SHARE
Facebook X Pinterest WhatsApp

Cybercrime Vulnerabilities and Targets in 2010

Cybercrime Vulnerabilities and Targets in 2010 Cloud, Virtualization Drive CyberCrime in 2010Cloud and virtualization may promise big business benefits for 2010, but a new future threat report from security vendor Trend Micro says the buzzed-about technologies may increase cybercrime by criminals looking for the next big cyber-swindle. Channel Insider takes a deeper look at the […]

Dec 21, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1Cybercrime Vulnerabilities and Targets in 2010

Cloud, Virtualization Drive CyberCrime in 2010Cloud and virtualization may promise big business benefits for 2010, but a new future threat report from security vendor Trend Micro says the buzzed-about technologies may increase cybercrime by criminals looking for the next big cyber-swindle. Channel Insider takes a deeper look at the report’s biggest threat predictions for enterprises and end users.

2No Title

Cloud CrimeEveryone’s moving to the cloud, right? Not so fast. Sure, cloud computing promises lower costs and ease of maintenance, but, according to the new report, moving servers outside the firewall pokes gaping holes in enterprise security. The report predicts in 2010 cybercriminals will focus on hacking the cloud connection and attacking enterprise data centers directly to commit cybercrime.

3No Title

New Internet Protocols AriseThe next-gen Internet Protocol, IPv6, will begin to gain traction and 2010 will see proof-of-concept experimentations begin to materialize, predicts the report. Cybercriminals will begin to manipulate the new protocols through covert channels, but will refrain from active targeting of IPv6 addresses for the near future.

4No Title

Lookalikes Pose ThreatInternationalized domain names continue to gain popularity, but also create new opportunities to launch old-school phishing attacks. Expect to see cyberscams with look-alike domain names in Cyrillic characters that mimic Latin characters. Lookalike scams will impact corporate reputations and pose a serious challenge for security companies.

5No Title

Viral Media Means VirusTrend Micro predicts 2010 will see social communities targeted and compromised by cybercrime. The increasing production and development of information designed to be shared through social networking communities expands the potential victim pool for cybercriminals.

6No Title

Social Networks AttackedSocial networks will also become top venues for identity theft perpetrators. Data posted by trusting users is in high volume and of high value to cybercriminals. Combining personally identifiable data with interaction clues puts social networking users at high risk for cyber crime. The report predicts 2010 will see high-profile personalities suffer from online impersonators and stolen bank accounts.

7No Title

Local Replaces GlobalGlobal outbreaks like Slammer and CodeRed will become less frequent as more carefully orchestrated and targeted attacks become more prevalent. The report predicts that in 2010, localized attacks will become more prevalent and more sophisticated and replace global outbreaks.

8No Title

Windows 7 ThreatThe projected rise in adoption of Windows 7 will leave users open to cybercrime. Trend Micro points to Windows 7’s default configuration as the main cause as it is less secure than the Vista default configuration.

Recommended for you...

ThreatDown Study Highlights AI-Driven Ransomware Surge
CyberFox Co-Founders on Recent Investment & 2026 Opportunity
Strategies for Container-Related Incidents Impact Security Goals
Jordan Smith
Jan 29, 2026
CrowdStrike’s Daniel Bernard on Nord Security Partnership
Jordan Smith
Jan 28, 2026
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.