Facebook, Twitter to face more sophisticated attacks: McAfee

December 30, 2009
The logo of social networking website 'Facebook' is displayed on a computer screen. "The explosion of applications on Facebook and other services will be an ideal vector for cybercriminals," McAfee said.

Social networks will face increasingly sophisticated hacker attacks in 2010 but law enforcement is expected to make strides in fighting cybercrime, according to Web security firm McAfee Labs.

"The explosion of applications on and other services will be an ideal vector for cybercriminals, who will take advantage of friends trusting friends to click links they might otherwise treat cautiously," McAfee said.

In its 2010 Threat Predictions report, McAfee also said it expected to see increased threats to banking security and a rise in the use of "botnets," armies of infected computers used to spread or malware.

"However, in 2010 we expect to see an increase in the effectiveness of law enforcement to fight back against cybercrime," the Santa Clara, California, computer said in the report released on Tuesday.

McAfee said Adobe products were likely to come under increasing threat next year and the release by of its Chrome computer would "create another opportunity for malware writers to prey on users."

"Cybercriminals have long picked on Microsoft products due to their popularity," the report said. "In 2010, we anticipate Adobe software, especially Acrobat Reader and Flash, will take the top spot."

"Based on the current trends, we expect that in 2010 Adobe product exploitation is likely to surpass that of Microsoft Office applications in the number of desktop PCs being attacked," it said.

McAfee said hackers were expected to try to take advantage of the proliferation of URL shortening services such as bit.ly and tinyurl.com.

"These services now appear in all sorts of communications -- making it easier than ever to mask the URLs that users are asked to click," it said.

"This trick will play a more predominant role in 2010; it's the perfect avenue to direct users to websites that they would normally be wary about visiting.

"As users' expectations of their Web 2.0 services evolve, we expect to see many rogue services set up with the hidden purpose of capturing credentials and data," McAfee said.

McAfee also said email remained vulnerable.

"Email is increasing in popularity as the preferred method for targeting attacks against individual users, corporations, and government institutions," it said.

"Although such attacks were rare some years ago, we now see many reports of successful assaults, both by criminals and for espionage, in which an email with an attachment or a link to a website is the attack vector," it said.

"During the last six years, botnets have become the biggest thorn in the side of cybersecurity professionals," McAfee added.

"Botnets have become the essential infrastructure used by cybercriminals and nation states for launching nearly every type of cyberattack," it said.

Law enforcement has made some progress in battling botnets.

"As a result of aggressive efforts to take offline these service providers that cater predominantly to the cybercriminal element, as well as of direct targeting of specific botnet control channels, numerous botnet operations have been severely disrupted in recent years," McAfee said.

Explore further: Microsoft: New security tech products

Related Stories

More targeted cyber attacks likely in 2006

January 23, 2006

The latest security report from IBM foresees cybercrime evolving from pervasive global outbreaks to smaller, stealthier attacks targeted at specific organizations for extortion purposes. IBM Global Business Security Index ...

Briefs: McAfee unveils HIPS 6.0

March 22, 2006

Anti-virus and information-security company McAfee announced Wednesday it would integrate a new system to keep unwanted users out of computer systems.

Spam down but 'zombie' armies growing: McAfee

May 7, 2009

Hackers appear to be beefing up armies of "zombie" computers to recover from a major hit scored in the battle against spam email, according to software security firm McAfee.

Recommended for you

Microsoft describes hard-to-mimic authentication gesture

August 1, 2015

Photos. Messages. Bank account codes. And so much more—sit on a person's mobile device, and the question is, how to secure them without having to depend on lengthy password codes of letters and numbers. Vendors promoting ...

Power grid forecasting tool reduces costly errors

July 30, 2015

Accurately forecasting future electricity needs is tricky, with sudden weather changes and other variables impacting projections minute by minute. Errors can have grave repercussions, from blackouts to high market costs. ...

Netherlands bank customers can get vocal on payments

August 1, 2015

Are some people fed up with remembering and using passwords and PINs to make it though the day? Those who have had enough would prefer to do without them. For mobile tasks that involve banking, though, it is obvious that ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.