Dawn Kawamoto:
- 10. Increased industrial attacks.
- 9. ´Legalized´ spam.
- 8. Hacktivism.
- 7. Cyberwar showoffs
- 6. Rogue certificates
- 5. Blinking online traffic lights.
- 4. Advances in operating systems directing hackers elsewhere.
- 3. Threats to virtual currency
- 2. Embedded hardware.
- 1. Mobile threats bypassing PCs.
Autro p?idává také n?které doporu?ení po majitele chytrých mobil?.