Press release
Blue Coat Warns that the Cyber Crime Landscape in the Middle East Will Continue to Evolve in 2013 as Cyber Criminals Adjust and Refocus their Attacks
DUBAI, United Arab Emirates, 18th December, 2012: The Middle East has witnessed a number of high-profile cyber attacks this year, largely on account of the political unrest in the region. Large enterprises including Saudi Arabia's national oil company, Saudi Aramco and Qatar's natural gas firm RasGas have fallen victim to these malicious attacks and have prompted some countries like the UAE to begin setting up government bodies that will be responsible for handling cyber threats.Shirley O’Sullivan, vice president of marketing for EMEA at Blue Coat Systems says that with trends like Bring-Your-Own-Device (BYOD) gaining popularity in the region, the cyber threat landscape will evolve and get more sophisticated. She shares her predictions below about the shape of things to come and what organizations can do to protect themselves against potential attacks:
Mass Market Attacks Become a Beachhead for Targeted Attacks
If your organization has valuable data, assume someone is going to come after it in 2013 through mass market attacks that provide cover for targeted attacks.
Businesses today manage so many end points that at any given time tens to hundreds of them may be infected, typically with mass market malware. While not the ideal security situation, businesses nonetheless tend to tolerate this level of mass market malware infections. In 2013, this tolerance level will create a backdoor for covert targeted attacks.
The thriving underground economy connects cybercriminals that are running bots with motivated attackers that are willing to pay top dollar to use the system of infected computers. This allows cybercriminals that are targeting a specific company to rent out or buy outright infected machines within a target IP range. As the size of a company increases, the certainty that a cybercriminal can find an infected system to co-opt rises exponentially. In this way, what was an infection from a mass market attack can covertly become a targeted attack.
Facilitating this shift will be the addition of intelligence gathering tools to standard Trojans that actively explore a hard drive rather than wait for a user to go to financial site.
Mobile Mischiefware Gives Way to Mobile Malware
With more businesses allowing employees to access the corporate network from mobile devices, expect these devices to become high value targets in 2013. Today, the smartphone penetration game is characterized by “mischiefware,” such as sending SMS texts or in-app purchases within rogue applications, that operates within the parameters of an app and does not break the phone’s security model. In 2013, expect to see malware that doesn’t show up as an app on the smartphone, but instead exploits the security of the device itself to identify valuable information and send it to a server. Hand-in-hand with this new mobile malware threat, expect to see the first mobile botnet that can forward SMS messages to command and control servers.
Malnets: If It Isn’t Broken, Don’t Fix It
In 2013, expect that most malware will come from large malnets that operate “malware as a business model.” These infrastructures are highly efficient at launching attacks and highly effective at infecting users. As a result, malnet operators have built a thriving business. Their continued success at infecting computers indicates that they don't need a revolutionary breakthrough to continue making money, just on-going evolutionary adjustments.
In 2013, expect them to refine their models and invest in the business to develop more sophisticated, believable attacks. By hiring translators and copy editors, malnet operators will be able to better create phishing emails that mimic the real page of a financial institution, for instance. They can also invest in more believable web sites facades and more comprehensive exploit kits that will make their attacks more believable, increasing the likelihood of their success.
The Big Data Model Comes to Threat Intelligence
Expect the security industry to adapt the big data model to understand more about potential vulnerabilities at a network and user level. Security and networking solutions all generate logs – significant amounts of information that tell you about user behaviors, traffic on the network and more. Mining this data to find discernible patterns in risky behavior, threats and anomalies on the network as well as correlations between behavior and risk will allow the industry to build new defenses that can help users make safer default choices.
Sharing Generation Becomes More Private
The wide availability of information exposed users to very personal targeted attacks that reference family members, pets and other personal information in an attempt to gain access to confidential information. This ready availability of user information also allows cybercriminals to waterhole users by more easily identifying the online places they visit and laying booby traps. As a result of this greater risk, in 2013, users that have operated from a share everything model will begin to limit how much and what information they share and who they share it with.
Securing the Business in 2013
The threat landscape will continue to evolve as cybercriminals adjust and refocus their attacks. In particular, as mass market and targeted threats converge, it will be important for businesses to take a holistic view of their security. No longer should mass market and targeted attacks be viewed as separate threats. They have now become one and the same.
To protect their data and users, businesses should focus their defenses on visibility for all traffic, including web, non-web and even SSL. Each defensive solution logs traffic. Reviewing those logs on a regular basis to identify anomalies is crucial to stopping attacks. Businesses also need to understand who is supposed to be using data and how it is supposed to be accessed.
In response to the shifting threat landscape, businesses will need to adjust their security approach to ensure they are not the victims in 2013.
About Blue Coat Systems
Blue Coat Systems provides Web security and WAN optimization solutions to 86 percent of FORTUNE Global 500 companies. As the market share leader in the secure web gateway market, Blue Coat sets the standard for enterprise security. Its solutions provide the visibility, protection and control required to optimize and secure the flow of information to any user, on any network, anywhere. For additional information, please visit www.bluecoat.com.
For more information, please contact:
Manal Abi Rafeh
Blue Coat Systems ME
Telephone: +971 4 3911620
Fax: +971 4 3911635
Email: manal.abirafeh@Blue Coat.com
Media Contact:
Colin Saldanha
PR Consultant
PROCRE8
Villa 41, 81-d Street, Uptown Mirdif
P.O. Box 78835, Dubai
United Arab Emirates
This release was published on openPR.
Permanent link to this press release:
Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.
You can edit or delete your press release Blue Coat Warns that the Cyber Crime Landscape in the Middle East Will Continue to Evolve in 2013 as Cyber Criminals Adjust and Refocus their Attacks here
News-ID: 246827 • Views: …
More Releases from Blue Coat Systems

Blue Coat Appoints Chris Moore as Head of Middle East Sales Team
Dubai, United Arab Emirates, 20th February 2013 – Blue Coat Systems, Inc. a market and technology leader of Web security and WAN optimisation solutions, today announced the appointment of Chris Moore as the Regional Sales Director for its operations in the Middle East. The appointment comes at a time when Blue Coat is poised to expand its presence in the region.
Reporting directly to the Vice President of EMEA Sales, Stuart…

Borusan Holdings in Egypt Enhances Web Access Control and Security with Blue Coa …
DUBAI, United Arab Emirates, 18th February, 2013 – Blue Coat Systems, Inc., a market leader in Web security and WAN optimization, has announced the successful installation of the Blue Coat ProxySG 900 appliance for Turkish conglomerate, Borusan Holdings. The Group's employees are now protected by Blue Coat's market leading secure web gateway appliance, which delivers visibility, control and security of internet activity with the addition benefit of vastly improved bandwidth…

‘Exploit Kits are the Latest Weapons of Cyber Destruction’, Warns Security E …
DUBAI, United Arab Emirates, 4 February, 2013: Malware is a business; people make their living writing and distributing it. Exploit kits are an effective and streamlined methodology of distributing malware; they allow the ‘Bad Guys’ to distribute payloads at a higher level than we have seen in the past. For this reason we've seen exploit kits grow in popularity over the last few years.
Chris Larsen, Malware Research Team Leader at…
More Releases for Shirley
Faith, Wisdom, and Verse: Shirley Weiglein's Devotional Reimagines Scripture
In "My Amazing Journey Through the Bible: The Pentateuch, The Historical Books, and The Wisdom Books in Poetry," Shirley Weiglein invites readers into a heartfelt and lyrical encounter with the Word of God. Drawing upon decades of spiritual growth, professional teaching, and personal devotion, Weiglein transforms Scripture into inspired poetry that encourages believers to deepen their relationship with God-one chapter at a time.
Written with reverence and a deep love for…
Rehabilitation Care Market Is Booming Worldwide 2025-2032 | Shirley Ryan Ability …
Rehabilitation Care Market Analysis - 2025-2032:
Coherent Market Insights has released a new report titled "Rehabilitation Care Market: Industry Trends, Share, Size, Growth, Opportunity and Forecast 2025-2032 (Version 2025)." This report provides an in-depth analysis of the Rehabilitation Care industry, featuring insights on market trends and performance. It also includes a thorough examination of competitors, regional dynamics, and the latest advancements within the market.
Coverage of the Rehabilitation Care Market:
The report provides…
Author's Tranquility Press Presents: "The Adventures of Copper the Dog" by Shirl …
A Heartwarming Story of Friendship, Courage, and Giving Back
The Adventures of Copper the Dog [https://www.amazon.com/Adventures-Copper-Shirley-Rogers-Baustian/dp/1965075762/ref=monarch_sidesheet_image] is a delightful tale born from the heart of a seventh grader's classroom assignment, now brought to life in a beautifully illustrated edition. Written by a young author, this charming book follows the adventures of Copper, a lovable dog whose personality shines through in every page. As Copper embarks on various adventures, readers will be…
Rehabilitation Physiatry Market Generated Opportunities, Future Scope 2025-2032 …
The Latest study titled Rehabilitation Physiatry Market 2025, published by Coherent Market Insights, provides valuable insights into both regional and global markets projected to grow in value from 2025 to 2032. The comprehensive research delves into the evolving market dynamics, value chain analysis, prominent investment areas, competitive landscape, regional outlook, and key market segments. It also offers a thorough assessment of the global market's drivers and constraints. Additionally, the report…
Physical Rehabilitation Center Market Generated Opportunities, Future Scope 2025 …
Physical Rehabilitation Center Market Trends Overview 2025-2032:
A new Report by Coherent Market Insights, titled "Physical Rehabilitation Center Market: Industry Trends, Share, Size, Growth, Opportunity and Forecast 2025-2032 (Version 2025)," offers a comprehensive analysis of the industry, which comprises insights on the Physical Rehabilitation Center market analysis. The report also includes competitor and regional analysis, and contemporary advancements in the market.
Scope of the Physical Rehabilitation Center Market:
The report provides 𝐦𝐚𝐫𝐤𝐞𝐭 𝐬𝐢𝐳𝐞…
Medical Rehabilitation Services Market Expected to Witness Strong Growth by 2030 …
The Medical Rehabilitation Services Market research report represents major insights on the current growth dynamics as well as the primary revenue generation elements that are available in the Medical Rehabilitation Services industry along with various other factors over the predicted period 2023-2030. The report on the Medical Rehabilitation Services market is focusing on a series of parameters including top manufacturing strategies, industry share, prime opportunities, industrial channels, profit margin, etc.…