DROP US AN ENQUIRY / FEEDBACK

  • Name

  • Email

  • Company

  • Contact no.

Message

CAPTCHA Image   Reload Image
Enter Code*:

Thank you for your enquiry, we will get back to you shortly

Latest news 16 Aug 2016 - ACA Pacific Appointed by Autodesk as Regional Value Added Distributor
Latest news 14 Jul 2016 - Progress Named a Visionary in Gartner 2016 Magic Quadrant for Mobile App Development Platforms
Latest news 10 Aug 2016 - Autodesk Industry Collections Now Available Worldwide
Latest news 10 Aug 2016 - Ten Big Reasons to Scan Wirelessly in Pharmaceuticals & Healthcare
Latest news 09 Aug 2016 - Eaton’s Expanded Series of FD85 Thread to Connect Couplings Provides Additional Sizes for Reliable Connections in Oil and Gas A
Latest news 12 Jan 2017 - ACA Pacific Technology launches Alcatel-Lucent Enterprise Solutions across Asia Pacific

Mobile Threats, Clickjacking and Watering Hole Attacks to Make 2014 a Busy Year in Security

Watering hole attacks, clickjacking and mobile threats will all loom large in 2014, with cyber criminals increasingly using targeted attack methodologies in their campaigns and hiding themselves in the Deep Web, according to Trend Micro. The internet security firm's predictions for 2014 echo its recent forward-looking web video project, 2020: the Series, which took a ground-breaking look at what threats may face us at the end of the decade.

In the nearer term, 2014 promises to be a "prolific year for cybercrime", impacting businesses, governments and individuals alike, according to Trend Micro CTO Raimund Genes.

Techniques like open source research and spear phishing which are normally limited to targeted attacks will become increasingly popular next year as the cyber underground shares best practice knowledge.

When it comes to targeted attacks, we'll see more watering hole attacks – where victims are lured to an infected site with social engineering – and clickjacking in the on-going race to compromise machines.

Mobile threats have been building for some time now, and in 2014 these smart devices will be under fire from both targeted attacks and mobile banking, where basic two-step verification is no longer sufficient to stay safe. Man-in-the-middle attacks and malicious apps will pose a growing threat to consumers and corporate smartphone users.

"Technology advances only more rapidly and attackers are consistently just behind the crest of that innovation, waiting for widespread consumer adoption of new gadgets, new platforms or new ways of doing things", said Rik Ferguson, VP of security research at Trend Micro. "Mobile banking apps have only recently become the norm (as opposed to simply receiving an authorization code via SMS) and we fully expect to see criminals looking for avenues of exploitation, particularly given the direct relationship to finances. Other emerging technologies, such as the AR headsets expected to be released by multiple manufacturers over the coming 12 months will need also to reach this tipping point before widespread attacks begin. However, given the wide-ranging data collection possibilities and their highly interconnected nature, long-term these devices will be firmly in the criminal sights."

In fact, cyber criminals will use any means possible to infiltrate networks and steal valuable data. This means wearable technology such as smart watches could be at risk in 2014. It will also mean a pick-up in attacks on software like Windows XP and Java 6 as they become unsupported. Embedded systems like point-of-sale (PoS) terminals, healthcare devices, and critical infrastructure, running old and unsupported Windows versions are particularly at risk.

Major data breaches will continue in 2014, averaging one every month, but the perpetrators will get even better at hiding themselves in the Deep Web with tools like TOR.

Law enforcers will have a harder time tracking down these cyber criminals next year as they burrow even deeper into the darknet. One area where we're not likely to see any widespread threats next year is the emerging "Internet of Things" (IoT), mainly because it is still developing. Cyber criminals are likely waiting for a killer IoT app to exploit and as yet one has not emerged.

Beyond 2014, however, augmented reality headsets could become the next big thing for the cyber underground to target. The built-in camera, for example, could be hacked and used to spy on a victim, extracting sensitive personal information like online log-ins and banking PINs.

Expect isolated attacks in this area to begin in as little as a couple of years.

About Trend Micro
Trend Micro Incorporated (TYO: 4704), a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

Link: http://www.trendmicro.co.uk/newsroom/pr/mobile-threats-clickjacking-and-watering-hole-attacks-to-make-a-busy-year-in-security/

For more details you may contact
Benjamin Chu  |  03-7803 4600  |  benjamin.chu@acapacific.com.my

Product Search

 

Contact Us

  • ACA Pacific Technology (M) Sdn Bhd
  • + 60 (3) 7803 4600
  • + 60 (3) 7804 6017
  • Penang Office
  • + 60 (4) 619 2593
  • + 60 (4) 619 2693

Events

Our Vendor Profile

vendorprofile