<node id="71075">
  <nid>71075</nid>
  <type>news</type>
  <uid>
    <user id="27560"><![CDATA[27560]]></user>
  </uid>
  <created>1318319180</created>
  <changed>1475896226</changed>
  <title><![CDATA[Georgia Tech Releases Cyber Threats Forecast for 2012]]></title>
  <body><![CDATA[<p>The year ahead will feature new and increasingly
sophisticated means to capture and exploit user data, as well as escalating
battles over the control of online information that threatens to compromise
content and erode public trust and privacy. Those were the findings announced
by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech
Research Institute (GTRI) in today's release of the <a href="http://gtsecuritysummit.com/report.html">Georgia Tech Emerging Cyber
Threats Report for 2012</a>. The report was released at the annual <a href="http://gtsecuritysummit.com/">Georgia Tech Cyber Security Summit</a>,
a gathering of industry and academic leaders who have distinguished themselves
in the field of cyber security.</p>

<p>According to GTISC, GTRI and the experts cited in the
report, specific threats to follow over the coming year include, among others:

</p><ul><li><strong>Search Poisoning</strong> – Attackers will increasingly
use SEO techniques to optimize malicious links among search results, so that
users are more likely to click on a URL because it ranks highly on Google or
other search engines.

</li></ul><ul><li><strong>Mobile Web-based Attacks</strong> – Expect increased attacks
aimed specifically against mobile Web browsers as the tension between usability
and security, along with device constraints (including small screen size), make
it difficult to solve mobile Web browser security flaws. </li></ul>

<ul><li><strong>Stolen Cyber Data Use for
Marketing</strong> – The market for stolen cyber data will continue to evolve as
botnets capture private user information shared by social media platforms and
sell it directly to legitimate business channels such as lead-generation and
marketing. </li></ul>

<p>“We continue to witness cyber attacks of unprecedented
sophistication and reach, demonstrating that malicious actors have the ability
to compromise and control millions of computers that belong to governments,
private enterprises and ordinary citizens,” said Mustaque Ahamad, director of GTISC.
“If we are going to prevent motivated adversaries from attacking our systems,
stealing our data and harming our critical infrastructure, the broader
community of security researchers—including academia, the private sector and
government—must work together to understand emerging threats and to develop
proactive security solutions to safeguard the Internet and physical
infrastructure that relies on it.”

</p><p>Today’s Georgia Tech Cyber Security Summit is one forum
where the IT security ecosystem can gather together to discuss and debate the
evolving nature of cyber threats, and to chart the course for creating
solutions through collaborations among industry, government and academia. The
Summit was keynoted by Admiral William J. Fallon, U.S. Navy (retired) and
included a panel of security experts from Equifax, The Financial Services
Roundtable, Mobile Active Defense, Reputation.com and GTRI.

</p><p>"Our adversaries, whether motivated by monetary
gain, political/social ideology, or otherwise are becoming increasingly
sophisticated and better funded,” said Bo Rotoloni, director of GTRI’s Cyber
Technology and Information Security Laboratory (CTISL). “Acting as individuals
or groups, these entities know no boundaries, making cyber security a global
problem. We can no longer assume our data is safe sitting behind perimeter-protected
networks. Attacks penetrate our systems through ubiquitous protocols, mobile
devices and social engineering, circumventing the network perimeter. Our best
defense on the growing cyber warfront is found in cooperative education and
awareness, best-of-breed tools and robust policy developed collaboratively by
industry, academia and government.”

</p><p>The Georgia Institute of Technology is one of the
nation's leading public research universities and the home of groundbreaking cyber
security research and academic initiatives through GTISC, GTRI and other
facilities across campus. These efforts are focused on producing technology and
innovation that will help drive economic growth, while improving human life on
a global scale. </p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[Search Poisoning, Mobile Browser Attacks and Stolen Data Predicted]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2011-10-11T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Annual Georgia Tech Emerging Cyber Threats Report identifies top security concerns for 2012.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>The year ahead will 
feature new and increasingly sophisticated means to capture and exploit 
user data, as well as escalating battles over the control of online 
information that threatens to compromise content and erode public trust 
and privacy. Those were the findings announced by the Georgia Tech 
Information Security Center (GTISC) and the Georgia Tech Research 
Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2012. The report was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[jason.maderer@comm.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Jason Maderer</p><p>Georgia Tech Media Relations</p><p>404-385-2966</p><p><a href="mailto:maderer@comm.gatech.edu">maderer@comm.gatech.edu</a></p><p>&nbsp;</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1214</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Research]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>135</tid>
        <value><![CDATA[Research]]></value>
      </item>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>http://gtsecuritysummit.com/report.html</url>
      <title></title>
      </link>
          <link>
      <url>http://www.cc.gatech.edu/</url>
      <title></title>
      </link>
          <link>
      <url>http://www.gtisc.gatech.edu/</url>
      <title></title>
      </link>
          <link>
      <url>http://www.gtri.gatech.edu/</url>
      <title></title>
      </link>
          <link>
      <url>http://www.inta.gatech.edu/</url>
      <title></title>
      </link>
          <link>
      <url>http://www.youtube.com/watch?v=2Ruirj11ojY</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1214</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[News Room]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>654</tid>
        <value><![CDATA[College of Computing]]></value>
      </item>
          <item>
        <tid>9641</tid>
        <value><![CDATA[Cyber Threats]]></value>
      </item>
          <item>
        <tid>11435</tid>
        <value><![CDATA[Georgia Tech Ivan Allen College]]></value>
      </item>
          <item>
        <tid>14171</tid>
        <value><![CDATA[GTISC Security Summit]]></value>
      </item>
          <item>
        <tid>416</tid>
        <value><![CDATA[GTRI]]></value>
      </item>
          <item>
        <tid>14680</tid>
        <value><![CDATA[The Sam Nunn School of International Affairs]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
