SUBSCRIBE

Beware shortened URLs, geo-location in social media

Security vendorย McAfee Inc. is warning of a rising security risk in 2011 in the 3,000 shortened URLs generated per minute for use on social media sites such as Twitter.

With the growing phenomenon that is social networking and instant communication, the popularity of shortened URLs in a limited character space is a ripe opportunity for cyber criminals, said Jim Galpin, Santa Clara, Calif.-based McAfeeโ€™s manager of Canadian consumer sales.

โ€œPeople click on things and they really donโ€™t know where theyโ€™re going to go, or what theyโ€™re going to get,โ€ said Galpin.

Itโ€™s an incredibly lucrative business for hackers, who can easily drop malware on unsuspecting Twitter users in order to reap private information, said Galpin.

The challenge on the security side, said Galpin, is that the illegitimate sites and mixed in with legitimate ones. And illegitimate sites often morph to avoid detection. โ€œItโ€™s a constantly moving target,โ€ he said.

IT departments can protect themselves by ensuring sufficient security investment in network devices to block potential harm, said Galpin.

The risk inherent in URL-shortening services on social media sites is just one prediction McAfee has made as part of its 2011 Threat Predictions report. Another, also pertaining to social media, is the increased hacker attention to geo-location services such as Foursquare,ย Gowalla and Facebook Places that track and publish the whereabouts of users.

ย 

โ€œIt gets a little scary,โ€ said Galpin, explaining that cyber criminals can easily determine a userโ€™s interests based on geo-location information and launch specific targeted attacks at that person.

Itโ€™s a vector attack thatโ€™s particularly alluring for well-funded organized crime, said Galpin. โ€œThe best security advice is really just being educated and know what to look for,โ€ he said.

Social media aside, McAfee also predicts that 2011 will be the year when hackers up the ante on Mac-targeted attacks given the popularity of Apple devices such as the iPhone and iPad. So far, the primary mobile threat to Apple devices has been โ€œjailbreakingโ€ โ€” when users are able to remove usage and access limitations set by Apple โ€” but thatโ€™s about to change, said Galpin.

โ€œIt taps into the mobile platform, but itโ€™s the growth in smart phone technology and whole proliferation of iPads and PC tablet market,โ€ said Galpin.

In particular, as iPhones and iPads quickly become enterprise devices, cyber criminals will take advantage of the lack of user understanding of security, said Galpin. Apple botnets and Trojans will be a common occurrence in 2011.

San Diego, Calif.-based security vendorย Websense Inc. warns that, as a result of the greater permeation of smart phones in the enterprise, smart devices will become the prime target of hackers in 2011.

Patrick Runald, Websenseโ€™s senior manager of security research, explains that IT departments will have to change their perspective on smart devices and start treating them like laptops.

โ€œYou wouldnโ€™t allow a company-owned laptop to just connect anywhere without any type of security, which typically happens with these smart phone devices,โ€ said Runald. โ€œWell, why not use the same on iPads and iPhones and Androids?โ€

McAfee also predicts that 2011 will bring about nastier bots as a result of mergers and acquisitions in the botnet world. Botnets Zeus and SpyEye merged recently to produce what McAfee foretells will be even more sophisticated botnets capable of evading security mechanisms and law enforcement monitoring.

Follow Kathleen Lau on Twitter:ย @KathleenLau

Tech Jobs

Categories