What threats will dominate 2014?
Posted on 10 December 2013.
Trend Micro released its annual security predictions report. The outlook cites that one major data breach will occur every month next year, and advanced mobile banking and targeted attacks will accelerate.


Critical infrastructure threats, as well as emerging security challenges from the Internet of Everything (IoE) and Deep Web, are also highlighted.

“We see the sophistication of threats expanding at a rapid pace, which will impact individuals, businesses and governments alike,” said Raimund Genes, CTO, Trend Micro. “From mobile banking vulnerabilities and targeted attacks, to growing privacy concerns and the potential of a major breach each month, 2014 promises to be a prolific year for cybercrime. We will also see the evolution of the IoE, which serves as a prelude to the surge in technological advancements as the decade closes.”

Prominent predications for 2014 include:
  • Malicious and high-risk Android apps will reach 3 million
  • Banking via mobile devices will be compromised by an uptick of Man-in-the-Middle attacks, making two-step verification inadequate
  • Cybercriminals will increasingly use targeted-attack-type methodologies like open source research and highly customized spear phishing
  • Targeted attackers will increasingly use advanced threats such as clickjacking and watering hole attacks and target mobile devices
  • Lack of support for popular software such as Java 6 and Windows XP will expose millions of PCs to attack
  • Public trust, compromised by revelations of state-sponsored monitoring, will result in a variety of efforts to restore privacy
  • The Deep Web will continue to vex law enforcement’s ability to address widespread cybercrime.
The report also focuses on the rise of the IoE, which promises to be the proverbial game changer in personal technology in the years to come. With augmented reality delivered through wearable technology including watches and eyewear, the possibility of large-scale cybercrime from identity theft by 2020 is a very real possibility as the technology continues to proliferate from 2014 and beyond.





Spotlight

The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //