New threats aim to exploit information, according to report

November 16, 2012

As technology advances, cybercriminals have developed more sophisticated ways to compromise devices. Unless consumers are educated about new forms of threats, they may be tricked into allowing a hacker access to personal files.

According to a study conducted by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI), hackers have improved their methods for capturing and exploiting confidential data, Dark Reading reported. The 2013 Georgia Tech Emerging Cyber Threats Report features threat predictions and advice from industry and academic leaders in the field of cybersecurity. Experts said that users should be aware of a few advances in cybercrime, including a rise in cloud-based botnets and search history poisoning.

Network World reported that more hackers will employ the cloud for malicious reasons. By creating a powerful network, cybercriminals can control machines via cloud computing services and exploit information.

Search history poisoning refers to when attackers can modify Internet users' search history by adding algorithms that lead them to malicious websites, which can give hackers access to a person's online profiles, according to Threatpost.

If people continue to store personal and business files on their computers, mobile devices and in the cloud, cybercriminals will attack networks and take advantage of uses' lack of knowledge, said Wenke Lee, the director of GTISC. To ensure data protection and prevent computer assaults, consumers must take a proactive approach to cybersecurity. Professionals should learn about ways to protect information by reading up on new threats. They should also install firewalls and web security software to monitor and block malicious activities. The use of strong passwords is another form of data loss prevention. It will be harder for a hacker to crack long passwords that contain numbers, letters and symbols.

-McAfee Cloud Security