Mobile, IoT Face More Complex Attacks in 2015

 
 
By Karen A. Frenkel  |  Posted 01-23-2015 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Stealthier Stealers
    Next

    Stealthier Stealers

    Cyber-espionage attacks will continue to increase. Long-term hackers will use stealthier information-gathering techniques. Newcomers will try to outdo adversaries by looking for new ways to steal sensitive information. Small nation-states and terrorist groups will increasingly use cyber-warfare.
  • Previous
    More Internet of Things Attacks
    Next

    More Internet of Things Attacks

    The proliferation of IoT devices could give hackers access to personal data, as in the health-care industry, where personal data can be between 10 times and 20 times more valuable than stolen credit card data.
  • Previous
    Data Privacy Debates to Continue
    Next

    Data Privacy Debates to Continue

    This year will see ongoing discussions about what constitutes "personal information" and the extent to which it may be accessed and shared by state or private entities. Laws may evolve to regulate the use of previously anonymous data sets.
  • Previous
    Cloudy Ransomware
    Next

    Cloudy Ransomware

    More mobile devices are likely to be attacked as ransomware evolves. The technique of ransomware to target data backed up in the cloud will proliferate in mobile.
  • Previous
    Ransomware Virtual Currency to Rise
    Next

    Ransomware Virtual Currency to Rise

    A continued rise in mobile ransomware that uses virtual currency as a payment method is expected.
  • Previous
    New Mobile Technologies to Tempt Hackers
    Next

    New Mobile Technologies to Tempt Hackers

    Kits that generate malware and source code for mobile devices will make it easier for cybercriminals to attack mobile devices. "Malvertising" will drive traffic to rogue app stores.
  • Previous
    POS Attacks to Increase
    Next

    POS Attacks to Increase

    POS (point of sale) attacks will remain lucrative, as consumers adopt digital payment systems on mobile. Despite chip-and-pin cards and card readers, these breaches will continue to grow, due to the huge numbers of POS devices.
  • Previous
    Shellshock Long-Lasting
    Next

    Shellshock Long-Lasting

    Aftershocks from the Shellshock bug, which struck Yahoo in October and exploited a vulnerability in its Linux and UNIX servers, are expected to be felt for many years because there are so many potentially vulnerable devices—from routers to TVs to industrial controllers.
  • Previous
    Popular Software Products Are Vulnerable
    Next

    Popular Software Products Are Vulnerable

    Stack pivoting, return- and jump-oriented programming and a better understanding of 64-bit software will help reveal new vulnerabilities in popular software products.
  • Previous
    Escaping the Sandbox
    Next

    Escaping the Sandbox

    This year will see growth in the number of techniques used to exploit vulnerabilities in critical and popular applications, and cybercriminals will avoid application sandboxing, which limits environments in which code can execute.
 

Mobile malware samples jumped 16% in the third quarter of 2014 compared to malware discovered in the second quarter, according to a new report. Year over year, mobile malware increased by 76%. Conducted by McAfee Labs, which is now part of Intel Security, the quarterly report is included in McAfee Labs' "2015 Threats Predictions.” The report forecasts a threat landscape punctuated by more attacks exploiting long-established Internet trust standards and increased attacks on mobile devices and the IoT (Internet of things). Cyber-espionage will become more sophisticated, and criminals will evade sandboxing detection technologies. "The year 2014 will be remembered as 'the Year of Shaken Trust’," said Vincent Weafer, senior vice president at McAfee Labs, "(which) shook industry confidence in long-standing Internet trust models, consumer confidence in organizations' abilities to protect their data and organizations' confidence in their ability to detect and deflect target attacks in a timely manner." Restoring trust will require stronger industry collaboration, he said, and new standards and security strategies that shrink time to detection through better use of threat data.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...