McAfee 2013 Threat Predictions Infographic

2013McAfee_ThreatPredictions-PR

 

 

In the coming year, McAfee Labs expects that threats to mobile devices will become even more of a focus of cybercriminals, the influence of the hacktivist group “Anonymous” will decline, and large-scale attacks that attempt to destroy infrastructure will increase.

 

Key predictions:

·      Rapid Evolution and Growth in Mobile Malware: ‘worms’ buying malicious apps and stealing via NFC and ransomware ‘kits’ to extort payment , blocking security updates

·      Covert and persistent attacks deep within and beneath Windows

·      Rapid development of ways to attack Windows 8 and HTML5

·      Large-scale attacks like Stuxnet that attempt to destroy infrastructure, rather than make money

·      Malware that renews a connection even after a botnet has been taken down, allowing infections to grow again

·      SMS spam from infected phones. What’s your mother trying to sell you now?

·      “Hacking as a Service”: Anonymous sellers and buyers in underground forums exchange malware kits  and development services for money

·      The decline of online hacktivists Anonymous, to be replaced by more politically committed or  extremist groups

·      Nation states and armies will be more frequent sources and victims of cyberthreats

 

For South East Asia:

“Especially for the fast growing economies in South East Asia with exponential mobile device use, these predictions reflect real challenges for businesses here,” said Wahab Yusoff, Vice President for South Asia, McAfee. “With the quickly changing threat landscape, we are confident however, that together with our partners in the region, we are very well positioned to deliver best-in-breed technology combined with local market understanding, offering the most effective and efficient security protection solutions available.”

 

 

Based on recent threat trends (based on McAfee’s Q2 and Q3 2012 Threat Reports):

·  This region is no bystander any more – it develops rapidly in terms of threat origins and targets:

o    Some global cyber attacks have their roots in this region –  not only in the economic powerhouses like China, India or Japan, but also in emerging markets like Malaysia or Vietnam

o    South East Asian countries like Indonesia are among the top global victims for server exploit kits like e.g. “Blackhole” – tieing the US for global top spot!

Subscribe / Share

Article by Mohd Hisham

Focus on technology, HIV/AIDS Awareness, Dementia and supporting several other social causes. Write mostly about the independent Arts scene in Singapore as well as the general works as organized by the various government bodies. Has a fascination with photography and indulge in a little mix of video editing. Very keen on living the social media experience without going over the top.
Mohd Hisham tagged this post with: , , Read 398 articles by

Leave a Reply

Follow me on Twitter

%d bloggers like this: