BreachExchange mailing list archives

Cyber attacks ‘to accelerate in new year’


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Thu, 26 Dec 2013 19:15:02 -0700

http://www.irishexaminer.com/business/cyber-attacks-to-accelerate-in-new-year-253447.html

The Cork-based company’s annual report: ‘Blurring Boundaries: Trend Micro
Security Predictions for 2014 and Beyond,’ forecasts mobile banking and
targeted attacks will accelerate.

Vice president, European Operations Centre, Dervla Mannion, said these
security breaches will have a bigger impact on people in 2014 than in
previous years.

“We see the sophistication of threats expanding at a rapid pace, which will
impact individuals, businesses and governments alike, From mobile banking
vulnerabilities and targeted attacks, to growing privacy concerns and the
potential of a major breach each month, 2014 promises to be a prolific year
for cyber crime.”

One of the reasons the company is predicting an increase in attacks is that
support from the developers of certain software is due to expire next year,
giving criminals vulnerable points at which to attack.

Vendor support will cease for both Java 6 and Windows XP, and Trend Micro
says a rise in attacks is inevitable. While most PC users run Windows 7, it
is believed up to 20% of PC users still run Windows XP, representing a high
number of potential victims.

The methods hackers use are also expected to grow more sophisticated. Last
year Facebook fell prey to a ‘watering hole’ attack by an iPhone developer
site. The culprits infected a page they knew would attract their desired
target. The attack showed the industry that cyber criminals no longer rely
on traditional email and attachment tactics but will initiate a more
targeted approach to attacks.

In 2013, cyber criminals also exploited vulnerabilities in specialised
software such as Adobe and ColdFusion. This year saw massive data breaches
targeting several military, government and space research agencies,
reportedly effects of exploiting ColdFusion vulnerabilities.

Another growing phenomenon is the ‘Deep Web,’ which allows complete
anonymity and allows hackers to be untraceable.

Ms Mannion said hackers will always seek out weak points so all companies
should use proper tools to protect themselves.

“The key focus in 2014 should be on protecting core data against cyber
attacks. Cyber criminals will use any device necessary and will seek out
weak spots in software suites and mobile devices. Home networks, company
databases and software and mobile devices should have the proper tools and
protocols in place to decrease the likelihood of invasion,” she said.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security offers security intelligence, risk management services and customized security solutions. The 
YourCISO portal gives decision makers access to tools for evaluating their security posture and prioritizing risk 
mitigation strategies. Cyber Risk Analytics offers actionable threat information and breach analysis.

Current thread: