SOURCE: Narus, Inc.

Narus, Inc.

January 11, 2011 09:30 ET

Narus Reveals Top 10 Cyber Security Threats of 2011 and Beyond

Next Decade Portends New Threats That Surpass Those of Years Past in Both Intensity and Impact

SUNNYVALE, CA--(Marketwire - January 11, 2011) - The cyber threat landscape has matured over the past 10 years, due in part to the proliferation of new technologies and an increasing reliance on the Internet for personal, business and governmental needs. Wielding their keyboards, cyber criminals exploit new and existing technologies for financial gain, to exact revenge or to carry out political coups. In their wake, they leave behind the tattered remains of unsuspecting individuals' life savings or companies' intellectual property, or the potential for disruption of national infrastructures.

Narus, Inc., the leader in real-time traffic intelligence for protecting governments, service providers and enterprises against cyber threats and the risks of doing business in cyber space, recently compiled a top 10 list of the latest cyber threat trends that will likely pop up over the next few years. Many on the list originated in the last decade, and have been fine-tuned to create more chaos in the years ahead.

1. Attacks via USB -- As USB drives become cheaper and information is distributed on them at trade shows and other venues, the possibility of Trojans and other malware increases.

2. Large-scale, targeted botnet attacks -- Expect to see more sophisticated targeted peer-to-peer-based botnets (along the lines of "Storm") that will be completely distributed with no standard command-and-control traffic.

3. DDoS attacks -- Whether disrupting services or crashing services by flooding servers, DDoS attacks spurred by political activism or for disruption and destruction of critical infrastructures will continue to rise.

4. Increased attacks on and via social networks -- Social network users can expect more threats to travel virally, infecting everyone on a user's friends list. Future viruses will likely be designed to steal or delete users' personal information, which can be sold in numerous black markets and used to acquire credit card and bank information.

5. Click jacking and cross-site scripting -- Related to No. 4 on our list, click jacking and cross-site scripting are used to trick users into revealing confidential information, or taking control of a user's computer while they click on seemingly innocuous Web pages. Expect to see an increase of this malicious behavior over the next few years.

6. Phishing attacks from "trusted" third parties -- These phishing attacks originated over the past several years and will continue, especially with the increased use of smart phones for mobile e-mail. The most common attacks come in the form of e-mails from recognizable companies, banks or organizations that tempt the reader to open a link.

7. Online fraud and money mules -- The dramatic rise in phishing and identity theft attacks includes a well-organized offline component -- the not-so-innocent "money mules" recruited by fraudsters to launder stolen money across the globe. These are active attempts to enlist people to transfer illegal funds from credit card thieves. The number of money mule sites is increasing exponentially each year.

8. Cloud computing concerns -- The incredible cost savings and flexibility cloud computing affords also opens up a superhighway for cyber crime. As cloud use increases, so, too, will the number of opportunities for data infection or theft.

9. Data exfiltration and insider threats -- No. 9 on our list is a bit tricky, as technology alone will not solve it. Unfortunately, untrustworthy people will always find a way to anonymously leak private (government, enterprise, etc.) information; hence, this trend will grow. Criminal elements or nations will try to entice employees to exfiltrate data and compromise company and government assets.

10. Attacks on mobile devices and wireless networks -- Wireless communication has been a hallmark of the past decade, and there's no indication that it will slow. While computer networks remain the traditional targets for cyber attacks, increasingly powerful computers and smart phones with wireless connections are likely to result in unprecedented opportunities for cyber criminals as well. Mobile computing devices contain the same vulnerabilities as laptops and desktops, but they are also susceptible to DDoS attacks specifically designed for wireless devices. New custom financial applications like digital wallets and pocket ATMs are also particularly attractive to hackers. Moreover, wireless networks themselves put entire companies at risk, especially as the mobile workforce does not have the benefit of the secured corporate LAN.

Although today's cyber security solutions present a necessary start to protecting our critical infrastructures, they handle mostly signature-based attacks and/or provide policy implementations in the software. Yet they lack the capabilities to handle non-signature-based attacks and the ability to mitigate malicious attacks in real time. Governments, companies and carriers must supplement their existing solutions with real-time anomaly detection capabilities. To deal with the complexity of implementing multiple solutions and capabilities, many cyber security vendors have formed a cyber security "ecosystem," in which they leverage their partners' complementary technology solutions to provide a more holistic technology approach to cyber security.

Cyber security also requires collaboration between the public and private sectors, not only domestically, but abroad as well. All countries must share information to help protect the global economy, which revolves around the Internet. Finally, we must recognize that technology alone will not suffice to fight cyber crime. With an adequate number of people and processes dedicated to fighting cyber crime -- as well as ongoing education and new recruits to keep pace with cyber criminals' innovation -- we will present an impenetrable and intimidating team to keep cyber crime at bay.

For a more detailed list of Narus' top 10 cyber security threats, as well as a retrospective on past cyber threat trends and how we can protect ourselves and our critical networks, please read the blog entitled, "Sophisticated Cyber Debauchery Increases its Toehold." (www.narus.com/blog/uncategorized/sophisticated-cyber-debauchery-increases-its-toehold)

About Narus
Narus is a leader in real-time traffic intelligence and analytics technologies, enabling customers to identify and act on anomalous traffic in its network. Coupled with its unique patented algorithms and analytics, Narus helps carriers, governments and enterprises manage and protect their large IP networks against cyber threats and the risks of doing business in cyberspace. Narus provides this information in real time, and can be used in large distributed networks because its software is massively scalable.

Narus' system protects and manages the largest IP networks in the United States and around the world, some of which include KT (Korea), KDDI (Japan), Raytheon, Telecom Egypt, Reliance (India), Sify (India), Cable and Wireless, Saudi Telecom, U.S. Cellular, Pakistan Telecom Authority and many more. Narus is a wholly owned subsidiary of The Boeing Company. Narus is headquartered in Sunnyvale, Calif., with regional offices around the world. For more information, please visit www.narus.com.

Contact Information