Mobile

12/10/2013
04:47 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro Predicts Cybersecurity Concerns For 2014 And Beyond

Mobile threats, targeted attacks, and vulnerabilities for the Internet of Everything highlighted

DALLAS, Dec. 9, 2013 – Trend Micro Incorporated (TYO: 4704; TSE: 4704) today released its annual security predictions report, "Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond." The outlook cites that one major data breach will occur every month next year, and advanced mobile banking and targeted attacks will accelerate. Critical infrastructure threats, as well as emerging security challenges from the Internet of Everything (IoE) and Deep Web, are also highlighted. The report parallels Trend Micro's long-term projections in the recently released nine-part online video drama entitled, "2020: The Series," depicting a technology saturated society and the corresponding cyber threats.

"We see the sophistication of threats expanding at a rapid pace, which will impact individuals, businesses and governments alike," said Raimund Genes, CTO, Trend Micro. "From mobile banking vulnerabilities and targeted attacks, to growing privacy concerns and the potential of a major breach each month, 2014 promises to be a prolific year for cybercrime. We will also see the evolution of the IoE, which serves as a prelude to the surge in technological advancements as the decade closes."

Prominent predications for 2014 include:

Malicious and high-risk Android apps will reach 3 million

Banking via mobile devices will be compromised by an uptick of Man-in-the-Middle attacks, making two-step verification inadequate

Cybercriminals will increasingly use targeted-attack-type methodologies like open source research and highly customized spear phishing

Targeted attackers will increasingly use advanced threats such as clickjacking and watering hole attacks and target mobile devices

Lack of support for popular software such as Java 6 and Windows XP will expose millions of PCs to attack

Public trust, compromised by revelations of state-sponsored monitoring, will result in a variety of efforts to restore privacy

The Deep Web will continue to vex law enforcement's ability to address widespread cybercrime

The report also focuses on the rise of the IoE, which promises to be the proverbial game changer in personal technology in the years to come. With augmented reality delivered through wearable technology including watches and eyewear, the possibility of large-scale cybercrime from identity theft by 2020 is a very real possibility as the technology continues to proliferate from 2014 and beyond.

This reality is brought to life in Trend Micro's "2020: The Series," which is based on Project 2020, a white paper developed in collaboration with the International Cyber Security Protection Alliance (ICSPA). The unique series presents a future consumed by technology and seeks to inspire stakeholders to take action now against looming cyber vulnerabilities.

View "Blurring Boundaries: Trend Micro Security Predictions for 2104 and Beyond" at:

http://about-threats.trendmicro.com/us/security-predictions/2014/blurring-boundaries/

Watch "2020: The Series" in its entirety to learn what the future holds for technology at: 2020.trendmicro.com.

Supporting assets:

TrendLabs Security Intelligence Blog entry:

http://blog.trendmicro.com/trendlabs-security-intelligence/2014-predictions-blurring-boundaries

Simply Security Blog:

http://blog.trendmicro.com/blurring-boundaries-trend-micro-security-predictions-for-2014-and-beyond

About Trend Micro

Trend Micro Incorporated a global leader in security software, rated number one in server security (IDC, 2013), strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro&trade Smart Protection Network&trade infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Secure Wifi Hijacked by KRACK Vulns in WPA2
Jai Vijayan, Freelance writer,  10/16/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.