Computer-threatsCyber-security no longer means only protecting your computer from ne'er-do-wells. Hackers are cracking codes on all sorts of devices and getting sneaky about breaking into everything from cell phones to car systems.

"Security threats are escalating every year," says Adam Wosotowsky, a senior anti-spam analyst with McAfee Labs.
In years past, hackers often engaged in what could be considered mischievous fun -- finding vulnerabilities in software and then pointing out problems that needed to be fixed. But over the past decade, Wosotowsky says, security threats have become more malicious, with criminals entering the scene stealing financial and personal information, and even worldwide governments engaging in cyber warfare.

With cell phones and automobiles becoming more computerized, hackers have an even wider selection of devices to infect with viruses and other malicious threats.

Top 10 Threat Predictions

As we enter the new year, security giant McAfee offers up its list of the top 10 security threats (PDF file) that are expected to loom large in 2012.

10. Increased industrial attacks. Many industrial systems are not prepared for cyber attacks, and attackers may engage in blackmail or extortion in 2012. (See this story for an account of one such attack.)

9. 'Legalized' spam. Legitimate advertisers are purchasing email lists of consumers who have authorized receipt of online ads, a move that comes as global spam volume has dropped over the past two years.

8. Hacktivism. Online activists will join forces with physical demonstrators, targeting public figures, industry leaders, and other entities.

7. Cyberwar showoffs. Countries are expected to demonstrate their cyber-war capabilities to send a message that they are not vulnerable to cyber attacks against their infrastructures (such as utilities).

6. Rogue certificates. Production of fake digitally signed certificates, which are used as a means of assuring consumers and their security software that the website they are viewing is legitimate, will increase.

5. Blinking online traffic lights. Legislative issues are expected to stall efforts to develop Internet traffic "rules of the road," which could aid in reducing instances in which hackers steer users to an unintended server.

4. Advances in operating systems directing hackers elsewhere. New security features included in the operating system will force hackers to find alternative entry points in a consumer's computer.

3. Threats to virtual currency. Hackers will increasingly target the growing use of cyber currency, which is often not encrypted, as a means to steal money and spread malware.

2. Embedded hardware. Cars, medical devices, routers, digital cameras, and other items use embedded systems designed to control specific functions. Once these embedded systems are hacked, an attacker can have complete control over the hardware, such as asking a car's GPS system to tell the hacker where you live.

1. Mobile threats bypassing PCs. Attackers will improve their craft with an eye toward launching mobile banking attacks. For example, consumers may eventually see SpyEye and Zeus, two Trojan banking attacks, migrate from the computer to the smartphone.

Be Smart With Your Smartphone

With smartphone use rapidly on the rise, this can be a problem for consumers who wish to use their phone for mobile banking. Says Wosotowsky, "A smartphone is like a computer, so there are the same capabilities for infection."

Consumers would be wise to treat their smartphone like their computer and take all the necessary precautions, Wosotowsky says. His advice:

  • Don't click on unsolicited links or download software from a source whose origin is unclear.
  • Use only apps that come from your bank: "Consumers shouldn't use a third-party mobile banking app, unless a large number of people have already downloaded it," Wosotowsky says.
  • Don't mix money-work and fun. Avoid using your smartphone for the dual purpose of visiting financial sites to enter financial information and visiting sites to download games. Often, sites offering free games or porn contain viruses that can later harvest personal or financial information off a smartphone.

Motley Fool contributor Dawn Kawamoto is an avid user of smartphones and drives a car. But neither is infected with a virus, yet.


Increase your money and finance knowledge from home

Intro to Retirement

Get started early planning for your long term future.

View Course »

How to Avoid Financial Scams

Avoid getting duped by financial scams.

View Course »

Add a Comment

*0 / 3000 Character Maximum

5 Comments

Filter by:
Bill

McAfee fails to point out that they themselves will let viruses into their own customers computer,and then want an extra $100.00 to fix it for you.I can say this because it happened to me.When they said it would cost me the 100 bucks to fix it I cancelled my account with them ,but not before I told them "I will not pay my security guard $100 to clean up the mess he let in in the first place". I then googled the virus and found the instructions on how to remove it.All better now.

June 11 2012 at 6:25 PM Report abuse rate up rate down Reply
Carita

It is clear that Internet security is very important and steps need to be taken to install a good established internet security software's like provided by comodo.

January 11 2012 at 6:36 AM Report abuse rate up rate down Reply
Orben

Greetings, you are about to be introduced to the biggest trading secret in the world, a trading secret that can give you a 90% success rate, a trading secret that you would never believe without extensive proof, and that is exactly what I provide for you in the form of demonstration videos that have to be seen to be believed: Go to the website “ Gold Trading Academy.”

January 10 2012 at 9:15 AM Report abuse rate up rate down Reply
Mike

Libtard controled federalism IS the biggest threat

January 03 2012 at 5:45 PM Report abuse rate up rate down Reply
1 reply to Mike's comment
RJC

Learn to spell and punctuate correctly before you go off on one of your drug-induced rants. Otherwise, it shows your lack of intelligence, no doubt gleaned from the ideological and political company you keep.

January 10 2012 at 2:19 PM Report abuse +1 rate up rate down Reply