BreachExchange mailing list archives
Cyber attacks ‘to accelerate in new year’
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Thu, 26 Dec 2013 19:15:02 -0700
http://www.irishexaminer.com/business/cyber-attacks-to-accelerate-in-new-year-253447.html The Cork-based company’s annual report: ‘Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond,’ forecasts mobile banking and targeted attacks will accelerate. Vice president, European Operations Centre, Dervla Mannion, said these security breaches will have a bigger impact on people in 2014 than in previous years. “We see the sophistication of threats expanding at a rapid pace, which will impact individuals, businesses and governments alike, From mobile banking vulnerabilities and targeted attacks, to growing privacy concerns and the potential of a major breach each month, 2014 promises to be a prolific year for cyber crime.” One of the reasons the company is predicting an increase in attacks is that support from the developers of certain software is due to expire next year, giving criminals vulnerable points at which to attack. Vendor support will cease for both Java 6 and Windows XP, and Trend Micro says a rise in attacks is inevitable. While most PC users run Windows 7, it is believed up to 20% of PC users still run Windows XP, representing a high number of potential victims. The methods hackers use are also expected to grow more sophisticated. Last year Facebook fell prey to a ‘watering hole’ attack by an iPhone developer site. The culprits infected a page they knew would attract their desired target. The attack showed the industry that cyber criminals no longer rely on traditional email and attachment tactics but will initiate a more targeted approach to attacks. In 2013, cyber criminals also exploited vulnerabilities in specialised software such as Adobe and ColdFusion. This year saw massive data breaches targeting several military, government and space research agencies, reportedly effects of exploiting ColdFusion vulnerabilities. Another growing phenomenon is the ‘Deep Web,’ which allows complete anonymity and allows hackers to be untraceable. Ms Mannion said hackers will always seek out weak points so all companies should use proper tools to protect themselves. “The key focus in 2014 should be on protecting core data against cyber attacks. Cyber criminals will use any device necessary and will seek out weak spots in software suites and mobile devices. Home networks, company databases and software and mobile devices should have the proper tools and protocols in place to decrease the likelihood of invasion,” she said.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) Risk Based Security offers security intelligence, risk management services and customized security solutions. The YourCISO portal gives decision makers access to tools for evaluating their security posture and prioritizing risk mitigation strategies. Cyber Risk Analytics offers actionable threat information and breach analysis.
Current thread:
- Cyber attacks ‘to accelerate in new year’ Audrey McNeil (Dec 27)