In today’s internet era, India has been recognized as one of the fastest growing internet and mobile market globally. With over 137 million internet users in India, 7 out of 10 users access internet through their mobiles. Additionally, India grew its social media user base from 38 million in 2011 to 60 million in 2012, making both mobile and social media platforms a preferred site for Cyber Crime Attacks.
Cyber Criminals are constantly changing their policies to target these fast-growing platforms where consumers are less aware of security risks. This fast paced change has impacted individuals with loss of data, identities and finances to name a few. The likelihood that Cyber Terrorism will get highly personal as attacks focus on individuals or minority groups and the possibility that new electronic payment methods could be vulnerable to hacks and breaches. While these predictions are based on what is seen today, they also reflect where things are going based on years of expertise, understanding of threat evolution, and experience in previous cyber security trends.
Conflicts between nations, organizations, and individuals will play a key role in the Cyber world. Espionage can be successful and also easily deniable when conducted online. Any nation state not understanding this has been given many examples in the last two years. Nations or organized groups of individuals will continue to use Cyber strategies in an attempt to damage or destroy the secure information or funds of its targets. In 2013, we will see the Cyber equivalent of Saber Rattling, where nation states, organizations, and even groups of individuals will use Cyber-Attacks to show their strength and "send a message." Additionally, we expect more targeted attacks on individuals and non-government organizations, such as supporters of political issues and members of minority groups in conflict.
Ransomware is another type of Malicious software that disables the functionality of a computer and demands a ransom in order to restore the computer to its original state. While this "business model" has been tried before, it suffered from the same limitations of real life kidnapping: there was never a good way to collect the money.
Cyber Criminals have now discovered a solution to this problem: using online payment methods. They can now use force instead of flimflam to steal from their targets. As it is no longer necessary to contact people into handing over their money, we can expect the extortion methods to get harsher and more destructive. In 2013, attackers will use more professional ransom screens, up the emotional stakes to motivate their victims, and use methods that make it harder to recover once compromised.
Mobile Adware, or "Madware," is a nuisance that disrupts the user experience and can potentially expose location details, contact information, and device identifiers to Cyber Criminals. Madware, which sneaks onto a user device when they download an app-often sends pop-up alerts to the notification bar adds icons, changes browser settings, and gathers personal information. In just the past nine months, the number of apps including the most aggressive forms of Madware has increased by 210%. Because location and device information can be legitimately collected by advertising networks, it helps them target users with appropriate advertising and we expect increased use in Madware as more companies seek to drive revenue growth through mobile ads. This includes a more aggressive and potentially malicious approach towards the monetization of "free" mobile apps.
As consumers, we place a high level of trust in social media-from the sharing of personal details, to spending money on game credits, to gifting items to friends. While E-payments have so far been adopted slowly by consumers but with the addition of payment methods in social media, we expect to see e-payments grow in popularity in 2013. And where there's money, there will surely be Cyber Criminals following right behind to rip us off. Most likely we'll see socially spread Malware that takes over the user's account, re-sets passwords and uses the encrypted but stored credit card information to make real world purchases for the crooks. While providing non-financial information might seem innocuous, Cyber-Criminals sell and trade this information with one another to combine with information they already have about you, helping them create a profile of you they can use to gain access to your other accounts.