Top cyber security concerns for 2014 and beyond

As 2013 draws to a close, it’s time to start looking ahead to next year and years after that. This will form a series of articles on what lies ahead. Most will be about Linux and Free Software, but a few will cover the broader technology landscape.

To kick off the series, I’m borrowing content from Trend Micro, Inc., a security software solutions provider headquartered in Tokyo, Japan.

In a report titled “Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond,” the company gave a list of security issues it thinks will pose the most headache for users, developers and law enforcement in 2014 and beyond. I’ll relist them here and append my comments to a few.
Top security threat 2014

  • “Malicious and high-risk Android apps will reach 3 million.”
  • I don’t know what the actual number is now, but me thinks it will be more than that.

  • “Banking via mobile devices will be compromised by an uptick of Man-in-the-Middle attacks, making two-step verification inadequate.”
  • The battle between the good guys and bad guys is a never-ending one. And as they say in the industry, if you have something that somebody wants to gain access to badly enough, they will keep taking shots at it until they succeed. The question is, when will you know that they have succeeded, during or after?

  • Cybercriminals will increasingly use targeted-attack-type methodologies like open source research and highly customized spear phishing.
  • Targeted attackers will increasingly use advanced threats such as clickjacking and watering hole attacks and target mobile devices.”
  • Lack of support for popular software such as Java 6 and Windows XP will expose millions of PCs to attack.”
  • Then Windows XP users should migrate to desktop Linux. Heck, all Windows users should migrate to desktop Linux. It’s not that Linux is free of malware, but compared to the family of operating system from that company, desktop Linux is clean.

  • Public trust, compromised by revelations of state-sponsored monitoring, will result in a variety of efforts to restore privacy.”
  • In general, privacy as we used to know it in the US of A is dead. It died about 15 years ago. So forget about restoring the level of privacy that we used to know. It could happen, but it’s going to take mass unrests and a sweeping aside of the present system of government. But the odds of that occurring here is not worth talking about. With time, as more connected technologies become ubiquitous, state-sponsored snooping will be even easier than it is now. The only place you are ever going to enjoy privacy is in your private residence. Even that is not guaranteed.

  • The Deep Web will continue to vex law enforcement’s ability to address widespread cybercrime
  • . Law enforcement agencies have a legitimate job to do. It’s when they begin to operate outside the bounds that society suffers. In that regard, anything that vexes law enforcement as they molest our privacy is ok by me.

One area that the Trend Micro report did not address is desktop Linux. Yes, it’s market share is still small, but by the third quarter of 2014, at least one significant development in PC hardware will lead to a significant increase in that market share. And it will be significant enough to bring in more bad guys launching targeted attacks against the OS.

To learn more about these future security concerns in an interactive manner, visit here.

Related Posts

Arduino Leonardo Touch Board makes any project interactive Touch Board is an Arduino-compatible device from Bare Conductive Ltd, a technology outfit based in London, UK. A simple device powered by an Arduin...
Qualcomm to Demonstrate New Peer-to-Peer Technology Reflecting its continuing research and development into new connectivity models, Qualcomm Incorporated will demonstrate its newest advancement in peer...
Another one bites the dust, and goes open source According to an old saying, when the going gets tough, the tough gets going. That, however, does not seem to apply in the proprietary software busines...
Hyper-Texting and Hyper-Networking Pose New Health Risks for Teens Texting while driving can be a deadly combination for anyone. Yet, new data reveal that the dangers of excessive texting among teens are not limited t...
Crowdfunding Piwik 2.0 Piwik is a Free Software Web analytics application. If you run a website, it is what you use when you do not want to use Google Analytics or any other...
Should Truecrypt be audited? Truecrypt is a cross-platform, free disk encryption software for Windows and Unix-like operating systems. It is generally considered a good disk encry...

We Recommend These Vendors

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).


5 Comments

  1. And wth is that «one significant development in PC hardware ‹that› will lead to a significant increase in ‹desktop Linux› market share» ?

Leave a Comment

Your email address will not be published. Required fields are marked *

*