engine - 4:16 pm on Nov 14, 2012 (gmt 0)
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2012.
It's an interesting report, and well worth a read. The Cloud, Supply Chain, Mobile, and Search Poisoning are a few of the threat highlights.
Professor Wenke Lee, Director of GTISC:
"If you compromise a computer, the victim can always switch to a clean machine and your attack is over," "If you compromise a user's search history and hence his online profile, the victim gets the malicious search results no matter where he logs in from."
Georgia Tech Emerging Cyber Threats Report for 2012 [gtsecuritysummit.com]