{"71075":{"#nid":"71075","#data":{"type":"news","title":"Georgia Tech Releases Cyber Threats Forecast for 2012","body":[{"value":"\u003Cp\u003EThe year ahead will feature new and increasingly\nsophisticated means to capture and exploit user data, as well as escalating\nbattles over the control of online information that threatens to compromise\ncontent and erode public trust and privacy. Those were the findings announced\nby the Georgia Tech Information Security Center (GTISC) and the Georgia Tech\nResearch Institute (GTRI) in today\u0027s release of the \u003Ca href=\u0022http:\/\/gtsecuritysummit.com\/report.html\u0022\u003EGeorgia Tech Emerging Cyber\nThreats Report for 2012\u003C\/a\u003E. The report was released at the annual \u003Ca href=\u0022http:\/\/gtsecuritysummit.com\/\u0022\u003EGeorgia Tech Cyber Security Summit\u003C\/a\u003E,\na gathering of industry and academic leaders who have distinguished themselves\nin the field of cyber security.\u003C\/p\u003E\n\n\u003Cp\u003EAccording to GTISC, GTRI and the experts cited in the\nreport, specific threats to follow over the coming year include, among others:\n\n\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ESearch Poisoning\u003C\/strong\u003E \u2013 Attackers will increasingly\nuse SEO techniques to optimize malicious links among search results, so that\nusers are more likely to click on a URL because it ranks highly on Google or\nother search engines.\n\n\u003C\/li\u003E\u003C\/ul\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EMobile Web-based Attacks\u003C\/strong\u003E \u2013 Expect increased attacks\naimed specifically against mobile Web browsers as the tension between usability\nand security, along with device constraints (including small screen size), make\nit difficult to solve mobile Web browser security flaws. \u003C\/li\u003E\u003C\/ul\u003E\n\n\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EStolen Cyber Data Use for\nMarketing\u003C\/strong\u003E \u2013 The market for stolen cyber data will continue to evolve as\nbotnets capture private user information shared by social media platforms and\nsell it directly to legitimate business channels such as lead-generation and\nmarketing. \u003C\/li\u003E\u003C\/ul\u003E\n\n\u003Cp\u003E\u201cWe continue to witness cyber attacks of unprecedented\nsophistication and reach, demonstrating that malicious actors have the ability\nto compromise and control millions of computers that belong to governments,\nprivate enterprises and ordinary citizens,\u201d said Mustaque Ahamad, director of GTISC.\n\u201cIf we are going to prevent motivated adversaries from attacking our systems,\nstealing our data and harming our critical infrastructure, the broader\ncommunity of security researchers\u2014including academia, the private sector and\ngovernment\u2014must work together to understand emerging threats and to develop\nproactive security solutions to safeguard the Internet and physical\ninfrastructure that relies on it.\u201d\n\n\u003C\/p\u003E\u003Cp\u003EToday\u2019s Georgia Tech Cyber Security Summit is one forum\nwhere the IT security ecosystem can gather together to discuss and debate the\nevolving nature of cyber threats, and to chart the course for creating\nsolutions through collaborations among industry, government and academia. The\nSummit was keynoted by Admiral William J. Fallon, U.S. Navy (retired) and\nincluded a panel of security experts from Equifax, The Financial Services\nRoundtable, Mobile Active Defense, Reputation.com and GTRI.\n\n\u003C\/p\u003E\u003Cp\u003E\u0022Our adversaries, whether motivated by monetary\ngain, political\/social ideology, or otherwise are becoming increasingly\nsophisticated and better funded,\u201d said Bo Rotoloni, director of GTRI\u2019s Cyber\nTechnology and Information Security Laboratory (CTISL). \u201cActing as individuals\nor groups, these entities know no boundaries, making cyber security a global\nproblem. We can no longer assume our data is safe sitting behind perimeter-protected\nnetworks. Attacks penetrate our systems through ubiquitous protocols, mobile\ndevices and social engineering, circumventing the network perimeter. Our best\ndefense on the growing cyber warfront is found in cooperative education and\nawareness, best-of-breed tools and robust policy developed collaboratively by\nindustry, academia and government.\u201d\n\n\u003C\/p\u003E\u003Cp\u003EThe Georgia Institute of Technology is one of the\nnation\u0027s leading public research universities and the home of groundbreaking cyber\nsecurity research and academic initiatives through GTISC, GTRI and other\nfacilities across campus. These efforts are focused on producing technology and\ninnovation that will help drive economic growth, while improving human life on\na global scale. \u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":[{"value":"Search Poisoning, Mobile Browser Attacks and Stolen Data Predicted"}],"field_summary":[{"value":"\u003Cp\u003EThe year ahead will \nfeature new and increasingly sophisticated means to capture and exploit \nuser data, as well as escalating battles over the control of online \ninformation that threatens to compromise content and erode public trust \nand privacy. Those were the findings announced by the Georgia Tech \nInformation Security Center (GTISC) and the Georgia Tech Research \nInstitute (GTRI) in today\u0027s release of the Georgia Tech Emerging Cyber Threats Report for 2012. The report was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Annual Georgia Tech Emerging Cyber Threats Report identifies top security concerns for 2012."}],"uid":"27560","created_gmt":"2011-10-11 07:46:20","changed_gmt":"2016-10-08 03:10:26","author":"Jason Maderer","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2011-10-11T00:00:00-04:00","iso_date":"2011-10-11T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"related_links":[{"url":"http:\/\/gtsecuritysummit.com\/report.html","title":"Complete 2012 Cyber Threat Report"},{"url":"http:\/\/www.cc.gatech.edu\/","title":"College of Computing"},{"url":"http:\/\/www.gtisc.gatech.edu\/","title":"GTISC"},{"url":"http:\/\/www.gtri.gatech.edu\/","title":"Georgia Tech Research Institute"},{"url":"http:\/\/www.inta.gatech.edu\/","title":"Sam Nunn School of International Affairs"},{"url":"http:\/\/www.youtube.com\/watch?v=2Ruirj11ojY","title":"Interviews from the Summit"}],"groups":[{"id":"1214","name":"News Room"}],"categories":[{"id":"135","name":"Research"}],"keywords":[{"id":"654","name":"College of Computing"},{"id":"9641","name":"Cyber Threats"},{"id":"11435","name":"Georgia Tech Ivan Allen College"},{"id":"14171","name":"GTISC Security Summit"},{"id":"416","name":"GTRI"},{"id":"14680","name":"The Sam Nunn School of International Affairs"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJason Maderer\u003C\/p\u003E\u003Cp\u003EGeorgia Tech Media Relations\u003C\/p\u003E\u003Cp\u003E404-385-2966\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022mailto:maderer@comm.gatech.edu\u0022\u003Emaderer@comm.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"email":["jason.maderer@comm.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}