Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


POCs Corrupting Embedded Mechanisms to Increase during 2012, Predicts McAfee

In its just published 2012 security threat forecasts, McAfee highlights that proof-of-concepts (POC) that abuse embedded mechanisms will grow in efficacy during 2012 and even later. For this therefore, malware will be necessary designed to target the hardware, while attacks will be possible for acquiring more control as well as sustained admission into both the computer and data stored on it over an extensive length of time. Such a situation will subsequently have advanced hackers gain total hold over hardware.

Currently, it maybe mentioned that embedded mechanisms cater to one particular control operation as part of a bigger mechanism, while getting utilized in medical instruments, printers, digital cameras, GPS systems, automotives and routers.

Normally, individuals and organizations repose faith in certificates that are digitally signed, but as per the report by McAfee, the Stuxnet and its variant Duqu lately utilized fake certificates for bypassing identification. Expectedly, during 2012, certificate authorities will be targeted over a wide scale and there'll be greater generation and use of fake digital certificates. Consequently, chief infrastructures will be affected; so also safe browsing for online transactions in addition to application control and white-listing type of host-based techniques, McAfee predicts.

Moreover, McAfee also predicts that the hackers' gang Anonymous requires changing else terminate so far as hacktivism in 2012 is concerned, meaning that the influence of Anonymous must get organized via issuing operation and responsibility declarations, otherwise any group that labels itself as Anonymous may ultimately get marginalized. Tgdaily.com published this on December 28, 2011.

Nevertheless, the security firm thinks that hackers will combine with protestors like of the Occupy pressure group more-and-more to expose still further details of individuals.

Actually, seeking to fulfill ideological or political motives, there'll be increased revelations of public figures' private lives, including those of politicians, security and law-enforcement officials, judges, and industry magnets. Indeed, demonstrators will do everything for acquiring data from Web-servers or social-networking websites towards backing their causes.

Finally, McAfee states that as operating systems become equipped with better security mechanisms, hackers will be compelled for hunting vulnerabilities elsewhere like within hard drives, network cards, or the Basic Input Output System.

Related article: PC-Virus of 2005 Threatening Japanese Bank Accountholders, Warns Symantec

ยป SPAMfighter News - 1/7/2012

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page