Security vendorย McAfee Inc. is warning of a rising security risk in 2011 in the 3,000 shortened URLs generated per minute for use on social media sites such as Twitter.
With the growing phenomenon that is social networking and instant communication, the popularity of shortened URLs in a limited character space is a ripe opportunity for cyber criminals, said Jim Galpin, Santa Clara, Calif.-based McAfeeโs manager of Canadian consumer sales.
โPeople click on things and they really donโt know where theyโre going to go, or what theyโre going to get,โ said Galpin.
Itโs an incredibly lucrative business for hackers, who can easily drop malware on unsuspecting Twitter users in order to reap private information, said Galpin.
The challenge on the security side, said Galpin, is that the illegitimate sites and mixed in with legitimate ones. And illegitimate sites often morph to avoid detection. โItโs a constantly moving target,โ he said.
IT departments can protect themselves by ensuring sufficient security investment in network devices to block potential harm, said Galpin.
โIt gets a little scary,โ said Galpin, explaining that cyber criminals can easily determine a userโs interests based on geo-location information and launch specific targeted attacks at that person.
Itโs a vector attack thatโs particularly alluring for well-funded organized crime, said Galpin. โThe best security advice is really just being educated and know what to look for,โ he said.
Social media aside, McAfee also predicts that 2011 will be the year when hackers up the ante on Mac-targeted attacks given the popularity of Apple devices such as the iPhone and iPad. So far, the primary mobile threat to Apple devices has been โjailbreakingโ โ when users are able to remove usage and access limitations set by Apple โ but thatโs about to change, said Galpin.
โIt taps into the mobile platform, but itโs the growth in smart phone technology and whole proliferation of iPads and PC tablet market,โ said Galpin.
In particular, as iPhones and iPads quickly become enterprise devices, cyber criminals will take advantage of the lack of user understanding of security, said Galpin. Apple botnets and Trojans will be a common occurrence in 2011.
San Diego, Calif.-based security vendorย Websense Inc. warns that, as a result of the greater permeation of smart phones in the enterprise, smart devices will become the prime target of hackers in 2011.
Patrick Runald, Websenseโs senior manager of security research, explains that IT departments will have to change their perspective on smart devices and start treating them like laptops.
โYou wouldnโt allow a company-owned laptop to just connect anywhere without any type of security, which typically happens with these smart phone devices,โ said Runald. โWell, why not use the same on iPads and iPhones and Androids?โ
McAfee also predicts that 2011 will bring about nastier bots as a result of mergers and acquisitions in the botnet world. Botnets Zeus and SpyEye merged recently to produce what McAfee foretells will be even more sophisticated botnets capable of evading security mechanisms and law enforcement monitoring.
Follow Kathleen Lau on Twitter:ย @KathleenLau