Top 10 Security Threat Predictions For 2008

We can expect to see attackers target financial markets with highly sophisticated schemes -- pump and dump combined with DDos for example -- as they continue to locate vulnerabilities in databases and exploit them, according to Fortinet's Top 10 Security Threat report for 2008.

Even when database vulnerability is discovered, security professionals maintain that it takes at least six months before it can be repaired.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.