SlideShare a Scribd company logo
1 of 5
Download to read offline
www.cyberoam.com I sales@cyberoam.com
2014 - A Security View-point
With a careful analysis of security and IT trends in the most recent past and a strong foresight
that comes from years of industry experience and intelligent extrapolation of the past and the
present, Cyberoam brings to you Security Predictions for 2014.
“Client-side
software
exploits” –
it will be!
Attacks on
Industrial Control
Systems & SCADA
systems to continue
Context-Aware
security – the saviour
of rising mobility
Security of
Hybrid Cloud
Browser-based
attacks are still hot!
Mobiles still
remain a darling of
malware attackers
01
02
03
04
05
06
07
08
09
10
New exploit kits will be
explored and used
Attack vectors to
get more intelligent
“Internet of Things”
adds Security risks for
home devices
Windows users at risk as Windows XP
comes to end-of-life
Attacks in 2013 have left us with one clear picture – the rising sophistication and
professionalism among attackers. In times to come, Cyberoam predicts attacks,
wherein the attackers will get more specific, both in terms of their objective and
attack strategies. Gone are the days when attacks were meant for the masses.
Attackers nowknowwhom and howtheywould attackand theyarechangingtheir
attackstrategiestohitstraightonthebull's-eyeratherthanshootinginthedark.In
addition to this, few attacks from 2013 indicate the evolution of attacks including
proven components from already-used attacks, combined to form more
detrimentalattacks.
Attack vectors to get more intelligent
The amplified impact that an attack on Industrial Control Systems (ICS) can cause,
justifies the interest attackers have on such systems. ICS/SCADA system attacks can
cause catastrophic damage not only to a single unit but at times to an entire
country/province. It is the spread of impact compounded with lack of adequate
security available in such systems that have made ICS/SCADA networks a lucrative
target for attackers. As per statistics, there were 198 cyber attacks in 2012 and the
numbersincreasedto240in2013.Cyberoampredictsfurtherriseinsuchattackson
ICS/SCADAnetworksin2014andbeyond.
Attacks on Industrial Control Systems &
SCADA systems to continue
“Client-side software exploits” – it will be!
Cyberoam Threat Research Labs foresees an increase in Client-side software
exploits compared to the Server-side in next few years. 2013 has seen numerous
such exploits where base client software like Microsoft and Adobe were exploited
to spread the attack vectors across the network. The recent Microsoft advisories
indicating client side exploits also support this prediction. Reasons for this hike
include increased scope of exploitation with increase in attack vectors, higher base
of users who use these softwares, and lastly, the money involved in it. The exploit
kits used to exploit server side vulnerabilities cost much less than client side exploit
kits, indicating the premium the latter demand. Realizing that client side exploits
will bring in more money, the focus on exploiting client-side vulnerabilities will
increasetoo!
With increase in number of security features or solutions in an organization's
network to tackle emerging security risks, the job of security professionals is
getting more complex. With rising number of devices, users and applications to
monitor, this becomes even more difficult. The volume of data that the security
appliance(s) offer on various parameters is becoming a problem for network
administrators, presenting a need for context-aware security that enables faster
decision making and action with the security intelligence it offers. Cyberoam
predicts an increase in demand for context-aware security for 2014. The rising
needincontext-awaresecuritygoesincontinuationwithCyberoam'spredictionin
2013regardingtheriseinneedforUserThreatQuotient&DeviceThreatQuotient.
Increase in need for Context-Aware security
Inagenerationofincreasedmobilitywheretabletsandsmartdevicesaredisplacing
desktops and paper-based processes, more users are turning to Cloud, specifically
the Hybrid Cloud, as it offers more efficiency, business optimization, access to real-
time data and always-on availability. However, the ability of Hybrid clouds to burst
into the public cloud space when necessary is bringing up security concerns.
Although this capability is particularly useful to organisations, it may be a call for
danger and users and security vendors are realizing this. Cyberoam predicts an
increaseindemandforsecurityinHybridCloudenvironments.
Security of Hybrid Cloud
New exploit kits will be explored and used
Use of Blackhole exploit kit for attacks is a known fact. It is no secret that it was used
extensively for attacks in the past. But with the arrest of 'Paunch' in 2013, the man
behind the Blackhole exploit kit, new exploit kits are slowly showing up. In addition
to this, as attacks utilising Blackhole exploit kit have been exposed, it emerges as a
need among attackers to come up with new ways to target their victims. Also, with
recenttrends showingriseinexploitsbased on clientsidevulnerabilities,Cyberoam
predictsthatthismenaceisonlygoingtoaggravate.
Increasing base of smartphone users is a primary reason for attackers to find
interest in attacking those devices. In addition to this, users use their personal
devices to access work emails and connect to company networks, which
aggravates this interest further. Applications are the backbones of smart phones
and most of the mobile apps lack adequate security, adding to the misery of
security on mobile devices. All of these factors collate to increase the interest
attackers have in smart devices. 2014 is sure to experience newer and sharper
mobilethreats.
Mobiles still remain a darling of malware
attackers and exploits
IOT- 'Internet of Things' is something we all are waking up to, these days. Everything
seems to be on the Internet! Right from our work to social lives, and storage needs,
Internet has also opened its doors to home devices now! As more and more home
devices get connected to the Internet, it is obvious that attackers will soon find their
way through them too. Cyberoam predicts a rise in need for security solutions for
home devices, besides your office devices. Because one thing is evident – the level
of risk and quantum of vulnerability is similar, irrespective of whether the device
residesinyourhomeorinyourofficenetwork.
“Internet of Things” adds Security risks for
home devices
Browser-based attacks are still hot!
In a bait to achieve sure-shot infection and victimize users, use of browser-based
attacks like Water hole will further rise. This will include a rise in exploitation of
browser vulnerabilities and also use of malicious websites. Attackers will continue
totargetusersbydirectingthemtotrustedandcommonlyvisitedURLswhichwould
be infected with malicious codes. Water hole mechanism includes cyber offenders
infecting websites that are frequently visited by their targets. In 2013, many have
already agreed on the rise seen in watering holes. In fact a lot of hackers that were
usingspearphishingattackstotargetusershavealsostartedusingwateringholes.
Windows users at risk as Windows XP
comes to end-of-life
As Microsoft decides to stop supporting Windows XP after 8th April 2014, users will
need to upgrade to newer Windows versions, and so will the attackers shift their
focus to these versions. Moreover, users who still continue to use Windows XP, will
nothavetheirvulnerabilitiespatched,leavingthemopentoexploits.
www.cyberoam.com I sales@cyberoam.com Copyright © 1999-2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved
Toll Free Numbers
USA : +1-800-686-2360 | India : 1-800-301-00013
APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958
CERTIFIED
VPNC
Interop
Basic
AES
Interopwww.check-mark.com
SSL Advanced
Network Extension
SSL Basic
Network Extension
SSL
JavaScript
SSL
Firefox
SSL
Exchange
SSL
Portal
CERTIFIED
VPNC
AboutCyberoamTechnologiesPrivateLimited
Cyberoam Technologies Private Limited is a global Network Security appliances company, offering future-ready
security solutions to physical and virtual networks in organizations with its Next-Generation Firewalls (NGFWs) and
Unified Threat Management (UTM) appliances. Cyberoam network security appliances offer multiple security
features like stateful inspection firewall, Application Visibility & Control, Web Filtering, VPN, Intrusion Prevention
System, Gateway Anti-Virus, Gateway Anti-Spam, Web Application Firewall, Bandwidth Management and Multiple
Link Management over these appliances, depending on the need of organizations. The virtual and hardware
Cyberoam Central Console appliances offer Centralized Security Management options to organizations, while
Cyberoam iView allows intelligent logging and reporting with one-of-their-kind, in-depth reports. Cyberoam is
accredited with prestigious global standards and certifications like EAL4+, CheckMark UTM Level 5 Certification,
ICSALabs,IPv6Goldlogo,andisamemberoftheVirtualPrivateNetworkConsortium.Formoreinformation,please
visitwww.cyberoam.com
For more news and updates on latest security trends, Subscribe to Cyberoam blogs at www.cyberoam.com/blogs

More Related Content

What's hot

IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAdvanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAvinash Sinha
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? CypSec - Siber Güvenlik Konferansı
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification courseNishaPaunikar1
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerIBM Security
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsCraig Walker, CISSP
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoTIRJET Journal
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 

What's hot (20)

IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
188
188188
188
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAdvanced Phishing The Art of Stealing
Advanced Phishing The Art of Stealing
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 

Similar to Security_prediction_2014

Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictionsPrayukth K V
 
Top cyber security trends for 2014
Top cyber security trends for 2014Top cyber security trends for 2014
Top cyber security trends for 2014Abdullah Al-Ghamdi
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfMobibizIndia1
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014- Mark - Fullbright
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 

Similar to Security_prediction_2014 (20)

Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictions
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Top cyber security trends for 2014
Top cyber security trends for 2014Top cyber security trends for 2014
Top cyber security trends for 2014
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 

More from Truong Minh Yen

Southeast Asia Digital 2015
Southeast Asia Digital 2015Southeast Asia Digital 2015
Southeast Asia Digital 2015Truong Minh Yen
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Truong Minh Yen
 
DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)
DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)
DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)Truong Minh Yen
 
2014 asia pacific digital overview
2014 asia pacific digital overview2014 asia pacific digital overview
2014 asia pacific digital overviewTruong Minh Yen
 
Product presentation retail_2013_eng
Product presentation retail_2013_engProduct presentation retail_2013_eng
Product presentation retail_2013_engTruong Minh Yen
 
Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Truong Minh Yen
 

More from Truong Minh Yen (10)

Sitram brand book
Sitram brand bookSitram brand book
Sitram brand book
 
Sach trang 2017
Sach trang 2017Sach trang 2017
Sach trang 2017
 
Comodo 2017 report
Comodo 2017 reportComodo 2017 report
Comodo 2017 report
 
Comodo_Vietnam_Overview
Comodo_Vietnam_OverviewComodo_Vietnam_Overview
Comodo_Vietnam_Overview
 
Southeast Asia Digital 2015
Southeast Asia Digital 2015Southeast Asia Digital 2015
Southeast Asia Digital 2015
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3
 
DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)
DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)
DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)
 
2014 asia pacific digital overview
2014 asia pacific digital overview2014 asia pacific digital overview
2014 asia pacific digital overview
 
Product presentation retail_2013_eng
Product presentation retail_2013_engProduct presentation retail_2013_eng
Product presentation retail_2013_eng
 
Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Panda security corporate_presentation_2012
Panda security corporate_presentation_2012
 

Recently uploaded

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Security_prediction_2014

  • 1. www.cyberoam.com I sales@cyberoam.com 2014 - A Security View-point With a careful analysis of security and IT trends in the most recent past and a strong foresight that comes from years of industry experience and intelligent extrapolation of the past and the present, Cyberoam brings to you Security Predictions for 2014. “Client-side software exploits” – it will be! Attacks on Industrial Control Systems & SCADA systems to continue Context-Aware security – the saviour of rising mobility Security of Hybrid Cloud Browser-based attacks are still hot! Mobiles still remain a darling of malware attackers 01 02 03 04 05 06 07 08 09 10 New exploit kits will be explored and used Attack vectors to get more intelligent “Internet of Things” adds Security risks for home devices Windows users at risk as Windows XP comes to end-of-life
  • 2. Attacks in 2013 have left us with one clear picture – the rising sophistication and professionalism among attackers. In times to come, Cyberoam predicts attacks, wherein the attackers will get more specific, both in terms of their objective and attack strategies. Gone are the days when attacks were meant for the masses. Attackers nowknowwhom and howtheywould attackand theyarechangingtheir attackstrategiestohitstraightonthebull's-eyeratherthanshootinginthedark.In addition to this, few attacks from 2013 indicate the evolution of attacks including proven components from already-used attacks, combined to form more detrimentalattacks. Attack vectors to get more intelligent The amplified impact that an attack on Industrial Control Systems (ICS) can cause, justifies the interest attackers have on such systems. ICS/SCADA system attacks can cause catastrophic damage not only to a single unit but at times to an entire country/province. It is the spread of impact compounded with lack of adequate security available in such systems that have made ICS/SCADA networks a lucrative target for attackers. As per statistics, there were 198 cyber attacks in 2012 and the numbersincreasedto240in2013.Cyberoampredictsfurtherriseinsuchattackson ICS/SCADAnetworksin2014andbeyond. Attacks on Industrial Control Systems & SCADA systems to continue “Client-side software exploits” – it will be! Cyberoam Threat Research Labs foresees an increase in Client-side software exploits compared to the Server-side in next few years. 2013 has seen numerous such exploits where base client software like Microsoft and Adobe were exploited to spread the attack vectors across the network. The recent Microsoft advisories indicating client side exploits also support this prediction. Reasons for this hike include increased scope of exploitation with increase in attack vectors, higher base of users who use these softwares, and lastly, the money involved in it. The exploit kits used to exploit server side vulnerabilities cost much less than client side exploit kits, indicating the premium the latter demand. Realizing that client side exploits will bring in more money, the focus on exploiting client-side vulnerabilities will increasetoo!
  • 3. With increase in number of security features or solutions in an organization's network to tackle emerging security risks, the job of security professionals is getting more complex. With rising number of devices, users and applications to monitor, this becomes even more difficult. The volume of data that the security appliance(s) offer on various parameters is becoming a problem for network administrators, presenting a need for context-aware security that enables faster decision making and action with the security intelligence it offers. Cyberoam predicts an increase in demand for context-aware security for 2014. The rising needincontext-awaresecuritygoesincontinuationwithCyberoam'spredictionin 2013regardingtheriseinneedforUserThreatQuotient&DeviceThreatQuotient. Increase in need for Context-Aware security Inagenerationofincreasedmobilitywheretabletsandsmartdevicesaredisplacing desktops and paper-based processes, more users are turning to Cloud, specifically the Hybrid Cloud, as it offers more efficiency, business optimization, access to real- time data and always-on availability. However, the ability of Hybrid clouds to burst into the public cloud space when necessary is bringing up security concerns. Although this capability is particularly useful to organisations, it may be a call for danger and users and security vendors are realizing this. Cyberoam predicts an increaseindemandforsecurityinHybridCloudenvironments. Security of Hybrid Cloud New exploit kits will be explored and used Use of Blackhole exploit kit for attacks is a known fact. It is no secret that it was used extensively for attacks in the past. But with the arrest of 'Paunch' in 2013, the man behind the Blackhole exploit kit, new exploit kits are slowly showing up. In addition to this, as attacks utilising Blackhole exploit kit have been exposed, it emerges as a need among attackers to come up with new ways to target their victims. Also, with recenttrends showingriseinexploitsbased on clientsidevulnerabilities,Cyberoam predictsthatthismenaceisonlygoingtoaggravate.
  • 4. Increasing base of smartphone users is a primary reason for attackers to find interest in attacking those devices. In addition to this, users use their personal devices to access work emails and connect to company networks, which aggravates this interest further. Applications are the backbones of smart phones and most of the mobile apps lack adequate security, adding to the misery of security on mobile devices. All of these factors collate to increase the interest attackers have in smart devices. 2014 is sure to experience newer and sharper mobilethreats. Mobiles still remain a darling of malware attackers and exploits IOT- 'Internet of Things' is something we all are waking up to, these days. Everything seems to be on the Internet! Right from our work to social lives, and storage needs, Internet has also opened its doors to home devices now! As more and more home devices get connected to the Internet, it is obvious that attackers will soon find their way through them too. Cyberoam predicts a rise in need for security solutions for home devices, besides your office devices. Because one thing is evident – the level of risk and quantum of vulnerability is similar, irrespective of whether the device residesinyourhomeorinyourofficenetwork. “Internet of Things” adds Security risks for home devices Browser-based attacks are still hot! In a bait to achieve sure-shot infection and victimize users, use of browser-based attacks like Water hole will further rise. This will include a rise in exploitation of browser vulnerabilities and also use of malicious websites. Attackers will continue totargetusersbydirectingthemtotrustedandcommonlyvisitedURLswhichwould be infected with malicious codes. Water hole mechanism includes cyber offenders infecting websites that are frequently visited by their targets. In 2013, many have already agreed on the rise seen in watering holes. In fact a lot of hackers that were usingspearphishingattackstotargetusershavealsostartedusingwateringholes.
  • 5. Windows users at risk as Windows XP comes to end-of-life As Microsoft decides to stop supporting Windows XP after 8th April 2014, users will need to upgrade to newer Windows versions, and so will the attackers shift their focus to these versions. Moreover, users who still continue to use Windows XP, will nothavetheirvulnerabilitiespatched,leavingthemopentoexploits. www.cyberoam.com I sales@cyberoam.com Copyright © 1999-2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Toll Free Numbers USA : +1-800-686-2360 | India : 1-800-301-00013 APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 CERTIFIED VPNC Interop Basic AES Interopwww.check-mark.com SSL Advanced Network Extension SSL Basic Network Extension SSL JavaScript SSL Firefox SSL Exchange SSL Portal CERTIFIED VPNC AboutCyberoamTechnologiesPrivateLimited Cyberoam Technologies Private Limited is a global Network Security appliances company, offering future-ready security solutions to physical and virtual networks in organizations with its Next-Generation Firewalls (NGFWs) and Unified Threat Management (UTM) appliances. Cyberoam network security appliances offer multiple security features like stateful inspection firewall, Application Visibility & Control, Web Filtering, VPN, Intrusion Prevention System, Gateway Anti-Virus, Gateway Anti-Spam, Web Application Firewall, Bandwidth Management and Multiple Link Management over these appliances, depending on the need of organizations. The virtual and hardware Cyberoam Central Console appliances offer Centralized Security Management options to organizations, while Cyberoam iView allows intelligent logging and reporting with one-of-their-kind, in-depth reports. Cyberoam is accredited with prestigious global standards and certifications like EAL4+, CheckMark UTM Level 5 Certification, ICSALabs,IPv6Goldlogo,andisamemberoftheVirtualPrivateNetworkConsortium.Formoreinformation,please visitwww.cyberoam.com For more news and updates on latest security trends, Subscribe to Cyberoam blogs at www.cyberoam.com/blogs