One of the many signs that the year is coming to an end is the emergence of forecasts for the next 12 months by security companies and online analysts. In a year marked by great stories, like his revelations Snowden and the violation of data of Adobe, expert predictions are rather necessary.
2014's cyber security predictions to be seen below come from three security companies and were published by ZDNet
- Sophisticated threats will continue to hide behind traditional massware crimeware tools to make their recognition difficult for network advocates.
- More attacks will start using stolen security certificates or valid code signatures
- The Mobile malware will further complicate the security landscape.
- Java zero-day exploits may be less prevalent
- Attacks to Browsers vulnerabilities will be more common
- Malware developers will use invisible management and control (CNC) techniques
- Attacks Watering-hole and the targeting of social media will increasingly replace attacks spear-phishing with emails
- More malware will come. Wait for more malicious code in BIOS and in firmware upgrades
- New techniques heap-spray θα προκύψουν εξαιτίας του Adobe Flash με το γνωστό κόλπο "κάντε κλικ για να παίξει"
- Attackers will find more ways to defeat automated systems analysisς (sandbox) , such as turning on reboots, mouse clicks, closing requests, and so on
- More crimeware will destroy operating systems (OSs) of targeted systems
- Περισσότερα "ψηφιακά Quartermasters" πίσω από στοχευμένες επιθέσεις. Με άλλα λόγια, το Sunshop DQ είναι μόνο η αρχή
- Cyber crime becomes personal
More details about her forecasts FireEye for 2014
- People will eventually start taking active measures to keep their information private
- Scammers, data collectors and cybercriminals will not ignore social networks
- Το "Ίντερνετ των πραγμάτων" γίνεται το "Διαδίκτυο των ευπάθειας"
- Mobile apps will prove you trust them too
More details about 2014 predictions from Symantec
- Complex malware will be reduced
- Large attacks on data theft
- Attackers will be more interested in cloud data than yours.
- Redkit, Neutrino and other exploitation kits will compete for power
- Java will remain remarkable and will be utilized particularly with widespread impact
- Οι κυβερνοεγκληματίες θα στοχεύσουν τους πιο αδύναμους κρίκους της "αλυσίδας αντchangeς δεδομένων"
More details about predictions for 2014 from Websense