Security Trends 2015: Developments in Exploits and Evasion

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Security Trends 2015: Developments in Exploits and Evasion-9 Next

Software Flaws

Growing exploitation of software flaws. The exploitation of vulnerabilities is likely to increase as new flaws are discovered in popular software products.

  • McAfee Labs predicts that exploitation techniques such as stack pivoting, return- and jump-oriented programming, and a deeper understanding of 64-bit software will continue to drive the growth in the number of newly discovered vulnerabilities, as will the volume of malware that exploits those newly discovered vulnerabilities.

2014 was by far one of the worst years for cybersecurity exploits in history. It seemed that news outlets were reporting a new major data breach every few days. And while breaches affecting Target, Home Depot, Sony and others grabbed the headlines, organizations across the world were being attacked on a continual basis. McAfee Labs reported in December that during the third quarter of 2014, it had detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent, and overall malware surging by a whopping 76 percent year over year.

So what can we expect in 2015? McAfee Labs predicts that malicious parties will focus on extended targeted attack campaigns, and will become more aggressive in their efforts to identify application, operating system, and network vulnerabilities – while working to break through the limitations of sandboxing technologies.

"The year 2014 will be remembered as 'the Year of Shaken Trust,'" said Vincent Weafer, senior vice president, McAfee Labs, part of Intel Security. "This unprecedented series of events shook industry confidence in long-standing Internet trust models, consumer confidence in organizations' abilities to protect their data, and organizations' confidence in their ability to detect and deflect targeted attacks in a timely manner. Restoring trust in 2015 will require stronger industry collaboration, new standards for a new threat landscape, and new security postures that shrink time-to-detection through the superior use of threat data. Ultimately, we need to get to a security model that's built-in by design, seamlessly integrated into every device at every layer of the compute stack."

This slideshow features the top nine security trends McAfee has identified for 2015.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.