{"id":911,"date":"2010-01-06T00:00:00","date_gmt":"2010-01-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/01\/06\/world-cup-cybercrime-2010\/"},"modified":"2021-12-30T11:38:22","modified_gmt":"2021-12-30T11:38:22","slug":"world-cup-cybercrime-2010","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/01\/06\/world-cup-cybercrime-2010\/","title":{"rendered":"World Cup Cybercrime 2010"},"content":{"rendered":"<p>The Research team in ESET have put their heads together to discuss the likely shape of things to come in the next twelve months in computer security and cybercrime (and cyberwarfare, to use one of the buzzwords of the moment).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Social engineering attacks will continue to predominate, while attacks based on operating system vulnerabilities will continue to decline as more people move to more secure operating systems.<br \/>\n2. Hot topical issues will be used as hooks on which to hang social engineering attacks.<br \/>\n3.  Increased probing of mobile devices.<br \/>\n4.  Increasing emphasis on the isolation of the owners of infected systems.<br \/>\n5. Data breaches will continue to grow in importance<br \/>\n6. More use of rogue software to extort money<br \/>\n7. Malware as a Service will, more and more, reflect the models of cooperation between specialists seen in the legitimate business world.<br \/>\n8. There is likely to be more use of high-level languages (especially scripting languages) so as to re-purpose malicious code across multiple platforms.<br \/>\n9. Social networks will be targeted<br \/>\n10. There will be further research into and attacks on virtualised environments,<br \/>\n11. Phishing and related attacks on online gamers will continue to be big business, though attacks on gaming consoles are likely to be meet with limited success.<br \/>\n12. Attacks that manipulate wireless connections will continue.<br \/>\n13. Criminals and legitimate businesses will mine data from a widening range of resources, exploiting interoperability between social networking providers.<br \/>\n14. Crimeware will be the most common and successful.<br \/>\n15. The subversion of legitimate web sites and social networks as an attack vector will continue to be a highly successful criminal activity.<br \/>\n16. Targeted attacks  can be expected <\/p>\n<p>http:\/\/irishdev.com\/Home\/News\/816-Cybercrime-.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-911","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=911"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/911\/revisions"}],"predecessor-version":[{"id":3398,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/911\/revisions\/3398"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}