WatchGuard Unveils Top 10 Security Predictions for 2012

WatchGuard Technologies' security analysts provide their 2012 security predictions:

10) HTML5 offers five times the ways to hijack your websiteNew web technologies like HTML5 fuel the growth for next year's web application attacks

Like the web technologies that came before it, HTML5 is generally secure. In fact, it introduces some security benefits that could help developers avoid common web application pitfalls.  However, the security of HTML5 applications is dependent on the skill and care with which the developers create them.  HTML5 is new and complex.  Developers are still getting comfortable with it, which means they are likely to make programming mistakes that could translate into web vulnerabilities.  For this reason, WatchGuard predicts that the increased usage of HTML5 will heavily contribute to web applications attacks next year.

9) Location aware malware customizes its attacksSpyware knows where you live

WatchGuard suspects that malware will increasingly leverage geolocation to customize attacks, thus increasing its money making potential.  A simple technique already in use is to forward victims in specific locales targeted fraud sites that work best in that region. WatchGuard anticipates hackers will find even more malicious ways to exploit geolocation in malware next year.

8) Attackers launch a digital attack that affects physical infrastructure or equipmentMy power plant got a virus infection

Expect at least one digital attack in 2012 to cause a significant repercussion to a physical infrastructure system.

Attacks on infrastructure, such as power grids, have long been theoretically possible; we had never really seen one happen until Stuxnet came along.  Stuxnet actually infected SCADA equipment, and made changes that had real physical results.

Since then, researchers and attackers alike have heavily targeted SCADA systems. Now that they have seen what highly advanced malware can accomplish against industrial control systems, they have gone all in.

7) As the top vector for social engineering and malware, Facebook is forced to increase its securityIf Facebook doesn't "like" security they'll surely get "poked"

Two years ago, WatchGuard predicted that social networks would be a dangerous playground for attackers. Last year, WatchGuard predicted that Facebook links would take over where malicious email attachments left off. This year both those predictions continue to prove true. Expect to see more Facebook security updates next year.

In fact, in 2012 WatchGuard forecasts Facebook-based attacks will increase and Facebook will be forced to sit up and take notice. Specifically, Facebook will implement new security solutions on their site to avoid losing fed-up users.

6) Adoption of BYOD and IT self-service results in more data loss Bring your own device means clean your own infections

In 2012, WatchGuard anticipates several data loss incidents and breaches as a result of the increased adoption of Bring Your Own Device (BYOD) and self-serve IT.

Proponents of BYOD say it can reduce IT costs, increase productivity, lessen helpdesk load, and just plain make employees happy.

Not only are employees bringing their own devices, but also, they are launching their own network services.  New cloud offerings make it possible for non-IT departments to easily contract and launch new technical services, without the help of their own IT department.

While BYOD and IT self-service do offer some clear benefits, they also come at a price –  the potential loss of control.  Offloading IT services and device purchase decisions to others makes it infinitely harder to implement access controls on such services and devices.

5) Smartphone app stores and marketplaces help proliferate mobile malware in the real world Who planted digital weeds into my mobile app garden?

In 2012, WatchGuard forecasts that the mobile threat will continue to grow, but with a more specific source – app stores and marketplaces. To avoid mobile malware, be careful of what is downloaded from an app marketplace, and verify that the associated vendor does a solid job validating apps.

During 2011 attackers focused most of their malware delivery efforts on infecting various smartphone providers' application delivery systems, like Google's App Marketplace or Apple's App Store. They have been more successful at infecting some app stores more than others, but have proven that all application repositories can be fallible.

4) Increased reliance on virtualization reawakens need for virtual security Unprotected virtual machines make bad neighbors

Expect to see a considerable rise in interest for virtualization security solutions among smaller and medium businesses next year, due to their increased reliance on this technology.

As with other new technologies, as virtualization matures, its usage increases among smaller companies and organizations. Many SMB IT professionals still do not fully understand the potential security ramifications of poorly implemented virtual environments.  Because of the lack of security know-how and increased reliance on virtualization, risk of data loss dramatically increases.

3) The barrage of noteworthy data breaches continues through 2012 – Hacktivists and script-kiddies rage against the machine

Whether due to APT attackers, criminal malware authors, or hacktivist groups like Anonymous and LulzSec, WatchGuard saw more headline-grabbing hacks than in any previous year.

It is hard to say if the increase in reported breaches is due to smarter criminals, more attacks, hacktivists, or just new regulations that require businesses to report data loss. In any case, expect this trend to continue in 2012. Now that criminals realize how much they can make by stealing data, and hacktivists realize that network attacks draw attention, WatchGuard suspects that they will both continue to besiege networks for next year.

2) Organized criminals will leverage Advanced Malware techniques in targeted attacks against businesses – Advanced Persistent Threats (APT) trickle down to SMBs and Consumers

Expect the APT trend to continue in 2012, but with a slightly new twist. APTs will trickle down to everyday people.

Last year, WatchGuard predicted the growth of advanced persistent threats (APTs).  This prediction seems to have proven true with big breaches like RSA's SecureID incident and operation ShadyRat, as well as the discovery of Stuxnet's successor, Duqu. As expected, these APTs of 2011 primarily affected very big organizations, such as governments, industrial control providers, and large enterprises.

In 2012, less sophisticated criminals will start to leverage the advanced techniques they've learned about from APTs, to create more advanced malware targeting smaller businesses and even consumers.

1) A major cloud provider will suffer a significant security breach – Cloud Computing brings chance of malware-storms

In 2012, expect organized criminals to target cloud services, and significantly breach at least one well-known cloud provider. That said, also expect to see smarter, trustworthy cloud providers recognize that risk, and add premium security to their offerings.

While many cloud services offer attractive benefits, they also leverage complex technologies that have security ramifications.  Most cloud providers rely on intricate, custom-made web applications, or leverage virtualization to provide scalability and multi-tenancy.  These are great technologies. However, they can also pose dire risks when implemented insecurely. Add to the equation the fact that many customers share sensitive data with one popular cloud provider. It is easy to see why a single large cloud provider presents an extremely juicy target to attackers.


  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

Featured Cybersecurity


New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • ResponderLink


    Shooter Detection Systems (SDS), an company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3