\/a> for GOOG still needs some work<\/em>)<\/p>\n<p><a href=\"http:\/\/web.archive.org\/web\/20120202072353\/http:\/\/www.cyansolutions.co.uk:80\/security.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98399 \" title=\"Network security\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/network_security.jpg?resize=101%2C66&#038;ssl=1\" alt=\"Network security\" width=\"101\" height=\"66\" \/><\/a>5. For years, security defenses have focused on keeping cybercrime and malware out (<em>Also called <a title=\"\/www.mymms.com\" href=\"https:\/\/www.mymms.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">M&amp;M<\/a> <a title=\"www.usatoday.com\" href=\"https:\/\/web.archive.org\/web\/20110407110410\/http:\/\/www.usatoday.com:80\/money\/industries\/technology\/2004-12-13-security-usat_x.htm\" target=\"_blank\" rel=\"noopener noreferrer\">security<\/a>, hard on the outside, soft and chewy on the inside<\/em>). The Websense Security Lab team says that there\u2019s been much less attention on watching outbound traffic for <strong>data theft<\/strong> and evasive <strong>command and control communications<\/strong>. The researchers say hacking and malware are related to most data theft; they estimate that more than 50 percent of data loss incidents happen over the web. This is aggravated by delayed DLP deployments as vendors use traditional overly excessive processes like data discovery (<em>designed to over-sell professional services<\/em>?).<\/p>\n<p>In 2012, organizations will have to stop data theft at corporate gateways that detect custom encryption, geolocations for web destinations, and command and control communications.\u00a0 The security firm predicts organizations on the leading edge will add outbound inspection and will focus on adapting prevention technologies to be more about containment, severing communications, and data loss mitigation after an initial infection.<\/p>\n<p><a href=\"http:\/\/www.merchantcircle.com\/business\/Lexington.Development.Website.Design.SEO.214-702-3883\/picture\/view\/3318749\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98407 \" title=\"Black-Hat-SEO_full\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Black-Hat-SEO.png?resize=90%2C48&#038;ssl=1\" alt=\"Black-Hat-SEO_full\" width=\"90\" height=\"48\" \/><\/a>6. The London Olympics, U.S. presidential elections and Mayan calendar apocalyptic predictions will lead to broad attacks by criminals. <strong><a title=\"Spamdexing\" href=\"http:\/\/en.wikipedia.org\/wiki\/Spamdexing\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">SEO poisoning<\/a><\/strong> has become an everyday occurrence. The Websense Security Labs still sees highly popular search terms deliver a quarter of the first page of results as poisoned.<\/p>\n<p>The researchers expect that as the search engines have become savvier on removing poisoned results, criminals will port the same techniques to new platforms in 2012. They will continue to take advantage of today\u2019s 24-hour, up-to-the-minute news cycle, only now they will infect users where they are less suspicious: <a title=\"twitter.com\" href=\"https:\/\/twitter.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter feeds<\/a>, <a title=\"www.wikinvest.com\" href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/detroit-safest-online-city-again\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> posts\/emails, LinkedIn updates, <a title=\"YouTube\" href=\"http:\/\/www.youtube.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">YouTube video<\/a> comments, and forum conversations. Websense recommends extreme caution with searches, wall posts, forum discussions, and tweets dealing with the topics listed above, as well as any celebrity death or other surprising news from the U.S. presidential campaign.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98408 size-full\" style=\"border: 0pt none;\" title=\"Scareware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ScareWare.jpg?resize=118%2C93&#038;ssl=1\" alt=\"Scareware\" width=\"118\" height=\"93\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ScareWare.jpg?w=118&amp;ssl=1 118w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ScareWare.jpg?resize=75%2C59&amp;ssl=1 75w\" sizes=\"auto, (max-width: 118px) 100vw, 118px\" \/>7. <strong>Scareware<\/strong> tactics and the use of rogue anti-virus, will stage a comeback. With easy to acquire malicious tool kits, designed to cause massive exploitation and compromise of websites, rogue application crimeware will reemerge Websense says. Except, instead of seeing \u201cYou have been infected\u201d pages, they expect three areas will emerge as growing scareware subcategories in 2012: a growth in fake registry clean-up, fake speed improvement software, and fake back-up software mimicking popular personal cloud backup systems. Also, expect that the use of polymorphic code and IP lookup will continue to be built into each of these tactics to bypass blacklisting and hashing detection by security vendors. (<em>Rival IT Security firm <a title=\"www.gfi.com\" href=\"http:\/\/www.gfi.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">GFI Software<\/a> proves Websense&#8217;s point by reporting a &#8220;new wave of fake antivirus applications (or rogue AV)&#8221; since the start of the year and are &#8220;a popular tactic among cybercriminals.\u201d<\/em>)<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/paulsparrows.wordpress.com\/2012\/01\/08\/browsing-security-predictions-for-2012\/\" target=\"_blank\" rel=\"noopener noreferrer\">Browsing Security Predictions for 2012<\/a> (paulsparrows.wordpress.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Websense predicts that social media identity is more valuable than credit cards numbers to cybercriminals who use social media will be a source of the attack<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,1165,173,849,104,1096,536,92,77,317,696,404,813,1913,4,1878,305,1071,1147],"class_list":["post-14716","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-apt","tag-cloud-computing","tag-data","tag-facebook","tag-fb","tag-goog","tag-google","tag-internet","tag-linkedin","tag-lnkd","tag-mcafee","tag-mobile-device","tag-network","tag-security","tag-social","tag-ssl","tag-theft","tag-websense"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/14716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=14716"}],"version-history":[{"count":28,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/14716\/revisions"}],"predecessor-version":[{"id":131401,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/14716\/revisions\/131401"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=14716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=14716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=14716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}