Cyber ​​Security 2014: A summary of the forecasts

One of the many signs that the year is coming to an end is the emergence of forecasts for the next 12 months by security companies and online analysts. In a year marked by great stories, like his revelations Snowden and the violation of Adobe data, expert predictions are probably necessary.

protected

2014's cyber security predictions to be seen below come from three security companies and were published by ZDNet

security-2014-fireeye-logo

  •     Sophisticated threats will continue to hide behind traditional massware crimeware tools to make their recognition difficult for network advocates.
  •     More attacks will start using stolen security certificates or valid signatures
  •     Mobile malware will further complicate the security landscape.
  •     Java zero-day exploits may be less prevalent
  •     Attacks to Browsers vulnerabilities will be more common
  •     Malware developers will use invisible administration techniques and (CNC)
  •     Attacks -hole and social media targeting will increasingly replace attacks spear-phishing with emails
  •     Θα έρθουν περισσότερα malware . Να περιμένετε περισσότερο κακόβουλο κώδικα στο BIOS και στις αναβαθμίσεις των
  •     New techniques heap-spray will result from Adobe Flash with the well-known "click to play" trick
  •     Attackers will find more ways to beat automated analysis systems (sandbox) , such as turning on reboots, mouse clicks, closing requests, and so on
  •     More crimeware will destroy operating systems (OSs) of targeted systems
  •     More "digital Quartermasters" behind targeted attacks. In other words, the Sunshop DQ is just the beginning
  •     Cyber ​​crime becomes personal

More details about her forecasts FireEye for 2014

security-2014-symantec-logo

  •     People will eventually start taking active measures to keep their information private
  •     Scammers, data collectors and cybercriminals will not ignore social networks
  •     Το “Ίντερνετ των πραγμάτων” γίνεται το “Δια των ευπάθειας”
  •     Mobile apps will prove you trust them too


More details about 2014 predictions from Symantec


security-2104-websense-logo

  •     Complex malware will be reduced
  •     Large attacks on data theft
  •     Attackers will be more interested in cloud data than yours.
  •     Redkit, Neutrino and other exploitation kits will compete for power
  •     Java will remain remarkable and will be utilized particularly with widespread impact
  •     Cybercriminals will target the weakest links in the "data chain"


More details about predictions for 2014 from Websense

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).