What threats will dominate 2014?
Posted on 10 December 2013.
Trend Micro released its annual security predictions report. The outlook cites that one major data breach will occur every month next year, and advanced mobile banking and targeted attacks will accelerate.


Critical infrastructure threats, as well as emerging security challenges from the Internet of Everything (IoE) and Deep Web, are also highlighted.

“We see the sophistication of threats expanding at a rapid pace, which will impact individuals, businesses and governments alike,” said Raimund Genes, CTO, Trend Micro. “From mobile banking vulnerabilities and targeted attacks, to growing privacy concerns and the potential of a major breach each month, 2014 promises to be a prolific year for cybercrime. We will also see the evolution of the IoE, which serves as a prelude to the surge in technological advancements as the decade closes.”

Prominent predications for 2014 include:
  • Malicious and high-risk Android apps will reach 3 million
  • Banking via mobile devices will be compromised by an uptick of Man-in-the-Middle attacks, making two-step verification inadequate
  • Cybercriminals will increasingly use targeted-attack-type methodologies like open source research and highly customized spear phishing
  • Targeted attackers will increasingly use advanced threats such as clickjacking and watering hole attacks and target mobile devices
  • Lack of support for popular software such as Java 6 and Windows XP will expose millions of PCs to attack
  • Public trust, compromised by revelations of state-sponsored monitoring, will result in a variety of efforts to restore privacy
  • The Deep Web will continue to vex law enforcement’s ability to address widespread cybercrime.
The report also focuses on the rise of the IoE, which promises to be the proverbial game changer in personal technology in the years to come. With augmented reality delivered through wearable technology including watches and eyewear, the possibility of large-scale cybercrime from identity theft by 2020 is a very real possibility as the technology continues to proliferate from 2014 and beyond.





Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //