Cyber Security: Get real about risk

Comments 0
2013 played host to major mobile threats, a trend which is expected to continue in 2014. 2013 played host to major mobile threats, a trend which is expected to continue in 2014.
Summary2013 played host to major mobile threats, a trend which is expected to continue in 2014.

Cyber security is an area of great interest and concern in the business community. It is that time of the year when numerous IT security firms and service providers set out to foresee and outline the potential threats and probable solutions for the new year to combat them. It is a constant quest to notify the netizens with adequate information to keep them safe and secure. Some of the upcoming threats to watch out for in 2014 might startle even the die-hard IT administrators and individuals using a wide array of personal devices. Read on to find out.

We will see one major data breach incident a month, cautions Trend Micro. Mobile banking will suffer from more cyberattacks; basic two-step verification will no longer be sufficient. Cybercriminals will increasingly use targeted-attack-type methodologies like open source research and highly customised spear phishing, along with multiple exploits. In the context of targeted attacks, we will see more click-jacking and watering hole attacks, new exploits of choice, and attacks via mobile devices. Pretty scary isn’t it, but staying cautious can go a long way in protecting your assets—but more on it later.

According to Dhanya Thakkar, managing director, India & SAARC, Trend Micro, “2013 played host to major mobile threats, a trend which is expected to continue in 2014. This year is all about mobile banking. Unfortunately, we can also expect mobile threats like man-in-the-middle (MitM) attacks to increase in 2014. Android will remain the most dominant OS in the market. But this dominance will continue to be exploited, as we predict the volume of malicious and high-risk Android apps to reach 3 million by the end of 2014.”

The “next big thing,” according to Thakkar, that cybercriminals are waiting for could come from the world of augmented reality (AR). Virtual reality headsets will become a disruptive technology. Not only will they change the gaming space, they will also be used for other purposes like attending conference calls and posting on social networks. These smart devices will become more desirable as the years progress.

“Expect isolated attacks to start in a couple of years,” says Thakkar. “These AR headsets will become the new favoured target to obtain personal information. Their built-in cameras will be used for privacy attacks, giving cybercriminals a bird’s eye view of users’ daily activities and a means to record details like bank PINs and other personal information.”

The continued worsening of the threats we

Single Page Format
Ads by Google
Reader´s Comments
| Post a Comment
Please Wait while comments are loading...