According to the Trend Micro 2010 Future Threat Report, cloud computing and virtualization, while offering ben...
December 16, 2009
According to the Trend Micro 2010 Future Threat Report, cloud computing and virtualization, while offering benefits and cost-savings, move servers outside the traditional security perimeter and expand the playing field for cybercriminals.
“The “next-generation” protocol designed by the Internet Engineering Task Force, Internet Protocol v. 6, is still in the experimentation stages of replacing the current IPv4, now 20 years old,” the company said in a recent statement.
“As users start to explore IPv6, so will cybercriminals, and we can expect to see proof-of-concept elements in IPv6 start to materialize in the upcoming new year. Possible avenues for abuse include new covert channels or C&C. But don’t expect active targeting of IPv6 address space–at least not in the very immediate future.”
In addition, social media and social networks will be used by cybercriminals to enter the users’ “circle of trust”
“Social engineering will continue to play a big role in the propagation of threats,” the firm says. “But given the increasing saturation of social media with content intended to be shared via online social interactions, cybercriminals will definitely try to penetrate and compromise popular communities more than ever in 2010.”