Feeds

Adobe predicted as top 2010 hacker target

McAfee's crystal ball also reveals Google Chrome dangers

5 things you didn’t know about cloud backup

Adobe will overtake Microsoft as the primary target for hackers and virus writers in 2010, net-security firm McAfee predicts.

Attacks targeting vulnerabilities in Acrobat Reader and Flash are already commonplace, driven in part by that software's widespread use. The often-tricky update process and lack of user awareness that apps as well as browsers and Windows need updating further compounds the problem of PDF-based malware - which McAfee reckons will only increase next year.

The security firm also predicts an increase in the severity and power of hacking attacks aimed at users of social networking websites such as Twitter and Facebook. Mystic McAfee also predicts that banking Trojans will become even more sophisticated, perhaps by gaining the ability to interrupt legitimate transactions and make unauthorised withdrawals without being detected. Malware in email attachments, a common ploy in targeted attacks, is also expected to increase.

Meanwhile, botnets - the main currency of cyberattacks - are likely to move further away from reliance on command and control servers towards a peer-to-peer architecture that's more resilient against takedown efforts.

All these predictions more or less follow on from current trends. The one new highlight in McAfee's threat report is the prediction that HTML5 will give "cybercriminals new opportunities to write malware and prey on users." The upcoming web mark-up technology is meant to reduce reliance on proprietary browser plug-ins for Adobe Flash, Microsoft Silverlight, and Sun Java. The standard is still a work-in-progress, but elements of the technology are already supported by Google Chrome, a fact that could spawn a new line of hacking attacks, McAfee warns:

HTML 5 holds all the promises that today’s web community seeks - primarily that of blurring and removing the lines between a web application and a desktop application. HTML5-based attacks will become even more tempting once the Google Chrome Operating System is released. (It’s scheduled for second half of 2010.)

Google Chrome OS is intended for use with netbooks, and HTML5 enables not only a rich Internet experience, but also offline applications. Another motivation for attackers is HTML5’s anticipated cross-platform support, which will allow attackers to eventually reach users of many mainstream browsers.

McAfee's 2010 Threat Predictions report can be downloaded here as an un-Firefox friendly PDF. ®

Next gen security for virtualised datacentres

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.