Cyber ​​Security 2014: A summary of the forecasts

One of the many signs that the year is coming to an end is the emergence of forecasts for the next 12 months by security companies and online analysts. In a year marked by great stories, like his revelations Snowden and the violation of of Adobe, expert predictions are rather necessary.

protected

2014's cyber security predictions to be seen below come from three security companies and were published by ZDNet

security-2014-fireeye-logo

  •     Sophisticated threats will continue to hide behind traditional massware crimeware tools to make their recognition difficult for network advocates.
  •     More attacks will start using stolen security certificates or valid code signatures
  •     The malware will further complicate the security landscape.
  •     Java zero-day exploits may be less prevalent
  •     Attacks to Browsers vulnerabilities will be more common
  •     Malware developers will use invisible management and control (CNC) techniques
  •     Attacks Watering-hole and the targeting of media will increasingly replace attacks spear-phishing with emails
  •     More malware will come. Wait for more malicious code in BIOS and in firmware upgrades
  •     New techniques heap-spray θα προκύψουν εξαιτίας του Adobe Flash με το γνωστό κόλπο "κάντε κλικ για να παίξει"
  •     Attackers will find more ways to defeat automated systems ς (sandbox) , such as turning on reboots, mouse clicks, closing requests, and so on
  •     More crimeware will destroy operating systems (OSs) of targeted systems
  •     Περισσότερα "ψηφιακά Quartermasters" πίσω από στοχευμένες επιθέσεις. Με άλλα λόγια, το Sunshop DQ είναι μόνο η αρχή
  •     Cyber ​​crime becomes personal

More details about her forecasts FireEye for 2014

security-2014-symantec-logo

  •     People will eventually start taking active measures to keep their information private
  •     Scammers, data collectors and cybercriminals will not ignore social networks
  •     Το "Ίντερνετ των πραγμάτων" γίνεται το "Διαδίκτυο των ευπάθειας"
  •     Mobile apps will prove you trust them too


More details about 2014 predictions from Symantec


security-2104-websense-logo

  •     Complex malware will be reduced
  •     Large attacks on data theft
  •     Attackers will be more interested in cloud data than yours.
  •     Redkit, Neutrino and other exploitation kits will compete for power
  •     Java will remain remarkable and will be utilized particularly with widespread impact
  •     Οι κυβερνοεγκληματίες θα στοχεύσουν τους πιο αδύναμους κρίκους της "αλυσίδας αντς δεδομένων"


More details about predictions for 2014 from Websense

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).