Security Trends 2015: Developments in Exploits and Evasion

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Security Trends 2015: Developments in Exploits and Evasion-3 Next

Internet of Things

Greater Internet of Things attack frequency, profitability, and severity. Unless security controls are built in to their architectures from the beginning, the rush to deploy IoT devices at scale will outpace the priorities of security and privacy. This rush and the increasing value of data gathered, processed, and shared by these devices will draw the first notable IoT paradigm attacks in 2015.

  • The increasing proliferation of IoT devices in environments such as health care could provide malicious parties access to personal data even more valuable than credit card data. For instance, according to the McAfee Labs report entitled Cybercrime Exposed: Cybercrime-as-a-Service, the cyber crime community currently values stolen health credentials at around $10 each, which is about 10 to 20 times the value of a stolen U.S. credit card number.

2014 was by far one of the worst years for cybersecurity exploits in history. It seemed that news outlets were reporting a new major data breach every few days. And while breaches affecting Target, Home Depot, Sony and others grabbed the headlines, organizations across the world were being attacked on a continual basis. McAfee Labs reported in December that during the third quarter of 2014, it had detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent, and overall malware surging by a whopping 76 percent year over year.

So what can we expect in 2015? McAfee Labs predicts that malicious parties will focus on extended targeted attack campaigns, and will become more aggressive in their efforts to identify application, operating system, and network vulnerabilities – while working to break through the limitations of sandboxing technologies.

"The year 2014 will be remembered as 'the Year of Shaken Trust,'" said Vincent Weafer, senior vice president, McAfee Labs, part of Intel Security. "This unprecedented series of events shook industry confidence in long-standing Internet trust models, consumer confidence in organizations' abilities to protect their data, and organizations' confidence in their ability to detect and deflect targeted attacks in a timely manner. Restoring trust in 2015 will require stronger industry collaboration, new standards for a new threat landscape, and new security postures that shrink time-to-detection through the superior use of threat data. Ultimately, we need to get to a security model that's built-in by design, seamlessly integrated into every device at every layer of the compute stack."

This slideshow features the top nine security trends McAfee has identified for 2015.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.