Predicts 2015 Trends in Internet Trust Exploits, Privacy, Mobile, Internet of Things, and Cyber Espionage
Intel Security’s McAfee Labs November 2014 Threats Report, details a third quarter filled with threat development milestones and cyber events exploiting long-established Internet trust standards. McAfee Labs forecasts a 2015 threat landscape shaped by more attacks.
“The third quarter of 2014 brought about the latest in a series of events that worked to shake confidence in a Trusted Internet,” said Hamed Diab, McAfee’s regional director in the Middle East and North Africa. ” To restore this shaken trust in the Internet in 2015 will require stronger public-private and cross-industry collaborations, new standards for a new threat landscape, and shrinking ‘time to detection’ through the superior use of threat data,” concluded Diab.
The trends predicted for 2015 include increased use of cyber warfare and espionage tactics. Unless security controls are built-in to their architectures from the beginning, the rush to deploy IoT devices at scale will outpace the priorities of security and privacy. This rush and the increasing value of data gathered, processed, and shared by these devices will draw the first notable IoT paradigm attacks in 2015.
Data privacy will continue to be a hot topic as governments and businesses continue to grapple with what is fair and authorized access to inconsistently defined “personal information.” Ransomware will evolve its methods of propagation, encryption, and the targets it seeks. More mobile devices are likely to suffer attacks. Mobile attacks will continue to grow rapidly as new mobile technologies expand the attack surface.
Point of sale (POS) attacks will remain lucrative, and a significant upturn in consumer adoption of digital payment systems on mobile devices will provide new attack surfaces that cybercriminals will exploit. Non-Windows malware attacks will increase as a result of the Shellshock vulnerability. The exploitation of vulnerabilities is likely to increase as new flaws are discovered in popular software products. Escaping the sandbox will become a significant IT security battlefield.