Partner links

Top cyber security concerns for 2014 and beyond

Zemanta Related Posts Thumbnail

As 2013 draws to a close, it’s time to start looking ahead to next year and years after that. This will form a series of articles on what lies ahead. Most will be about Linux and Free Software, but a few will cover the broader technology landscape.

To kick off the series, I’m borrowing content from Trend Micro, Inc., a security software solutions provider headquartered in Tokyo, Japan.

In a report titled “Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond,” the company gave a list of security issues it thinks will pose the most headache for users, developers and law enforcement in 2014 and beyond. I’ll relist them here and append my comments to a few.
Top security threat 2014

  • “Malicious and high-risk Android apps will reach 3 million.”
  • I don’t know what the actual number is now, but me thinks it will be more than that.

  • “Banking via mobile devices will be compromised by an uptick of Man-in-the-Middle attacks, making two-step verification inadequate.”
  • The battle between the good guys and bad guys is a never-ending one. And as they say in the industry, if you have something that somebody wants to gain access to badly enough, they will keep taking shots at it until they succeed. The question is, when will you know that they have succeeded, during or after?

  • Cybercriminals will increasingly use targeted-attack-type methodologies like open source research and highly customized spear phishing.
  • Targeted attackers will increasingly use advanced threats such as clickjacking and watering hole attacks and target mobile devices.”
  • Lack of support for popular software such as Java 6 and Windows XP will expose millions of PCs to attack.”
  • Then Windows XP users should migrate to desktop Linux. Heck, all Windows users should migrate to desktop Linux. It’s not that Linux is free of malware, but compared to the family of operating system from that company, desktop Linux is clean.

  • Public trust, compromised by revelations of state-sponsored monitoring, will result in a variety of efforts to restore privacy.”
  • In general, privacy as we used to know it in the US of A is dead. It died about 15 years ago. So forget about restoring the level of privacy that we used to know. It could happen, but it’s going to take mass unrests and a sweeping aside of the present system of government. But the odds of that occurring here is not worth talking about. With time, as more connected technologies become ubiquitous, state-sponsored snooping will be even easier than it is now. The only place you are ever going to enjoy privacy is in your private residence. Even that is not guaranteed.

  • The Deep Web will continue to vex law enforcement’s ability to address widespread cybercrime
  • . Law enforcement agencies have a legitimate job to do. It’s when they begin to operate outside the bounds that society suffers. In that regard, anything that vexes law enforcement as they molest our privacy is ok by me.

One area that the Trend Micro report did not address is desktop Linux. Yes, it’s market share is still small, but by the third quarter of 2014, at least one significant development in PC hardware will lead to a significant increase in that market share. And it will be significant enough to bring in more bad guys launching targeted attacks against the OS.

To learn more about these future security concerns in an interactive manner, visit here.

Share:

Facebook
Twitter
Pinterest
LinkedIn

Partner links

Newsletter: Subscribe for updates

Subscribe
Notify of
guest
5 Comments
Inline Feedbacks
View all comments
Oydenos
Oydenos
10 years ago

And wth is that «one significant development in PC hardware ‹that› will lead to a significant increase in ‹desktop Linux› market share» ?

Oydenos
Oydenos
Reply to  finid
10 years ago

A 3D-printed one? Where do I find the definition fiel?

Oydenos
Oydenos
Reply to  finid
10 years ago

Sorry, but I’am not virtual at all.

SCNR

Get the latest

On social media

Security distros

Hacker
Linux distros for hacking and pentesting

Crypto mining OS

Bitcoin
Distros for mining bitcoin and other cryptocurrencies

Crypto hardware

MSI GeForce GTX 1070
Installing Nvidia GTX 1070 GPU drivers on Ubuntu

Disk guide

LVM
Beginner's guide to disks & disk partitions in Linux

Bash guide

Bash shell terminal
How to set the PATH variable in Bash
Categories
Archives
5
0
Hya, what do you think? Please comment.x
()
x