The Georgia Institute of Technology, one of the nation's premiere research universities, ranked seventh among U.S. News & World Report's top public universities, announced the report of Emerging Cyber Threats for 2008. The report outlines the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year.
According to the GTISC forecasting the five key areas in which cyber security threats are expected to increase evolve:
• Web 2.0 and Client-Side Attacks – including social networking attacks and new attacks that
will exploit Web 2.0 vulnerabilities
• Targeted Messaging Attacks – including Instant Messaging attacks and malware propagation
via online video-sharing
• Botnets – specifically the spread of botnet attacks to wireless and peer-to-peer networks
• Threats Targeting Mobile Convergence – including voice spam, vishing and smishing
• Threats to Radio Frequency Identification (RFID) Systems – evolving and varied threats in
this emerging technology sector
Mustaque Ahamad, director of GTISC says: “As newer and more powerful applications enabled by technologies like Web 2.0 continue to grow, and converged communications applications increasingly rely on IP-based platforms, new challenges will arise in safeguarding these applications and the services they rely on. The GTISC Emerging Cyber Threats Report for 2008 highlights those areas of greatest risk and concern, particularly as continued convergence of enterprise and consumer technologies is expected over the coming year. We wish to thank the esteemed members of the GTISC Security Summit panel who assisted us with the creation of this report.”
The GTISC Security Summit on Emerging Cyber Security Threats and Countermeasures Summit was attended by more than 200 corporate executives, industry leaders and technologists from across the country It was keynoted by Dr. Vint Cerf, vice president and chief Internet evangelist at Google. The research and the discussion aimed to educate the audience on the proliferation of cyber threats, including those listed in the report, and highlighted possible countermeasures to safeguard the user and business communities.
Most Trendings
-
A former prisoner of the Pentridge Prison, Melbourne, Australia, decided to buy his own jail cell, where he had spent several years for frau...
-
Boston (dbTechno) - It was not very long ago that Google first revealed Android, their line up upcoming applications for mobile phones, an...
-
Everybody should notice that there is an explosion in social media content in acknowledgement of its rapidly growing importance as a key cha...
-
Have you lost your email? Have you accidently deleted necessary message? Has your HDD suddenly crashed and all emails are lost now? Has your...
-
Bath University Group of researchers study human interactions . The study of this issue passed different stages in fast developing world. Sp...
Popular Posts
-
The Blogvasion.com Family of Blogs offers you an affordable and effective Internet advertising programs. Currently the Blogvasion.com family...
-
A former prisoner of the Pentridge Prison, Melbourne, Australia, decided to buy his own jail cell, where he had spent several years for frau...
-
Pilar Stofega, a 34-year old resident of Waterford, Connecticut, was charged with the attempt to destroy her ex-lover’s marriage by using in...
-
Once EE launches the first 4G service in the UK the online gaming industry is expecting to see a huge boost in the number of people accessi...
-
No need for traveling to the North Pole to inform Santa about the wishes you have, no need to send a letter, and no need to ... But just onl...
-
The consumer electronics industry has for many years now tried to shoe-horn a game (some would say game-like) experience on the mobile phone...
-
Corporate Telecommunications presents the service that gives the users opportunity to diagnose their headsets: who is using which headset, w...
-
Japanese business etiquette is the subject of entire books - mostly written by people who have not been to Japan since the 1970s and want u...
-
It is hardly imaginable to be a parent and have no concerns about the influences that environment has over youngster. In a highly competitiv...
-
Recently the UK researchers browsed the various legislations in search of the most ludicrous laws. The results were submitted to polling. He...
0 comments :
Post a Comment