Home / News

Cyber Security Forecast for 2009: Data and Mobility Key Part of Emerging Threats

Georgia Tech Information Security Center (GSTISC) today held its annual Security Summit on Emerging Cyber Security Threats and released the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year.

For 2009, GTISC is forecasting five key cyber security areas where threats are expected to increase and evolve:

  • Malware - specifically under the guise of benign social networking links
  • Botnets - specifically the spread of botnet attacks to wireless and peer-to-peer networks
  • Cyber Warfare - including targets on the U.S. economy and infrastructure
  • Threats to VoIP and Mobile Convergence - specifically voice fraud and cellular botnets
  • The Evolving Cyber Crime Economy - including the rise of sophisticated malware-for-sale kits and programs

According to the report, data will continue to be the primary motive behind future cyber crime-whether targeting traditional fixed computing or mobile applications. “It’s all about the data,” says security expert George Heron—whether botnets, malware, blended threats, mobile threats or cyber warfare attacks. Heron expects data to drive cyber attacks for years to come. The data motive is woven through all the mentioned five emerging threat categories, beginning with malware.

Related Links:
GTISC Security Summit on Emerging Cyber Security
Emerging Cyber Threats Report for 2009 (PDF)
Official Press Release
Cellphone Botnets, Blackmailing VOIP & a Healthy Cybercrime Economy (Dark Reading, Oct 15, 2008)
Botnet Spam Attacks to Target Cellphones, Report Warns (PC World, Oct 15, 2008)

By CircleID Reporter

CircleID’s internal staff reporting on news tips and developing stories. Do you have information the professional Internet community should be aware of? Contact us.

Visit Page

Filed Under


Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Co-designer of the TCP/IP Protocols & the Architecture of the Internet



Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix


Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign


Sponsored byVerisign