Mobile threats will increase next year, says the security company, with attackers getting more sophisticated
Innovation is usually a positive word, ascribed to the efforts of organizations to improve profitability and productivity.
Regretably, creators of IT threats are expected to be even more innovative in 2014 than they were this year, according to Doug Cooke, director of sales engineering at McAfee Canada.
โAs the technology evolves hackers look at different things,โ he said in an interview as McAfee released its 2014 threat prediction report.
โInstead of a โspray and prayโ approach (to distributing malware) theyโre being much more targetedโ including going after critical infrastructure.
Here are McAfeeโs seven predictions for the coming year:
โAlways ready to follow the money, the bad guys will continue turning their efforts towards mobile malware. It was the fastest growing trend this year, Cooke added. โRansomwareโ โ malware that takes over your device and wonโt let go until you pay for a so-called fix โ will move to mobile operating systems. Also, as near field communications (NFC) โ the capability to swipe a mobile device by a scanner for payment โ spreads, it will increasingly be looked at as an attack vector.
The vehicles will be traditional โ users clicking on a link.
Enterprises should be warned: With an increasing number of mobile devices tolerated within organizations, dealing with mobile-based threats will be something to be prepared for.
โVirtual currencies like bitcoin, ripple, litecoin and others will be โthe vehicle of choice hackers will use when attempting to fleece people of their money โ including through ransomware.
Why? Because digital currencies provide cybercriminals with so-far unregulated and anonymous payment structures.
โโHackers are getting smart,โ Cooke said. When they create a new piece of malware it gets targeted, making it harder for security companies to get examples of it and build a defence. Thatโs one reason why sandbox defences are increasing, he said. Hackers are responding with malware that doesnโt execute in a sandbox, which can defeat an intrusion protection scanner. Malware evasion techniques will be quite sophisticated.
โSocial media-based threats will increase. Think of the botnet on Facebook that scraped up user passwords. Attackers will also increasingly try using Facebook for phishing attacks to get unsuspecting people to click on links for changing passwords or give out personal information. Linkedin will also be a target.
โ HTML 5 is rapidly being used by more organizations for Web-based content. New PC attacks will exploit vulnerabilities created in part by inexperienced coders. And cybercriminals will also go after BIOS systems and storage devices.
โIt wouldnโt be an IT story if cloud computing didnโt get mentioned. Guess what โ cloud based corporate applications will also be increasingly targeted. After all, hypervisors are ubiquitous.
Related Download
Sponsor: Cisco
Cisco Secure Mobility Knowledge Hub
This Knowledge Hub provides an end-to-end look at what it takes to discover, plan, and implement a successful Secure Mobility strategy.
Learn More