Citovány jsou následující:
- Industrial attacks: Cybercriminals target utilities
- Advertisers will “legalize” spam
- Mobile threats: Attackers will bypass PCs
- Embedded hardware: The promised land for sophisticated hackers
- Hacktivism: Joining forces online and on the front lines
- Virtual Currency: A cybercriminal payment plan
- Cyberwar: Flexing its muscles
- Rogue Certificates: Untrustworthy and undetectable
- Tomorrow´s internet looks more like yesterday’s Internet
- Advances in operating systems moves hackers “down and out”