As 2013 draws to a close, it’s time to start looking ahead to next year and years after that. This will form a series of articles on what lies ahead. Most will be about Linux and Free Software, but a few will cover the broader technology landscape.

To kick off the series, I’m borrowing content from Trend Micro, Inc., a security software solutions provider headquartered in Tokyo, Japan.

In a report titled “Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond,” the company gave a list of security issues it thinks will pose the most headache for users, developers and law enforcement in 2014 and beyond. I’ll relist them here and append my comments to a few.
Top security threat 2014

  • “Malicious and high-risk Android apps will reach 3 million.”
  • I don’t know what the actual number is now, but me thinks it will be more than that.

  • “Banking via mobile devices will be compromised by an uptick of Man-in-the-Middle attacks, making two-step verification inadequate.”
  • The battle between the good guys and bad guys is a never-ending one. And as they say in the industry, if you have something that somebody wants to gain access to badly enough, they will keep taking shots at it until they succeed. The question is, when will you know that they have succeeded, during or after?

  • Cybercriminals will increasingly use targeted-attack-type methodologies like open source research and highly customized spear phishing.
  • Targeted attackers will increasingly use advanced threats such as clickjacking and watering hole attacks and target mobile devices.”
  • Lack of support for popular software such as Java 6 and Windows XP will expose millions of PCs to attack.”
  • Then Windows XP users should migrate to desktop Linux. Heck, all Windows users should migrate to desktop Linux. It’s not that Linux is free of malware, but compared to the family of operating system from that company, desktop Linux is clean.

  • Public trust, compromised by revelations of state-sponsored monitoring, will result in a variety of efforts to restore privacy.”
  • In general, privacy as we used to know it in the US of A is dead. It died about 15 years ago. So forget about restoring the level of privacy that we used to know. It could happen, but it’s going to take mass unrests and a sweeping aside of the present system of government. But the odds of that occurring here is not worth talking about. With time, as more connected technologies become ubiquitous, state-sponsored snooping will be even easier than it is now. The only place you are ever going to enjoy privacy is in your private residence. Even that is not guaranteed.

  • The Deep Web will continue to vex law enforcement’s ability to address widespread cybercrime
  • . Law enforcement agencies have a legitimate job to do. It’s when they begin to operate outside the bounds that society suffers. In that regard, anything that vexes law enforcement as they molest our privacy is ok by me.

One area that the Trend Micro report did not address is desktop Linux. Yes, it’s market share is still small, but by the third quarter of 2014, at least one significant development in PC hardware will lead to a significant increase in that market share. And it will be significant enough to bring in more bad guys launching targeted attacks against the OS.

To learn more about these future security concerns in an interactive manner, visit here.

Related Post:  482 of the Top500 supercomputers run Linux, and China's Tianhe-2 is the fastest

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

5 Responses

  1. And wth is that «one significant development in PC hardware ‹that› will lead to a significant increase in ‹desktop Linux› market share» ?

Leave a Reply to Oydenos Cancel reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.