Forum Moderators: phranque
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2012.
"If you compromise a computer, the victim can always switch to a clean machine and your attack is over," "If you compromise a user's search history and hence his online profile, the victim gets the malicious search results no matter where he logs in from."
Highlights:
- Information manipulation gives attackers the ability to influence what a victim sees on the Web in a way that survives cleaning the client machine.
- The act of personalizing search results and news feeds leads to a narrowing of viewpoints, a form of automated censorship.
- Attempts to increase the uptake of a given viewpoint can be detected based on certain characteristics.