Top 5 security predictions for 2014

Top 5 security predictions for 2014

FortiGuard Labs   |   December 13, 2013
Fortinet
Fortinet’s FortiGuard Labs highlights five threats to watch out for next year:
 
1. Android malware expands to industrial control systems and the IoT
 
As sales of mobile phones likely plateau in the coming years, Android developers are being tasked to find untapped markets for the Google operating system. A few of these emerging markets include tablets, portable game consoles, wearable devices, home automation equipment and industrial control systems (ICS/SCADA).
 
Next year, we predict we’ll see the first instances of malware on these new device types, specifically around embedded ICS/SCADA systems. While we don't believe we'll see a "mobile-Stuxnet" in 2014, we think cybercriminals will be attracted to platforms that go beyond common SMS fraud.
 
This includes new home automation devices that have control over our electrical consumption, the temperature of our fridges, etc. and feature software with remote login control panels to show/confirm who may be at home at a given time. This is bound to give cybercriminals new and nefarious ideas around how and when to rob someone’s home.
 
2. New exploits target off-net devices to penetrate corporate resources
The increased maturity of desktop exploit and advanced mitigation tools in the enterprise, such as malware sandboxing and next-generation antivirus, makes penetrating corporate networks a substantive challenge. The increased difficulty hackers are having penetrating today’s enterprise firewalls, will force them to take more creative approaches into networks or devices that are traditionally not hardened compared to the corporate network. These soft targets can include home routers, smart televisions, home automation and/or set top box connections. We predict we’ll see the first generic exploitation frameworks and mass malware agents for these types of home devices later next year.
 
3. More botnets will cross breed with other botnets
 
Historically, botnets worked alone. In rare instances, when a botnet such as TDSL infected a computer, the first thing it did was to look for traces of other botnets running on the same PC and remove them, thus preventing the compromised computer from becoming too unstable. In time, rather than compete against other botnets, the trend we’re seeing is botnets actually joining forces with other botnets in order to better grow their bases of infected users. This year we’re seeing an uptick in this type of activity, with the Andromeda, Bublik, Dorkbot, Fareit, and ZeroAccess botnets doing just that.
12

Bigbox

TelcoStrat 288

TELCO STRATEGIES CONFERENCE
May 7-8, Jakarta
Join telco CxOs from around Asia to discuss:
• Changing the way telcos operate
• New service offerings
• Restructuring for innovation
See the conference agenda >>

Ericsson has been in Asia for more than 100 years and will continue to drive technology and services leadership in order to bring the best mobile experiences to end users

SignUpTAenews

Frontpage Content by Category with Image

Activists petition for the withdrawal of the Newborn-to-Toddler Apptivity Seat

 

Telecomasia.net full website

© 2012 Questex Asia Ltd., a Questex Media Group company. All rights reserved. Reproduction in whole or in part is prohibited. Please send any technical comments or questions to our webmaster.