One of the many signs that the year is coming to an end is the emergence of forecasts for the next 12 months by security companies and online analysts. In a year marked by great stories, like his revelations Snowden and the violation of Adobe data, expert predictions are probably necessary.
2014's cyber security predictions to be seen below come from three security companies and were published by ZDNet
- Sophisticated threats will continue to hide behind traditional massware crimeware tools to make their recognition difficult for network advocates.
- More attacks will start using stolen security certificates or valid signatures code
- Mobile malware will further complicate the security landscape.
- Java zero-day exploits may be less prevalent
- Attacks to Browsers vulnerabilities will be more common
- Malware developers will use invisible administration techniques and control (CNC)
- Attacks watering-hole and social media targeting will increasingly replace attacks spear-phishing with emails
- Θα έρθουν περισσότερα malware . Να περιμένετε περισσότερο κακόβουλο κώδικα στο BIOS και στις αναβαθμίσεις των firmware
- New techniques heap-spray will result from Adobe Flash with the well-known "click to play" trick
- Attackers will find more ways to beat automated analysis systems (sandbox) , such as turning on reboots, mouse clicks, closing requests, and so on
- More crimeware will destroy operating systems (OSs) of targeted systems
- More "digital Quartermasters" behind targeted attacks. In other words, the Sunshop DQ is just the beginning
- Cyber crime becomes personal
More details about her forecasts FireEye for 2014
- People will eventually start taking active measures to keep their information private
- Scammers, data collectors and cybercriminals will not ignore social networks
- Το “Ίντερνετ των πραγμάτων” γίνεται το “Διαnetwork των ευπάθειας”
- Mobile apps will prove you trust them too
More details about 2014 predictions from Symantec
- Complex malware will be reduced
- Large attacks on data theft
- Attackers will be more interested in cloud data than yours.
- Redkit, Neutrino and other exploitation kits will compete for power
- Java will remain remarkable and will be utilized particularly with widespread impact
- Cybercriminals will target the weakest links in the "data chain"
More details about predictions for 2014 from Websense