Connect with us

Hi, what are you looking for?

My Tech Quest

Featured

8 Security Predictions from Trend Micro for year 20142 min read

Trend Micro Security Predictions for 2014

The world didn’t end on December 21 last year. Thanks god. And now we are coming to the end of year 2013. Time flies, right? As we move closer to the new year, we need to get ourselves ready for the upcoming threats, if computer and mobile security is your major concern.

Trend Micro Security Predictions for 2014

Security vendor Trend Micro has put together a list of predictions for 2014 which will give the world a closer look on the future cyber-threat landscape.

Without much ado, let’s take a look at Trend Micro security predictions for 2014 and beyond. There are eight of them.

1. Basic two-step verification will no longer work against mobile man-in-the-middle (MitM) attacks

As more people used mobile devices for both banking and authentication, cybercriminals started intercepting authentication numbers with the aid of mobile malware like PERKEL and ZITMO. Mobile banking will suffer from more MitM attacks. Basic two-step verification will no longer be sufficient.

2. Cybercriminals will level up via targeted attack methods

Cybercriminals will increasingly use targeted-attack-type methodologies like open source research and highly customized spear phishing, along with multiple exploits. They will be adopted because of ease of use and effectiveness in terms of evading detection.

3. Bad actors will increasingly use clickjacking and watering hole tactics, new exploits and mobile threat vectors

In the context of targeted attacks, we will see more clickjacking and watering hole attacks, new exploits of choice, and attacks via mobile devices. Threat actors will lure targets to a watering hole site using a clever social engineering ruse or clickjacking in order to compromise computers with exploits.

4. One major data breach will occur each month

We will see one major data breach incident a month. Someone will always attempt to break in to networks using new tools and by exploiting vulnerabilities.

5. More bugs will be exploited as vendors end support for Java 6 and Windows XP

Attacks leveraging vulnerabilities in widely used but unsupported software like Java 6 and Windows XP will intensify. As Microsoft officially ends support for Windows XP in 2014, we will see the Java 6 scenario play out for Windows XP as well. Expect a pickup in attacks, zero-days, and exploit integration into known kits, among other things.

6. Bad actors will use the Deep Web to drag law enforcers in a global struggle

The Deep Web will significantly challenge law enforcement, as the latter struggles to build capacity in order to address cybercrime on a large scale.

7. Privacy will become bigger than individual; public distrust will ensue

Public distrust will ensue, especially after the exposure of state-sponsored monitoring activities, resulting in a period of disparate efforts to restore privacy.

8. Bad actors will continue to await the “killer app” before jumping onto the IoE bandwagon

We will not yet see large-scale, widespread IoE threats. This requires a “killer app,” which may appear in the area of AR in the form of technology like heads-up displays.

The 2014 security predictions is available as a report in PDF format. For full details, you can download and read the report here.

Comments

You May Also Like

Blogging

I guess you must have noticed the “Incoming Search Terms” section on My Tech Quest. Look at the screenshot below. 🙂 A few days...

Gadget

This is a guest post by Joe Linford. If you would like to contribute too, please leave us a message via the contact us page....

Local Tech News

To accelerate progress in the 1BestariNet Program, YTL Communications has partnered with Intel Malaysia to introduce Intel-based integrated 4G LTE laptop and tablet solutions supporting...

Android

In Grammarly Editor, you can view suggested synonyms of words that you just typed in your text. Now, the same feature has been added...

Advertisement

Trending