{"id":16509,"date":"2011-01-12T13:14:04","date_gmt":"2011-01-12T05:14:04","guid":{"rendered":"http:\/\/techielobang.com\/blog\/?p=16509"},"modified":"2011-01-12T13:14:04","modified_gmt":"2011-01-12T05:14:04","slug":"kaspersky-top-5-internet-security-predictions-for-2011","status":"publish","type":"post","link":"https:\/\/techielobang.com\/blog\/2011\/01\/12\/kaspersky-top-5-internet-security-predictions-for-2011\/","title":{"rendered":"Kaspersky Top 5 Internet Security Predictions for 2011"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2010\/02\/Kaspasky-logo.gif?resize=166%2C42\" alt=\"\" width=\"166\" height=\"42\" \/>Kaspersky just sent in their top 5 Internet Security predictions for the year 2011. Try to match your predictions and see if they are close to theirs.<\/p>\n<p><!--more--><\/p>\n<h2 style=\"text-align: center;\"><strong>KASPERSKY  ANNOUNCES ITS TOP 5<\/strong><\/h2>\n<h2 style=\"text-align: center;\"><strong>INTERNET  SECURITY PREDICTIONS FOR 2011<\/strong><\/h2>\n<p><strong>January 12, 2011  [Singapore] <\/strong>Kaspersky Lab,  a leading developer  of secure content and threat management solutions, today announced its  predictions for the internet security landscape for 2011.<\/p>\n<ol>\n<li><strong>CYBER CRIMINAL    SHAKEUP<\/strong>\n<ul>\n<li>The year 2010 saw malicious programs  reach a whole new level of functionality, which is likely to bring about a major  shakeup in the types of criminals orchestrating cyber attacks as well as their  aims and the methods they use.\u00a0 The  arrival of this new generation of cybercriminals means those tasked with  counteracting such cyber threats will need to raise their game  considerably.<\/li>\n<\/ul>\n<\/li>\n<li><strong>STEAL EVERYTHING    SPYWARE<\/strong>\n<ul>\n<li>We are now faced with the widespread  use of a new class of spyware programs, the aim of which can be defined quite  simply as \u2018steal everything\u2019. They will gather any information that they can  about users, right down to the color of their hair and eyes, and will examine  every document stored on infected computers.<\/li>\n<\/ul>\n<\/li>\n<li><strong>THE RISE OF    INDUSTRIAL ESPIONAGE<\/strong>\n<ul>\n<li>Industrial and state espionage will  become more pervasive, with less emphasis on precision attacks. \u00a0Cybercriminals will start targeting a  much broader range of organizations, no longer concentrating solely on online  banks and electronic payment systems. \u00a0The principal aim of many new virus  writers and their clients will be the acquisition of someone or something\u2019s  complete profile, rather than making a quick buck by stealing credit card  details or distributing spam.<\/li>\n<\/ul>\n<\/li>\n<li><strong>NEXT GENERATION    STUXNET<\/strong>\n<ul>\n<li>The  emergence in 2010 of the technologically sophisticated Stuxnet worm that  attacked industrial-class programmable logic controllers, was an impressive  demonstration to the whole world of just what the cybercriminals\u2019 arsenals  contain, as well as a wake-up call to the IT security industry because of how  difficult it was to counteract. \u00a0It  cannot be ruled out that governments and commercial organizations will make use  of Stuxnet-like programs for their own ends.<\/li>\n<\/ul>\n<\/li>\n<li><strong>MORE THREATS    TARGETING 64-BIT PLATFORMS<\/strong>\n<ul>\n<li>The  primary method of carrying out malware and hacker attacks will make use of  vulnerabilities in legitimate software and will be carried out via browsers.  \u00a0There will be an increase in the  number of threats targeting 64-bit platforms, as well as more attacks on mobile  devices, mobile operating systems and users of social networks. \u00a0However, DDoS attacks will remain one of  the biggest problems plaguing the Internet.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>About  Kaspersky Lab<\/strong><\/p>\n<p>Kaspersky  Lab delivers the world\u2019s most immediate protection against IT security threats,  including viruses, spyware, crimeware, hackers, phishing, and spam. Kaspersky  Lab is one of the top vendors of information security solutions in the world.  The company\u2019s products and technologies are used by over 250 million people  worldwide, its technology is licensed by leading security vendors globally. The  Kaspersky Lab group of companies is headquartered in Moscow, has five regional  divisions including Southeast Asia and numerous local offices throughout the  world. You can learn more about Kaspersky Lab by visiting <a href=\"http:\/\/www.kaspersky-sea.com\/\" target=\"_blank\">www.kaspersky-sea.com<\/a>.  For the latest on anti-virus, anti-spyware, anti-spam and other IT security  issues and trends, please visit <a href=\"http:\/\/www.viruslist.com\/\" target=\"_blank\">www.viruslist.com<\/a>.<\/p>\n<p>To  know more about Kaspersky latest news, events and activities, please join  Kaspersky Friends and Fan Klub, visit <a href=\"http:\/\/www.kklub.net\/\" target=\"_blank\">www.kklub.net<\/a>.<\/p>\n<p>\u00a9  2009 Kaspersky Lab. The information contained herein is subject to change  without notice. The only warranties for Kaspersky Lab products and services are  set forth in the express warranty statements accompanying such products and  services. Nothing herein should be construed as constituting an additional  warranty. Kaspersky Lab shall not be liable for technical or editorial errors or  omissions contained herein.<br \/>\n[ad#boxlist]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky just sent in their top 5 Internet Security predictions for the year 2011. Try to match your predictions and see if they are close to theirs&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[4,3],"tags":[2998,1166,886,4296,1961,4120,3136,4297],"class_list":["post-16509","post","type-post","status-publish","format-standard","hentry","category-information","category-technology","tag-2998","tag-internet","tag-kaspersky","tag-prediction","tag-security","tag-threat","tag-top","tag-top-5"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p8YKZ-4ih","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/16509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/comments?post=16509"}],"version-history":[{"count":4,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/16509\/revisions"}],"predecessor-version":[{"id":16513,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/16509\/revisions\/16513"}],"wp:attachment":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/media?parent=16509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/categories?post=16509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/tags?post=16509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}