After all, RFID is just another medium in the electromagnetic spectrum that stores, accesses and enables the use of data. Today, data and the use of data are more valuable than money to any hacker.

“Consequently, RFID adoption creates a new ability to carry out the current and future goal of any criminal or nation state which is using collection, dissemination and use of data to achieve their goals,” said Rich Baich, principal in the Security and Privacy practice of Deloitte & Touche. “These goals will be geared toward economical gain, political influence and projection of power.”

Logic exploits - Logic vulnerabilities are high on the emerging hit list. “Identification of defects in business logic is the next frontier for application, software security,” said Raf Los, Web Application Security evangelist, HP Software. “As organizations understand how to secure their code against programmatic errors, including SQL injection and cross-site scripting (CSS), attackers will inevitably move on to attacking application logic."

ATM-like hardware hacks - “We've seen criminals physically walk in to stores and replace credit card terminals with working replacements that had been modified to contain a 3G modem, which transmitted payment details directly back to them,” said Lyne. “This high scale, intelligent hardware hacking demonstrates that the threat is not just impacting the conventional PC.”

RAM scraping - “For years everyone has been locking down databases since they are the source of information, but now hackers that can breach a server can get an application less than 1MB in size on the server and capture all the data as it is written to RAM before it goes to a database,” said Chris Drake, CEO of FireHost. “An application like this can also capture data (such as credit card numbers) that don't even go into a database, but that are processed by a third party provider. RAM scraping will be a huge concern as it gains more popularity among the hacker crowd."

Dark knight attacks - From Microsoft Kinect to smart phones, everything is connected to the Internet and comes equipped with microphones, video cameras, gyroscopic feedback, and GPS. “In the movie The Dark Knight, they hacked into every cell phone to build a live three dimensional image of everything happening within Gotham City,” explained Harry Sverdlove, CTO of Bit9. “The technology to do this is within reach today. Through facial recognition, speech pattern identification, and geo-location feedback, future hackers could raise ‘targeted attacks’ to a new level."

While there is no need to obsess about these or any other emerging threats, it is important to understand that hackers evolve faster than technology needed to stop them. Indeed, they are the catalyst for the next wave of security technology. We will conquer and be conquered by the next generation of geniuses, both good and bad, exactly as has happened before.

A prolific and versatile writer, Pam Baker's published credits include numerous articles in leading publications including, but not limited to: Institutional Investor magazine,, NetworkWorld, ComputerWorld, IT World, Linux World, Internet News, E-Commerce Times, LinuxInsider, CIO Today Magazine, NPTech News (nonprofits), MedTech Journal, I Six Sigma magazine, Computer Sweden, NY Times, and Knight-Ridder/McClatchy newspapers. She has also authored several analytical studies on technology and eight books. Baker also wrote and produced an award-winning documentary on paper-making. She is a member of the National Press Club (NPC), Society of Professional Journalists (SPJ), and the Internet Press Guild (IPG).