{"id":22222,"date":"2012-12-27T11:51:52","date_gmt":"2012-12-27T16:51:52","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-08-15T13:44:10","modified_gmt":"2021-08-15T17:44:10","slug":"f-secure-top-security-predictions-for-2013","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/f-secure-top-security-predictions-for-2013\/","title":{"rendered":"F-Secure Top Security Predictions for 2013"},"content":{"rendered":"<p><a href=\"https:\/\/barrynewmanmedium.com\/how-to-spot-a-fake-psychic\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-107272\" title=\"F-Secure Top Security Predictions for 2013\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-2.jpg?resize=109%2C90&#038;ssl=1\" alt=\"F-Secure Top Security Predictions for 2013\" width=\"109\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-2.jpg?resize=150%2C124&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-2.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-2.jpg?resize=768%2C636&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-2.jpg?resize=1024%2C848&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-2.jpg?w=1181&amp;ssl=1 1181w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Crystal_ball-2.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 109px) 100vw, 109px\" \/><\/a><em>As the new year looms, all kinds of firms start making predictions, mostly to boost their sales next year, I will be looking at a number of firm&#8217;s predictions for next year, a let&#8217;s see how smart they are this time next year. <\/em><em>Here are the top security predictions for 2013 from Finland-based <a title=\"F-Secure Labs\" href=\"https:\/\/www.f-secure.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">F-Secure Labs<\/a> <a title=\" Top 7 security predictions for 2013\" href=\"https:\/\/web.archive.org\/web\/20130124041503\/http:\/\/net-security.org\/secworld.php?id=14120\" target=\"_blank\" rel=\"noopener noreferrer\">shared with<\/a> Help Net Security.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.independent.ie\/regionals\/wicklowpeople\/news\/fascinating-story-of-harcourt-street-line-retold-27868681.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107274 size-medium\" title=\"ITU WCIT in Dubai could mean the end of the Internet\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/train_crash-e1570235150719-150x138.jpg?resize=150%2C138&#038;ssl=1\" alt=\"ITU WCIT in Dubai could mean the end of the Internet\" width=\"150\" height=\"138\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/train_crash-e1570235150719.jpg?resize=150%2C138&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/train_crash-e1570235150719.jpg?resize=75%2C69&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/train_crash-e1570235150719.jpg?w=309&amp;ssl=1 309w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>1. The end of the Internet as we know it?<\/strong> &#8211; Secure Labs predicts that the ITU WCIT in Dubai could mean the end of the Internet (<em>which I covered <a title=\"ITU Regs Bad for Cybersecurity\" href=\"https:\/\/wp.me\/p2wgaW-57y\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> and <a title=\"UN Wants to Put the Internet Behind Closed Doors\" href=\"https:\/\/wp.me\/p2wgaW-5Dx\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a><\/em>). Sean Sullivan, Security Advisor at <a title=\"F-Secure\" href=\"https:\/\/www.f-secure.com\/en\/web\/home_us\/home\" target=\"_blank\" rel=\"noopener noreferrer\">F-Secure<\/a> Labs says that the World Conference on International Telecommunications could have a major impact on the Internet as we know it. \u201c<em>The Internet could break up into a series of smaller Internets,<\/em>\u201d Sullivan says. \u201c<em>Or it may start to be funded differently, with big content providers like Facebook and Google\/YouTube having to pay taxes for the content they deliver.<\/em>\u201d<\/p>\n<p><em><strong>rb-<\/strong> WCIT has concluded with the U.S. and most of Europe refusing to sign the treaty due to language backed by Russia and China that could have large-ranging impacts on Internet freedom.<\/em><\/p>\n<p><strong>2. Leaks will reveal more government-sponsored espionage tools &#8211; <\/strong>\u201cIt\u2019s clear from past leaks about <a title=\"Stuxnet\" href=\"http:\/\/www.microsoft.com\/security\/portal\/Threat\/Encyclopedia\/Search.aspx?query=Stuxnet\" target=\"_blank\" rel=\"noopener noreferrer\">Stuxnet<\/a>, <a title=\"Flame\" href=\"http:\/\/www.microsoft.com\/security\/portal\/Threat\/Encyclopedia\/Search.aspx?query=Flame\" target=\"_blank\" rel=\"noopener noreferrer\">Flame<\/a>, and <a title=\"Gauss\" href=\"http:\/\/www.microsoft.com\/security\/portal\/Threat\/Encyclopedia\/Entry.aspx?Name=TrojanSpy%3aWin32%2fGauss.A\" target=\"_blank\" rel=\"noopener noreferrer\">Gauss<\/a> that the cyber arms race is well underway,\u201d says <a title=\"Mikko Hypponen\" href=\"https:\/\/web.archive.org\/web\/20210413105809\/https:\/\/mikko.hypponen.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mikko Hypponen<\/a>, Chief Research Officer at F-Secure Labs. While we may not always be aware of nation-states\u2019 covert cyber operations, we can expect that governments are more and more involved in such activity.<\/p>\n<p><strong><a href=\"https:\/\/www.engadget.com\/2010\/01\/05\/open-handset-alliance-adds-13-members\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107277\" title=\"mobile malware will increase\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware-1.jpg?resize=95%2C100&#038;ssl=1\" alt=\"mobile malware will increase\" width=\"95\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware-1.jpg?resize=143%2C150&amp;ssl=1 143w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware-1.jpg?resize=71%2C75&amp;ssl=1 71w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware-1.jpg?w=285&amp;ssl=1 285w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/><\/a>3. Commoditization of mobile malware will increase<\/strong> &#8211; The\u00a0<a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) <a title=\"Android\" href=\"http:\/\/code.google.com\/android\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Android operating system<\/a> has solidified in a way that previous mobile operating systems haven\u2019t, extending from phones to tablets to TVs to specialized versions of tablets. The more ubiquitous it becomes, \u201cthe easier to build malware on top of it and the more opportunities for criminals to innovate business-wise,\u201d Sullivan says. Mobile malware will become more commoditized, with cyber-criminals building toolkits that can be purchased and used by other criminals without real hacking skills. In other words, malware as a service, for Android.<\/p>\n<p><strong>4. Another malware outbreak will hit the Mac world<\/strong> &#8211; First it was <a title=\"Mac Defender\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mac_Defender\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Mac Defender<\/a> and then <a title=\"Flashback\" href=\"http:\/\/www.f-secure.com\/v-descs\/trojan-downloader_osx_flashback_c.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">Flashback<\/a> that attacked\u00a0<a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>F-Secure securiyt predicts in 2013 the end of the Internet, More mobile and AAPL malware. Hacked smart TVs, State-sponsored attackware, and Free tablets<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,420,202,101,857,768,536,92,1500,1240,4,936],"class_list":["post-22222","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-aapl","tag-android","tag-apple","tag-bitcoin","tag-denial-of-service-attack","tag-goog","tag-google","tag-mac-defender","tag-mac-os","tag-security","tag-smart-tv"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/22222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=22222"}],"version-history":[{"count":10,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/22222\/revisions"}],"predecessor-version":[{"id":131293,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/22222\/revisions\/131293"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=22222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=22222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=22222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}