Top cyber security concerns for 2014 and beyond

As 2013 draws to a close, it’s time to start looking ahead to next year and years after that. This will form a series of articles on what lies ahead. Most will be about Linux and Free Software, but a few will cover the broader technology landscape.

To kick off the series, I’m borrowing content from Trend Micro, Inc., a security software solutions provider headquartered in Tokyo, Japan.

In a report titled “Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond,” the company gave a list of security issues it thinks will pose the most headache for users, developers and law enforcement in 2014 and beyond. I’ll relist them here and append my comments to a few.
Top security threat 2014

  • “Malicious and high-risk Android apps will reach 3 million.”
  • I don’t know what the actual number is now, but me thinks it will be more than that.

  • “Banking via mobile devices will be compromised by an uptick of Man-in-the-Middle attacks, making two-step verification inadequate.”
  • The battle between the good guys and bad guys is a never-ending one. And as they say in the industry, if you have something that somebody wants to gain access to badly enough, they will keep taking shots at it until they succeed. The question is, when will you know that they have succeeded, during or after?

  • Cybercriminals will increasingly use targeted-attack-type methodologies like open source research and highly customized spear phishing.
  • Targeted attackers will increasingly use advanced threats such as clickjacking and watering hole attacks and target mobile devices.”
  • Lack of support for popular software such as Java 6 and Windows XP will expose millions of PCs to attack.”
  • Then Windows XP users should migrate to desktop Linux. Heck, all Windows users should migrate to desktop Linux. It’s not that Linux is free of malware, but compared to the family of operating system from that company, desktop Linux is clean.

  • Public trust, compromised by revelations of state-sponsored monitoring, will result in a variety of efforts to restore privacy.”
  • In general, privacy as we used to know it in the US of A is dead. It died about 15 years ago. So forget about restoring the level of privacy that we used to know. It could happen, but it’s going to take mass unrests and a sweeping aside of the present system of government. But the odds of that occurring here is not worth talking about. With time, as more connected technologies become ubiquitous, state-sponsored snooping will be even easier than it is now. The only place you are ever going to enjoy privacy is in your private residence. Even that is not guaranteed.

  • The Deep Web will continue to vex law enforcement’s ability to address widespread cybercrime
  • . Law enforcement agencies have a legitimate job to do. It’s when they begin to operate outside the bounds that society suffers. In that regard, anything that vexes law enforcement as they molest our privacy is ok by me.

One area that the Trend Micro report did not address is desktop Linux. Yes, it’s market share is still small, but by the third quarter of 2014, at least one significant development in PC hardware will lead to a significant increase in that market share. And it will be significant enough to bring in more bad guys launching targeted attacks against the OS.

To learn more about these future security concerns in an interactive manner, visit here.

Related Posts

How to Dockerize a Ruby on Rails application In this tutorial, you will learn how to dockerize a Ruby on Rails application. The application we're going to build will make use of PostgreSQL, Redis...
Why did this server run out of disk space? Less than two hours after I logged into the admin end of this website, which is powered by WordPress, the site went offline, with a 502 Bad Gateway er...
Cinnamon proposed to replace GNOME Shell as default DE on Fedora 19 It was lobbying by the GNOME devs that made GNOME 3 the default on Fedora, but now it seems that somebody has had enough. That somebody has proposed m...
How is the NSA breaking SSL? If you've been following the news about government spying, you should know by now, thanks to information revealed by Edward Snowden, that the USA's Na...
Google Reader axed. Is FeedBurner next? Google has announced that the Google Reader service will not be available after July 1 of this year (2013). The service, which provided a "cloud" port...
NVIDIA Tegra Note NVIDIA Tegra Note is the latest offering in the tablet computing arena from NVIDIA. It is an Android OS-powered tablet platform that will be available...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


5 Comments

  1. And wth is that «one significant development in PC hardware ‹that› will lead to a significant increase in ‹desktop Linux› market share» ?

Leave a Comment

Your email address will not be published. Required fields are marked *

*