Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Embedded Systems Under Attack

    By
    Brian Prince
    -
    November 29, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Embedded Systems Under Attack

      1

      As the number of connected devices continues to grow, researchers have started to pay more attention to the security of embedded computer systems and have discovered all too often that many of these systems were not designed with security in mind. At the Black Hat security conferences over the past two years, there were a number of sessions that touched on examples of this, from a hack against car computers to an exploit of a vulnerable insulin pump. In 2013, expect attackers and researchers alike to continue poking holes in the systems inside common devices.

      2DDoS Goes to the Cloud

      2

      Distributed-denial-of-service (DDoS) attacks have become a favorite weapon for hacktivists. But in 2013, virtualization vendor Incapsula is predicting this activity will have a new twist, as hackers leverage the cloud to launch their attacks. Attackers can do this, the vendor contended, by compromising the accounts of users of cloud services and then using that infrastructure to initiate an attack.

      3A Downside to DNNSEC Adoption

      3

      According to networking appliance vendor F5 Networks, 2013 will see an increase in Domain Name System (DNS) reflection attacks due to an increased deployment of DNS Security Extensions (DNSSEC), as the DNSSEC protocol response is 10 times the size of the old DNS response. This means that reflection attacks can now be 10 times as volumetric and easier to launch, the company said.

      4Social Networks and Money

      4

      As social networks look to find ways to monetize their platforms by allowing members to buy and send real gifts, cyber-criminals will look for ways to exploit this for an attack, according to Symantec. “[We anticipate] an increase in malware attacks that steal payment credentials in social networks or trick users into providing payment details, and other personal and potentially valuable information, to fake social networks,” the company said.

      5Ransomware Continues to Increase

      5

      Ransomware has undergone a significant resurgence in 2012, and that will likely continue in the new year. In a recent report entitled “Ransomware: A Growing Menace,” Symantec detailed a ransomware operation that pulled in an estimated $394,000 in a month. In 2013, the firm expects attackers to use more professional ransom screens and to update their attacks to make systems harder to recover when compromised.

      6Mobile Malware Goes Cross-Platform

      6

      From Windows 8 to Google Android to Apple iOS, attackers will be paying close attention to mobile devices next year. Web-based cross-platform exploits will make that easier, predicted Websense. “In 2013, threats to Microsoft mobile devices will see the highest rate of growth,” the company said. “Cyber-criminals are similar to legitimate application developers in that they focus on the most profitable platforms. As development barriers are removed, mobile threats will be able to leverage a huge library of shared code.”

      7Playing Nice in the Sandbox

      7

      Researchers at Websense are also predicting that hackers will work their way around virtual environments and sandboxes, with threats more readily able to tell if they are in the sandbox environments used by researchers to study malware as opposed to the malware’s targeted victim.

      8HTML5 on the Menu

      8

      The adoption of HTML5 will lead attackers to pay it more attention. In a presentation at the Black Hat security conference this year, Shreeraj Shah, founder of application security vendor Blueinfy, said that HTML5 opens up new vectors for attack, and the fact that it is new to many developers means many will make mistakes as they use it.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.