In the murky tech depths of 2013
In
the wake of rising threats, it is important for everyone to be geared for the
new cyber challenges that would arise in 2013
Targeted Attacks
The last year saw an increased growth in targeted attacks that proved successful in disrupting service and fraudulently obtaining significant amounts of intellectual property. Cyber Criminals will continue to use this method and as a result, in 2013, we are likely to see significantly more targeted attacks and targeted malware.
One disturbing development in this trend across 2012 was that we started to see more targeted attacks that also destroyed evidence of the attack afterwards and we are likely to see this continue.
This type of attack is more difficult to protect against. Protecting against this will be a major challenge – particularly for enterprises and governments.
Signed malware
Signed malware was prevalent in 2012 and this is likely to continue. Signed malware is present when a hacker obtains a digital certificate from a user and appends it to malware, allowing the malware to pass through an OS.
Stuxnet is a high profile example of this threat. There will be a large increase in this type of threat and it will be harder to stop because it appears more legitimate.
Non-Windows attacks
We suspect non-Windows attacks will continue to increase in 2013. Android devices are now the highest selling mobile devices and hackers will take advantage that by developing mobile malware.
Ransomware
Ransomware is operated by encrypting files on a victim’ computer which can only be unlocked by paying the criminals a ‘fine’. It has been a big issue in other countries around the world in the past.
Connected Devices
We also anticipate the growth in number of new connected devices that will provide additional gateways for hackers to access networks – these include connected homes and cars. While the home or car may not be hacked, they are used as a way to access other networks.
Jagdish Mahapatra is the Managing
Director for McAfee India & SAARC
MM130101
No comments:
Post a Comment