Welcome to WebmasterWorld Guest from

Forum Moderators: phranque

Message Too Old, No Replies

Report: Emerging Cyber Threats 2013

4:16 pm on Nov 14, 2012 (gmt 0)

Administrator from GB 

WebmasterWorld Administrator engine is a WebmasterWorld Top Contributor of All Time 10+ Year Member Top Contributors Of The Month Best Post Of The Month

joined:May 9, 2000
votes: 1035

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2012.

It's an interesting report, and well worth a read. The Cloud, Supply Chain, Mobile, and Search Poisoning are a few of the threat highlights.

Professor Wenke Lee, Director of GTISC:
"If you compromise a computer, the victim can always switch to a clean machine and your attack is over," "If you compromise a user's search history and hence his online profile, the victim gets the malicious search results no matter where he logs in from."

Georgia Tech Emerging Cyber Threats Report for 2012 [gtsecuritysummit.com]
9:18 pm on Nov 18, 2012 (gmt 0)

Moderator from US 

WebmasterWorld Administrator robert_charlton is a WebmasterWorld Top Contributor of All Time 10+ Year Member Top Contributors Of The Month

joined:Nov 11, 2000
votes: 409

This thread and the report deserve much more attention than they've gotten.

Note that reading the pdf report at a decent font size involves some side-scrolling on all but very large screens, but the report is well-written, fairly brief, and definitely worth a read. It leads to numerous side areas also worth exploring. The overview it presents is striking.


- Information manipulation gives attackers the ability to influence what a victim sees on the Web in a way that survives cleaning the client machine.
- The act of personalizing search results and news feeds leads to a narrowing of viewpoints, a form of automated censorship.
- Attempts to increase the uptake of a given viewpoint can be detected based on certain characteristics.

On the same landing page linked to above, there's also a Georgia Tech Cyber Security Summit video, which unfortunately is 164 minutes long. It may take some real dedication to go there. It's very well produced, though, with excellent content in the sections I viewed, and you can jump through it to pick up various discussions.

Note that there's a semi-parallel thread in the WebmasterWorld Google Search forum, deriving from an article which reports on the above pdf...

Attackers to Exploit Search Personalization, Supply Chains
http://www.webmasterworld.com/google/4519491.htm [webmasterworld.com]