Top cyber security concerns for 2014 and beyond

As 2013 draws to a close, it’s time to start looking ahead to next year and years after that. This will form a series of articles on what lies ahead. Most will be about Linux and Free Software, but a few will cover the broader technology landscape.

To kick off the series, I’m borrowing content from Trend Micro, Inc., a security software solutions provider headquartered in Tokyo, Japan.

In a report titled “Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond,” the company gave a list of security issues it thinks will pose the most headache for users, developers and law enforcement in 2014 and beyond. I’ll relist them here and append my comments to a few.
Top security threat 2014

  • “Malicious and high-risk Android apps will reach 3 million.”
  • I don’t know what the actual number is now, but me thinks it will be more than that.

  • “Banking via mobile devices will be compromised by an uptick of Man-in-the-Middle attacks, making two-step verification inadequate.”
  • The battle between the good guys and bad guys is a never-ending one. And as they say in the industry, if you have something that somebody wants to gain access to badly enough, they will keep taking shots at it until they succeed. The question is, when will you know that they have succeeded, during or after?

  • Cybercriminals will increasingly use targeted-attack-type methodologies like open source research and highly customized spear phishing.
  • Targeted attackers will increasingly use advanced threats such as clickjacking and watering hole attacks and target mobile devices.”
  • Lack of support for popular software such as Java 6 and Windows XP will expose millions of PCs to attack.”
  • Then Windows XP users should migrate to desktop Linux. Heck, all Windows users should migrate to desktop Linux. It’s not that Linux is free of malware, but compared to the family of operating system from that company, desktop Linux is clean.

  • Public trust, compromised by revelations of state-sponsored monitoring, will result in a variety of efforts to restore privacy.”
  • In general, privacy as we used to know it in the US of A is dead. It died about 15 years ago. So forget about restoring the level of privacy that we used to know. It could happen, but it’s going to take mass unrests and a sweeping aside of the present system of government. But the odds of that occurring here is not worth talking about. With time, as more connected technologies become ubiquitous, state-sponsored snooping will be even easier than it is now. The only place you are ever going to enjoy privacy is in your private residence. Even that is not guaranteed.

  • The Deep Web will continue to vex law enforcement’s ability to address widespread cybercrime
  • . Law enforcement agencies have a legitimate job to do. It’s when they begin to operate outside the bounds that society suffers. In that regard, anything that vexes law enforcement as they molest our privacy is ok by me.

One area that the Trend Micro report did not address is desktop Linux. Yes, it’s market share is still small, but by the third quarter of 2014, at least one significant development in PC hardware will lead to a significant increase in that market share. And it will be significant enough to bring in more bad guys launching targeted attacks against the OS.

To learn more about these future security concerns in an interactive manner, visit here.

Related Post:  Why is this guy betting on Julia?

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer run network ads?  Yep, no more ads from the usual suspects that track and annoy you across the Internet. But since I still need to pay to keep the site running, feel free to make a small donation by PayPal or your favorite cryptocurrency.

  • Bitcoin
  • Ethereum
  • Xrp
  • Bitcoin cash
  • Bitcoin sv
  • Litecoin
  • Binance coin
  • Cardano
  • Ethereum classic
Scan to Donate Bitcoin to bc1qzvlte2m224zkayhdc7fdfjkp2rsgt0l5a496ua

Donate Bitcoin to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin

Scan to Donate Ethereum to 0x0F4362DFF77F3Ba0Dc637F5f3Eba35D09a2fA60C

Donate Ethereum to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum

Scan to Donate Xrp to r4ggjvL36njsMCYTkJ3S7cTHscPsMsSGQv

Donate Xrp to this address

Scan the QR code or copy the address below into your wallet to send some Xrp

Scan to Donate Bitcoin cash to qrs0dedzp9t55af3nfwypydghp29r0xguy9s20fz2k

Donate Bitcoin cash to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin cash

Scan to Donate Bitcoin sv to 15K9TLyVDBtLuG9cYvXCX9SSkq9C9oUKHK

Donate Bitcoin sv to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin sv

Scan to Donate Litecoin to LetJ9QQMb7u2LMZ9Tu6rtHwcBcQFW98fbG

Donate Litecoin to this address

Scan the QR code or copy the address below into your wallet to send some Litecoin

Scan to Donate Binance coin to bnb1ga8trq08ssqepd90v6225nzfgy448pu5pw8gxp

Donate Binance coin to this address

Scan the QR code or copy the address below into your wallet to send some Binance coin

Scan to Donate Cardano to addr1qx2354yw49etstfljpdhwja3ajjlt487lg95vu9ngy2q6vu4rf2ga2tjhqknlyzmwa9mrm997h20a7stgectxsg5p5esq5l7d9

Donate Cardano to this address

Scan the QR code or copy the address below into your wallet to send some Cardano

Scan to Donate Ethereum classic to 0xcD6CC972a2297FcafACDcfE042C55C69516a9264

Donate Ethereum classic to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum classic

Subscribe for updates. Trust me, no spam!

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

Upcoming events

5 Responses

  1. And wth is that «one significant development in PC hardware ‹that› will lead to a significant increase in ‹desktop Linux› market share» ?

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.