Please wait,
Processing your request...

  Business logo
  ... | Selecteer de Nederlandse taal |
Sharing is caring
| Print this page. | Linkedin page of Johan van Soest

React: Postcard image. Click this to mail to Johan


ICT-Hotlist Topic

McAfee expects to see the following threat activities in 2015

  • Cyber espionage: Cyber espionage attacks will continue to increase in frequency. Long-term players will become stealthier information gatherers while newcomers will look for ways to steal money and disrupt their adversaries.
  • Internet of Things: Attacks on the Internet of Things devices will increase rapidly due to hypergrowth in the number of connected objects, poor security hygiene, and the high value of data on those devices.
  • Privacy: Data privacy will remain under attack as governments and businesses continue to grapple with what is fair and authorized access to imperfectly defined "personal information".
  • Ransomware: Ransomware will evolve its methods of propagation, encryption, and the targets it seeks. More mobile devices will suffer attacks.
  • Mobile: Mobile attacks will continue to grow rapidly as new mobile technologies expand the attack surface and little is done to stop app store abuse.
  • Point of sale: Point of sale (POS) attacks will remain lucrative, and a significant upturn in consumer adoption of digital payment systems on mobile devices will provide new attack surfaces that cybercriminals will exploit.
  • Malware beyond Windows: Non-Windows malware attacks will explode, fueled by the Shellshock vulnerability.
  • Vulnerabilities: Vulnerabilities will increase as the number of flaws in popular software continues to grow.
  • Escaping the sandbox: Escaping the sandbox will become a significant IT security battlefield.
Read the full English report and see the accompanying statistics here.
You may vote your opinion about this article:

Scripts and programming examples disclaimer

Unless stated otherwise, the script sources and programming examples provided are copyrighted freeware. You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation. However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data. Make sure you have verified full backups and the associated restore software available before running any script or programming example. Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
Generated by WebHalla™ Version 0.1.e.7 : Thursday 30-5-2024 © Copyright 1995-2024 ing. Johan P.G. van Soest CIPM Certified Privacy Information Manager
Response Form    Cookie- and Privacy statement    Responsible Disclosure procedure
Weather in Waalre by OpenWeatherMap logo broken clouds
Temperature 14.42 °C broken clouds
Wind chill 14.29 °C broken clouds
Humidity 91 % broken clouds
Air pressure 1006 hPa broken clouds
Wind speed 2.57 m/s broken clouds
Wind direction South West South West broken clouds
Sun Rise 5:28 Sun Rise
Sun Set 21:43 Sun Set
Updated:2024-05-30 09:07:04 broken clouds

Weather Cache is 4 minute(s) old.
| Current user: Guest | Login |