Web 2.0 Tops 'Emerging Cyber Threats'

The ever-nebulous "Web 2.0" is emerging as one of the five top security risks to watch for both consumers and the enterprise--this according to the inaugural edition of the "GTISC Emerging Cyber Threats Report for 2008" out of Georgia Tech's Information Security Center. The report, released at the GTISC Security Summit on Emerging Cyber Security Threats and Countermeasures, identifies the key data security threats that are likely to expand and evolve in the coming year.

According to the report, the chief motivator for all of the top emerging threats will continue to be financial gain, taking advantage of holes in continually advancing applications whose development has been, to date, outpacing the development of countermeasures.

Commenting on the report, GTISC Director Mustaque Ahamad said, “As newer and more powerful applications enabled by technologies like Web 2.0 continue to grow, and converged communications applications increasingly rely on IP-based platforms, new challenges will arise in safegaurding these applications and the services they rely on. The GTISC Emerging Cyber Threats Report for 2008 highlights those areas of greatest risk and concern, particularly as continued convergence of enterprise and consumer technologies is expected over the coming year."

The report listed five broad categories of data security risk, cited below:
  • Web 2.0 and client-side attacks on social networking technologies, aimed at "stealing private data, hijacking Web transactions, executing phishing scams, and perpetrating corporate espionage;"
  • Targeted messaging attacks, aimed at individual users, largely for the purpose of stealing authentications and private data;
  • Botnets expanding the scope of their activities to the theft of information and increasing abuse of DMS servers;
  • Mobile convergence threats, including "vishing," "smishing," and voice spam, plus denial of service attacks targeting voice infrastructure; and
  • RFID attacks, including automated exploitation tools for tracking users via RFID devices, cloning, RF blocking, and even a form of tunneling in which commands, such as SQL queries, might be submitted to an RFID reader.
The predictions, however, are not all dire. The GTISC suggests that in the coming year the gap between application development and security and countermeasure development will begin to narrow as coordination between the "security industry, carriers, Internet Service Providers, application developers, and the user community" increases.

More information, including the complete report, can be found at the links below.

Read More:

About the Author

David Nagel is the former editorial director of 1105 Media's Education Group and editor-in-chief of THE Journal, STEAM Universe, and Spaces4Learning. A 30-year publishing veteran, Nagel has led or contributed to dozens of technology, art, marketing, media, and business publications.

He can be reached at [email protected]. You can also connect with him on LinkedIn at https://www.linkedin.com/in/davidrnagel/ .


Featured

  • From Fire TV to Signage Stick: University of Utah's Digital Signage Evolution

    Jake Sorensen, who oversees sponsorship and advertising and Student Media in Auxiliary Business Development at the University of Utah, has navigated the digital signage landscape for nearly 15 years. He was managing hundreds of devices on campus that were incompatible with digital signage requirements and needed a solution that was reliable and lowered labor costs. The Amazon Signage Stick, specifically engineered for digital signage applications, gave him the stability and design functionality the University of Utah needed, along with the assurance of long-term support.

  • Abstract geometric shapes including hexagons, circles, and triangles in blue, silver, and white

    Google Launches Its Most Advanced AI Model Yet

    Google has introduced Gemini 2.5 Pro Experimental, a new artificial intelligence model designed to reason through problems before delivering answers, a shift that marks a major leap in AI capability, according to the company.

  • Training the Next Generation of Space Cybersecurity Experts

    CT asked Scott Shackelford, Indiana University professor of law and director of the Ostrom Workshop Program on Cybersecurity and Internet Governance, about the possible emergence of space cybersecurity as a separate field that would support changing practices and foster future space cybersecurity leaders.

  • Two stylized glowing spheres with swirling particles and binary code are connected by light beams in a futuristic, gradient space

    New Boston-Based Research Center to Advance Quantum Computing with AI

    NVIDIA is establishing a research hub dedicated to advancing quantum computing through artificial intelligence (AI) and accelerated computing technologies.