12 SECURITY PREDICTIONS FOR 2012
This time every year, I sit down with my research teams
and we talk about what we think the coming year will hold
in terms of threats to our customers. It’s an important
discussion that helps us not only share with you what we
think you need to be prepared for, but also to help guide our
direction as we continue to build products and services to
help protect you from these threats.
This year, as we look ahead, we’ve come up with
12 predictions for 2012 that fall into four main categories:
   • Big IT trends
   • Mobile landscape
   • Threat landscape
   • Data leaks and breaches
In looking at these predictions, what we see in common are
trends toward ever more sophisticated attackers and away
from the PC-centric desktop. Our hope that new OSs make
the world a safer place didn’t work out. This means that our
customers in 2012 will need to continue moving toward a
more data-centric model for effective security and privacy
as they embrace consumerization, virtualization, and the
cloud. And we here at Trend Micro need to continue our
work in these key areas to help enable our customers to
meet and protect against these threat trends in 2012.
At Trend Micro, we are always
working to understand not just the
threats of today, but also the trends
of tomorrow; it’s in our company
name. That helps us to help you
better protect your data and assets.
I hope that you find this year’s
predictions to be not only interesting,
but helpful in making 2012 a safe and
secure year.




                    Raimund Genes
                    CTO, Trend Micro
BIG
IT
TRENDS
Though many
    organizations are still
    uncomfortable with
    consumerization, security
1   and data breach incidents in 2012 will
    force them to face BYOD-related challenges.
    The Bring-Your-Own-Device (BYOD) Era is here to stay. As more and more
    corporate data is stored or accessed by devices that are not fully controlled
    by IT administrators, the likelihood of data loss incidents that are directly
    attributable to the use of improperly secured personal devices will rise. We will
    definitely see incidents of this nature in 2012.
The real challenge for
    data center owners will be dealing
    with the increasing complexities of securing
    physical, virtual, and cloud-based systems.
2   While attacks specifically targeting virtual machines (VMs) and cloud
    computing services remain a possibility, attackers will find no immediate need
    to resort to these because conventional attacks will remain effective in these
    new environments. Virtual and cloud platforms are just as easy to attack but
    more difficult to protect. The burden will thus fall on IT administrators who
    have to secure their company’s critical data as they adopt these technologies.
    Patching a big array of virtualized servers is a challenge, allowing hackers to
    hijack servers, to fork traffic, and/or to steal data from vulnerable systems.
MOBILE
LANDSCAPE
Smartphone and tablet
    platforms, especially
3   Android, will suffer from
    more cybercriminal attacks.
    As smartphone usage continues to grow worldwide, mobile platforms will
    become even more tempting cybercriminal targets. The Android platform,
    in particular, has become a favorite attack target due to its app distribution
    model, which makes it completely open to all parties. We believe this will
    continue in 2012 although other platforms will also come under fire.
Security vulnerabilities
    will be found in legitimate
4   mobile apps, making data
    extraction easier for cybercriminals.
    To date, mobile platform threats come in the form of malicious apps. Moving
    forward, we expect cybercriminals to go after legitimate apps as well. They
    will likely find either vulnerabilities or coding errors that can lead to user data
    theft or exposure. Compounding this further is the fact that very few app
    developers have a mature vulnerability handling and remediation process,
    which means the window of exposure for these flaws may be longer.
THREAT
LANDSCAPE
5   Even though botnets will become smaller,
    they will grow in number, making effective law
    enforcement takedowns more difficult to realize.
    Botnets, the traditional cybercrime tool, will evolve in response to actions
    taken by the security industry. The days of massive botnets may be over.
    These may be replaced by more, albeit smaller but more manageable, botnets.
    Smaller botnets will reduce risks to cybercriminals by ensuring that the loss of
    a single botnet will not be as keenly felt as before.
Hackers will eye
    nontraditional targets so
    flawed Internet-connected equipment,
    ranging from SCADA-controlled heavy
6   industrial machinery to medical gadgets,
    will come under attack.
    Attacks targeting supervisory control and data acquisition (SCADA) systems
    as well as other equipment accessible via networks will intensify in 2012 as
    certain threat actors go beyond stealing money and valuable data. STUXNET
    and other threats in 2011 highlighted how SCADA has become an active target.
    Proof-of-concept (POC) attacks against network-connected systems, including
    medical equipment, are expected to ensue.
7
    Cybercriminals will find more creative
    ways to hide from law enforcement.
    Cybercriminals will increasingly try to profit by abusing legitimate online
    revenue sources such as online advertising. This will help them hide from the
    eyes of both law enforcement and antifraud watchdogs hired by banks and
    other financial agencies.
DATA
LEAKS AND
BREACHES
More hacker groups will pose a bigger threat to
8   organizations that protect highly sensitive data.
    Online groups such as Anonymous and LulzSec rose to prominence in 2011,
    targeting companies and individuals for various political reasons. These
    groups are likely to become even more motivated in 2012. They will become
    more skilled both at penetrating organizations and at avoiding detection by
    IT professionals and law enforcement agencies. Organizations will have to
    deal with this new threat and to increase their efforts to protect vital
    corporate information.
The new social networking generation will
9   redefine “privacy.”
    Confidential user information is ending up online, thanks in large part to users
    themselves. The new generation of young social networkers have a different
    attitude toward protecting and sharing information. They are more likely to
    reveal personal data to other parties such as in social networking sites. They
    are also unlikely to take steps to keep information restricted to specific groups
    such as their friends. In a few years, privacy-conscious people will become the
    minority—an ideal prospect for attackers.
As social engineering becomes mainstream,
     SMBs will become easy targets.
10   To date, the craftiest social engineering ploys have been directed against large
     enterprises. However, cybercriminals are now so adept at social engineering
     that the effort to target companies individually—big or small—is becoming less
     costly. This and the greater volume of personal information available online
     will allow cybercriminals to launch more customized and fine-tuned attacks
     against small and medium-sized businesses (SMBs). As in previous attacks
     against SMBs, cybercriminals will continue focusing on gaining access to
     companies’ online banking accounts.
11   New threat actors will use sophisticated cybercrime
     tools to achieve their own ends.
     Targeted attacks will continue to grow in number in 2012. Cybercriminals will
     not be the only ones using these attacks, however. As the effectiveness of
     advanced persistent threats (APTs) becomes more obvious, other parties such
     as activist groups, corporations, and governments will find themselves using
     similar cybercrime tools and tactics to achieve their goals.
12 More high-profile datainfection
   incidents via malware
                          loss
    and hacking will occur in 2012.
    High-profile attacks will continue to hit major organizations in 2012. Important
    and critical company data will be extracted through malware infection and
    hacking. As a result, significant data loss incidents will ensue, potentially
    affecting thousands of users and their personal information. These incidents
    can result in significant direct and indirect losses to concerned parties.
TREND MICRO™

Trend Micro Incorporated, a global cloud security leader, creates a world safe                  TREND MICRO INC.
for exchanging digital information with its Internet content security and threat                10101 N. De Anza Blvd.
management solutions for businesses and consumers. A pioneer in server                          Cupertino, CA 95014
security with over 20 years of experience, we deliver top-ranked client, server,
and cloud-based security that fits our customers’ and partners’ needs, stops new                US toll free: 1 +800.228.5651
threats faster, and protects data in physical, virtualized, and cloud environments.             Phone: 1 +408.257.1500
Powered by the Trend Micro™ Smart Protection Network™ infrastructure, our                       Fax: 1 +408.257.2003
industry-leading cloud-computing security technology, products, and services
                                                                                                www.trendmicro.com
stop threats where they emerge, on the Internet, and are supported by
1,000+ threat intelligence experts around the globe. For additional information,
visit www.trendmicro.com.


                                                      ©2011 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the
                                                      Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro,
                                                      Incorporated. All other product or company names may be trademarks or
                                                      registered trademarks of their owners.

More Related Content

PDF
Risky Business
PDF
Volume2 chapter1 security
PDF
idg_secops-solutions
PDF
Sophos security-threat-report-2014-na
PDF
Managed security services for financial services firms
PPT
Security in Web 2.0, Social Web and Cloud
PDF
1. security 20 20 - ebook-vol2
PDF
Eset trends report_2018
Risky Business
Volume2 chapter1 security
idg_secops-solutions
Sophos security-threat-report-2014-na
Managed security services for financial services firms
Security in Web 2.0, Social Web and Cloud
1. security 20 20 - ebook-vol2
Eset trends report_2018

What's hot (19)

PDF
Sophos Security Threat Report 2014
PDF
Cybersecurity report
PDF
2022 Cybersecurity Predictions
PDF
Russian and Worldwide Internet Security Trends 2015
PDF
Symantec Website Security Threat Report 2014 - RapidSSLOnline
PDF
Qrator Labs annual report 2017
PDF
Cyber security master class 2018
PDF
B istr main-report_v18_2012_21291018.en-us
PDF
Cyber Security Whitepaper 2018 | vTech Solution
PDF
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
PDF
Mobile malware and enterprise security v 1.2_0
PDF
CII Whitepaper India Cyber Risk & Resilience Review 2018
PDF
2015 Global Threat Intelligence Report Executive Summary | NTT i3
PDF
ISTR Internet Security Threat Report 2019
PDF
Insights success the 10 best performing cyber security solution providers 4th...
PDF
Symantec's Internet Security Threat Report for the Government Sector
PDF
07 20251 latest trends, challenges ed
PDF
IMC 618 - Public Relations Campaign
PDF
NACM eNews Article dated May 19 2016
Sophos Security Threat Report 2014
Cybersecurity report
2022 Cybersecurity Predictions
Russian and Worldwide Internet Security Trends 2015
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Qrator Labs annual report 2017
Cyber security master class 2018
B istr main-report_v18_2012_21291018.en-us
Cyber Security Whitepaper 2018 | vTech Solution
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
Mobile malware and enterprise security v 1.2_0
CII Whitepaper India Cyber Risk & Resilience Review 2018
2015 Global Threat Intelligence Report Executive Summary | NTT i3
ISTR Internet Security Threat Report 2019
Insights success the 10 best performing cyber security solution providers 4th...
Symantec's Internet Security Threat Report for the Government Sector
07 20251 latest trends, challenges ed
IMC 618 - Public Relations Campaign
NACM eNews Article dated May 19 2016
Ad

Viewers also liked (8)

PPT
مستجدات
PDF
الإعلام الالكتروني وسيلة لبناء العلاقات
PPT
العرض التقديمي اسلام البرنس
PDF
Privacy and Media Ethics
PPTX
اقوى عرض فى الصيف مع شركة
PDF
IT Department - E-Commerce Business v3
PDF
8 طرق لحماية حسابك على اللينكدإن - LinkedIn
مستجدات
الإعلام الالكتروني وسيلة لبناء العلاقات
العرض التقديمي اسلام البرنس
Privacy and Media Ethics
اقوى عرض فى الصيف مع شركة
IT Department - E-Commerce Business v3
8 طرق لحماية حسابك على اللينكدإن - LinkedIn
Ad

Similar to 12 security predictions for 2012 (20)

PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PDF
White Paper Example - Brafton for NIP Group.pdf
PDF
Cybersecurity Trends 2018: The costs of connection
PPTX
Top 15 security predictions for 2017
PPTX
The Five Biggest Cyber Security Trends In 2022
PDF
Nominum Data Science Security Report, Fall 2016
PDF
Nominum 2016 Fall Data Revelations Security Report
PDF
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
PPTX
Top 15 security predictions for 2017
PDF
Cybersecurity | Risk. Impact. Innovations.
PDF
Symantec Website Threat Report Part-1 2015
PDF
Aon Cyber Newsletter v10
PDF
Cyber Security Vulnerabilities
PPTX
Why Cybersecurity is a Data Problem
PDF
Rpt paradigm shifts
PDF
Rpt paradigm shifts
PDF
2021 Cybersecurity Recap: How Did We Fare Last Year?
PDF
BLURRING BOUNDARIES
PDF
Ransomware: Attack, Human Impact and Mitigation
PDF
Internet security threat report 2013
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
White Paper Example - Brafton for NIP Group.pdf
Cybersecurity Trends 2018: The costs of connection
Top 15 security predictions for 2017
The Five Biggest Cyber Security Trends In 2022
Nominum Data Science Security Report, Fall 2016
Nominum 2016 Fall Data Revelations Security Report
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
Top 15 security predictions for 2017
Cybersecurity | Risk. Impact. Innovations.
Symantec Website Threat Report Part-1 2015
Aon Cyber Newsletter v10
Cyber Security Vulnerabilities
Why Cybersecurity is a Data Problem
Rpt paradigm shifts
Rpt paradigm shifts
2021 Cybersecurity Recap: How Did We Fare Last Year?
BLURRING BOUNDARIES
Ransomware: Attack, Human Impact and Mitigation
Internet security threat report 2013

Recently uploaded (20)

PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
What is a Computer? Input Devices /output devices
PDF
Architecture types and enterprise applications.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Five Habits of High-Impact Board Members
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
CloudStack 4.21: First Look Webinar slides
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Hybrid model detection and classification of lung cancer
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
What is a Computer? Input Devices /output devices
Architecture types and enterprise applications.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Group 1 Presentation -Planning and Decision Making .pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Five Habits of High-Impact Board Members
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Benefits of Physical activity for teenagers.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
A comparative study of natural language inference in Swahili using monolingua...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
NewMind AI Weekly Chronicles – August ’25 Week III
Taming the Chaos: How to Turn Unstructured Data into Decisions
Developing a website for English-speaking practice to English as a foreign la...
CloudStack 4.21: First Look Webinar slides
Module 1.ppt Iot fundamentals and Architecture
Hybrid model detection and classification of lung cancer
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

12 security predictions for 2012

  • 2. This time every year, I sit down with my research teams and we talk about what we think the coming year will hold in terms of threats to our customers. It’s an important discussion that helps us not only share with you what we think you need to be prepared for, but also to help guide our direction as we continue to build products and services to help protect you from these threats. This year, as we look ahead, we’ve come up with 12 predictions for 2012 that fall into four main categories: • Big IT trends • Mobile landscape • Threat landscape • Data leaks and breaches In looking at these predictions, what we see in common are trends toward ever more sophisticated attackers and away from the PC-centric desktop. Our hope that new OSs make the world a safer place didn’t work out. This means that our customers in 2012 will need to continue moving toward a more data-centric model for effective security and privacy as they embrace consumerization, virtualization, and the cloud. And we here at Trend Micro need to continue our work in these key areas to help enable our customers to meet and protect against these threat trends in 2012.
  • 3. At Trend Micro, we are always working to understand not just the threats of today, but also the trends of tomorrow; it’s in our company name. That helps us to help you better protect your data and assets. I hope that you find this year’s predictions to be not only interesting, but helpful in making 2012 a safe and secure year. Raimund Genes CTO, Trend Micro
  • 5. Though many organizations are still uncomfortable with consumerization, security 1 and data breach incidents in 2012 will force them to face BYOD-related challenges. The Bring-Your-Own-Device (BYOD) Era is here to stay. As more and more corporate data is stored or accessed by devices that are not fully controlled by IT administrators, the likelihood of data loss incidents that are directly attributable to the use of improperly secured personal devices will rise. We will definitely see incidents of this nature in 2012.
  • 6. The real challenge for data center owners will be dealing with the increasing complexities of securing physical, virtual, and cloud-based systems. 2 While attacks specifically targeting virtual machines (VMs) and cloud computing services remain a possibility, attackers will find no immediate need to resort to these because conventional attacks will remain effective in these new environments. Virtual and cloud platforms are just as easy to attack but more difficult to protect. The burden will thus fall on IT administrators who have to secure their company’s critical data as they adopt these technologies. Patching a big array of virtualized servers is a challenge, allowing hackers to hijack servers, to fork traffic, and/or to steal data from vulnerable systems.
  • 8. Smartphone and tablet platforms, especially 3 Android, will suffer from more cybercriminal attacks. As smartphone usage continues to grow worldwide, mobile platforms will become even more tempting cybercriminal targets. The Android platform, in particular, has become a favorite attack target due to its app distribution model, which makes it completely open to all parties. We believe this will continue in 2012 although other platforms will also come under fire.
  • 9. Security vulnerabilities will be found in legitimate 4 mobile apps, making data extraction easier for cybercriminals. To date, mobile platform threats come in the form of malicious apps. Moving forward, we expect cybercriminals to go after legitimate apps as well. They will likely find either vulnerabilities or coding errors that can lead to user data theft or exposure. Compounding this further is the fact that very few app developers have a mature vulnerability handling and remediation process, which means the window of exposure for these flaws may be longer.
  • 11. 5 Even though botnets will become smaller, they will grow in number, making effective law enforcement takedowns more difficult to realize. Botnets, the traditional cybercrime tool, will evolve in response to actions taken by the security industry. The days of massive botnets may be over. These may be replaced by more, albeit smaller but more manageable, botnets. Smaller botnets will reduce risks to cybercriminals by ensuring that the loss of a single botnet will not be as keenly felt as before.
  • 12. Hackers will eye nontraditional targets so flawed Internet-connected equipment, ranging from SCADA-controlled heavy 6 industrial machinery to medical gadgets, will come under attack. Attacks targeting supervisory control and data acquisition (SCADA) systems as well as other equipment accessible via networks will intensify in 2012 as certain threat actors go beyond stealing money and valuable data. STUXNET and other threats in 2011 highlighted how SCADA has become an active target. Proof-of-concept (POC) attacks against network-connected systems, including medical equipment, are expected to ensue.
  • 13. 7 Cybercriminals will find more creative ways to hide from law enforcement. Cybercriminals will increasingly try to profit by abusing legitimate online revenue sources such as online advertising. This will help them hide from the eyes of both law enforcement and antifraud watchdogs hired by banks and other financial agencies.
  • 15. More hacker groups will pose a bigger threat to 8 organizations that protect highly sensitive data. Online groups such as Anonymous and LulzSec rose to prominence in 2011, targeting companies and individuals for various political reasons. These groups are likely to become even more motivated in 2012. They will become more skilled both at penetrating organizations and at avoiding detection by IT professionals and law enforcement agencies. Organizations will have to deal with this new threat and to increase their efforts to protect vital corporate information.
  • 16. The new social networking generation will 9 redefine “privacy.” Confidential user information is ending up online, thanks in large part to users themselves. The new generation of young social networkers have a different attitude toward protecting and sharing information. They are more likely to reveal personal data to other parties such as in social networking sites. They are also unlikely to take steps to keep information restricted to specific groups such as their friends. In a few years, privacy-conscious people will become the minority—an ideal prospect for attackers.
  • 17. As social engineering becomes mainstream, SMBs will become easy targets. 10 To date, the craftiest social engineering ploys have been directed against large enterprises. However, cybercriminals are now so adept at social engineering that the effort to target companies individually—big or small—is becoming less costly. This and the greater volume of personal information available online will allow cybercriminals to launch more customized and fine-tuned attacks against small and medium-sized businesses (SMBs). As in previous attacks against SMBs, cybercriminals will continue focusing on gaining access to companies’ online banking accounts.
  • 18. 11 New threat actors will use sophisticated cybercrime tools to achieve their own ends. Targeted attacks will continue to grow in number in 2012. Cybercriminals will not be the only ones using these attacks, however. As the effectiveness of advanced persistent threats (APTs) becomes more obvious, other parties such as activist groups, corporations, and governments will find themselves using similar cybercrime tools and tactics to achieve their goals.
  • 19. 12 More high-profile datainfection incidents via malware loss and hacking will occur in 2012. High-profile attacks will continue to hit major organizations in 2012. Important and critical company data will be extracted through malware infection and hacking. As a result, significant data loss incidents will ensue, potentially affecting thousands of users and their personal information. These incidents can result in significant direct and indirect losses to concerned parties.
  • 20. TREND MICRO™ Trend Micro Incorporated, a global cloud security leader, creates a world safe TREND MICRO INC. for exchanging digital information with its Internet content security and threat 10101 N. De Anza Blvd. management solutions for businesses and consumers. A pioneer in server Cupertino, CA 95014 security with over 20 years of experience, we deliver top-ranked client, server, and cloud-based security that fits our customers’ and partners’ needs, stops new US toll free: 1 +800.228.5651 threats faster, and protects data in physical, virtualized, and cloud environments. Phone: 1 +408.257.1500 Powered by the Trend Micro™ Smart Protection Network™ infrastructure, our Fax: 1 +408.257.2003 industry-leading cloud-computing security technology, products, and services www.trendmicro.com stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit www.trendmicro.com. ©2011 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.