|
|
ICT-Hotlist Topic
McAfee expects to see the following threat activities in 2015
Published : 2014-12-16.
Last updated : 2017-05-02.
- Cyber espionage: Cyber espionage attacks will continue to increase in frequency. Long-term players will become stealthier
information gatherers while newcomers will look for ways to steal money and disrupt their adversaries.
- Internet of Things: Attacks on the Internet of Things devices will increase rapidly due to hypergrowth in the number of
connected objects, poor security hygiene, and the high value of data on those devices.
- Privacy: Data privacy will remain under attack as governments and businesses continue to grapple with what is fair and
authorized access to imperfectly defined "personal information".
- Ransomware: Ransomware will evolve its methods of propagation, encryption, and the targets it seeks. More mobile devices
will suffer attacks.
- Mobile: Mobile attacks will continue to grow rapidly as new mobile technologies expand the attack surface and little is
done to stop app store abuse.
- Point of sale: Point of sale (POS) attacks will remain lucrative, and a significant upturn in consumer adoption of digital
payment systems on mobile devices will provide new attack surfaces that cybercriminals will exploit.
- Malware beyond Windows: Non-Windows malware attacks will explode, fueled by the Shellshock vulnerability.
- Vulnerabilities: Vulnerabilities will increase as the number of flaws in popular software continues to grow.
- Escaping the sandbox: Escaping the sandbox will become a significant IT security battlefield.
Read the full English report and see the accompanying statistics
here.
Scripts and programming examples disclaimer
Unless stated otherwise, the script sources and programming examples provided are copyrighted freeware.
You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation.
However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data.
Make sure you have verified full backups and the associated restore software available before running any script or programming example.
Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
|