iTnews
  • Home
  • News
  • Technology
  • Security

2007 to bring video viruses

By Tom Sanders on Nov 30, 2006 12:50PM
2007 to bring video viruses

McAfee publishes 10 security predictions for next year.

Online criminals will continue to expand their arsenal of malware tools in 2008 to include emerging media such as video files and mobile phones, security firm McAfee predicted.

The malware phenomenon is fuelled by a growing online market for identity theft, spam and adware. This is prompting criminals to more closely mimic the processes that have been adopted by legitimate software developers such testing and quality assurance procedures, the security vendor observed.

"The goal now is making money through data theft or adware. They write them for different reasons, to make money off it," said David Marcus, McAfee's security research and communications manager with McAfee.

Online criminals will develop malware for any application that attracts large numbers of consumers and as a result are likely to start creating movie Trojans. When a user opens such a file in their media player, the software will automatically start downloading and installing malware or adware. A first example of such an online threat was detected earlier this month in the Realor worm that targets the Real Player.

Mobile phones too are expected to receive increased scrutiny from criminals. As the Symbian operating system is becoming the de facto standard for consumer smart phones and is reaching critical mass, the software becomes an attractive target for malware authors. Smartphones furthermore are started more closely resemble computers as consumers are getting use to install and run software on the devices.

Microsoft's Windows Vista operating system is notably absent from McAfee's list of security predictions for 2007. The software offers several technologies that prevent attacts that are common today. Marcus however expects that it will take malware authors about nine months before they figure out ways to compromise the software's defenses.

Despite the onslaught of new security vulnerabilities, Marcus remained o ptimistic about the overall state of computer security, pointing to advances in security software.

"It's not doomsday. The bad guys always do their best, but the [security] industry is also maturing," Marcus said.

McAfee's complete list of predictions for next year: 
  1. The number of password-stealing Web sites will increase using fake sign-in pages for popular online services such as eBay
  2. The volume of spam, particularly bandwidth-eating image spam, will continue to increase
  3. The popularity of video sharing on the Web makes it inevitable that hackers will target MPEG files as a means to distribute malicious code
  4. Mobile phone attacks will become more prevalent as mobile devices become " smarter” and more connected
  5. Adware will go mainstream following the increase in commercial Potentially Unwanted Programs
  6. Identity theft and data loss will continue to be a public issue – at the root of these crimes is often computer theft, loss of back-ups and compromised information systems 
  7. The use of bots, computer programs that perform automated tasks, will increase as a tool favored by hackers 
  8. Parasitic malware, or viruses that modify existing files on a disk, will make a comeback 
  9. The number of rootkits on 32-bit platforms will increase, but protection and remediation capabilities will increase as well 
  10. Vulnerabilities will continue to cause concern fueled by the underground market for vulnerabilities.
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
2007bringsecuritytovideoviruses

Partner Content

Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Tom Sanders
Nov 30 2006
12:50PM
0 Comments

Related Articles

  • Facebook will shut down facial recognition system
  • Poor patching creates easy zero-day vulnerability reuse
  • Atlassian patches Jira server plugin to fix vulnerability
  • Monash University opens public bug bounty
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

PayTo rollout kicks off

PayTo rollout kicks off

Researchers hacked Oracle servers to demo serious vulnerability

Researchers hacked Oracle servers to demo serious vulnerability

Neobank Volt exits the banking industry

Neobank Volt exits the banking industry

Digital Nation

Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.