Home Mobile Devices, Internet TV, & Geolocation Services Top Targets for Cyber Attacks in 2011

Mobile Devices, Internet TV, & Geolocation Services Top Targets for Cyber Attacks in 2011

As 2010 wraps up with a month full of leaked documents, DDoS attacks and spam and database breaches, it’s hardly surprising that security experts are predicting a rise in cybercrime in 2011. According to McAfee Labs, the top targets in the coming year will be some of the most popular technologies, services and platforms, including mobile devices, Internet TV and geolocation services.

“We’ve seen significant advancements in device and social network adoption, placing a bulls-eye on the platforms and services users are embracing the most,” says Vincent Weafer, senior VP of McAfee Labs. “These platforms and services have become very popular in a short amount of time, and we’re already seeing a significant increase in vulnerabilities, attacks and data loss.”

Exploiting social media tops the McAfee list of threat predictions, and of the sites that will be “most riddled with cybercriminal activity,” McAfee points to those with URL-shortening services at the forefront. According to McAfee, there are more than 3,000 shortened URLs generated per minute, and these are easy for cybercriminals to utilize for spamming and scamming and to direct users to malicious websites. McAfee also warns of geolocation services, with real-time tracking of where people are and what they’re doing, as providing new opportunities for criminals.

Personal Data, Corporate Data

It’s not just personal data that will be threatened by these sorts of attacks. As mobile devices become more ubiquitous in the workplace, attacks will follow, says McAfee, noting that the “historically fragile cellular infrastructure and slow strides toward encryption” will make mobile devices a target, putting both personal and corporate data at risk.

McAfee also points to Internet TV as a new target, criticizing a “‘rush to market’ thinking by developers.” McAfee says that “suspicious and malicious apps” will expose privacy and identity data. Furthermore, the move to connect more physical devices will also raise the effectiveness of botnets.

Apple’s Vulnerability

Apple users, long blasé about viruses and malware, would be wise to pay attention to security, says McAfee. As with all the areas that the security company has identified here, the increasing popularity of the Mac OS platform – along with a “lack of user understanding of proper security for these devices” in McAfee’s words – make Apple a clear target for future attacks.

While most of the predictions focus on “cybercrime,” McAfee Labs also suggests that “hacktivism” will become the “new way to demonstrate political positions in 2011 and beyond.” Look for more WikiLeaks-like events, with increasing sophistication.

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.