McAfee Labstoday predicted that cyber attacks and security will become stealthier and warns malware will surge up to 75 percent in 2015.
Cyber espionage attacks will continue to increase in frequency as long-term players will become stealthier information gatherers, while newcomers to cyber-attack capabilities will look for ways to steal sensitive information and disrupt their adversaries, the report said.
Cybercriminals will continue to act more like nation-state cyber espionage actors, focusing on monitoring systems and gathering high-value intelligence on individuals, intellectual property, and operational intelligence. McAfee Labs also predicts that more small nation states and terror groups will use cyber warfare.
Ransomware will evolve its methods of propagation, encryption, and the targets it seeks. More mobile devices are likely to suffer attacks. “We predict ransomware variants that manage to evade security software installed on a system will specifically target endpoints that subscribe to cloud-based storage solutions,” it added.
Mobile attacks will continue to grow rapidly as new mobile technologies expand the attack surface.
The growing availability of malware-generation kits and malware source code for mobile devices will lower the barrier to entry for cybercriminals targeting these devices.
In 2015, McAfee Labs predicts malicious parties will seek to extend their ability to avoid detection over long periods, with non-state actors increasingly adopting cyber espionage capabilities for monitoring and collecting valuable data over extended targeted attack campaigns.
The researchers predict more aggressive efforts to identify application, operating system, and network vulnerabilities, and an increasing focus on the limitations of sandboxing technologies as hackers attempt to evade application- and hypervisor-based detection.
“The year 2014 will be remembered as ‘the Year of Shaken Trust,’” said Vincent Weafer, Senior Vice President, McAfee Labs, part of Intel Security. “This unprecedented series of events shook industry confidence in long-standing Internet trust models, consumer confidence in organizations’ abilities to protect their data, and organizations’ confidence in their ability to detect and deflect targeted attacks in a timely manner. Restoring trust in 2015 will require stronger industry collaboration, new standards for a new threat landscape, and new security postures that shrink time-to-detection through the superior use of threat data. Ultimately, we need to get to a security model that’s built-in by design, seamlessly integrated into every device at every layer of the compute stack.”
In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the quarter, and overall malware surging by 76 percent year over year. The researchers also identified new attempts to take advantage of Internet trust models, including secure socket layer (SSL) vulnerabilities such as Heartbleed and BERserk, and the continued abuse of digital signatures to disguise malware as legitimate code.
Raytheon is broadening its network of cyber research capability globally with the creation of a Cyber Innovation Centre (CIC) based in the South-West of England. The centre is expected to open soon, housing over 100 cyber specialists who will work with a wide range of governmental and commercial customers to solve their complex cybersecurity challenges
The US State Department has shut down its entire unclassified email system after detecting a breach in its computer network. According to reports, the “activity of concern” was detected in the system concurrently with another cyber attack which hit the network at the White House computer network
The Indian government has dedicated a budget of $16. 2 million to increase cyber security and cyber defense in the country
China is implementing stronger cybersecurity measures as cyber attacks grow more rampant and deadly. Lu Wei, minister of cyberspace, told a Beijing press conference last week that in the past month 10,000 websites had been hacked in China, 80 per cent of which were government sites
With data breaches, ransomware and cyber attacks increasing at an alarming rate worldwide, the cyber insurance market is booming as well. The costs of data breaches run in the millions and take months, if not years, to recover, repair and investigate
The United Arab Emirates is gearing up to launch a cyber command within the General Headquarters (GHQ) of the UAE Armed Forces. Sources with knowledge on the matter told Defenseworld
The US and the UK will be launching cyber attacks against one another to test mutual defenses following last weeks hacking of social media accounts of the US militarys central command (CENTCOM) allegedly by ISIS sympathizers. Both the nations are looking to increase sharing of information about threats and to work out how to best protect them and create a system that lets hostile states and organization know they shouldn't attack, UK Prime Minister David Cameron said in an interview published by the BBC on Friday
Indian, Chinese and American armed forces are among several around the world doling out mobile-based video games to keep their soldiers entertained and enemies petrified. The Indian Air Force recently launched the Phase II of its 3D Mobile Air Combat game, ‘Guardians of the Skies (GOTS) on the android, iOS and windows mobile app stores on December 11
BAE Systems has completed the acquisition of Perimeter Internetworking Corp., which trades as SilverSky, a commercial cyber service provider
Despite opposition from Moscow, Ukraine's Ukroboronprom has decided to pitch for Indian contracts for the supply of components and repair of Russian-origin aircraft of the Indian Air Force, Director General Pavlo Bukin told Defenseworld.net in an interview.
Segments such as Network Centric Warfare, Radars, Weapon systems, Electronic Warfare & Avionics, Military Communications and Electro Optics are likely to drive the Companys growth in the future, says M V Gowtama, Chairman & Managing Director, Bharat Electronics Limited (BEL).
Yuri Slyusar, recently appointed President of Irkut Corporation, Russia commented on the structural changes in his organization and the impact this would have on future of the corporation and on important products of Russian aviation manufactured at the Irkutsk Aviation...
Ukraine Tests New Anti-tank Guided Missile System ‘Skif’
Raytheon’s Small Diameter Bomb II Completes Development Tests
Raytheon Wins $136 Million Air and Missile Defense Radar Program Modification Contract
Nexter To Provide 18 105LG1 Artillery Systems To Malaysia’s Army Forces
Ilyushin Offers IL-114-300 As Alternative to AN-24/AN-26 Turbo-prop Aircraft
French Safran to Help Develop Engine for India’s LCA?
Oshkosh Wins Missile Transporters Contract from Qatar, Kuwait
US Approves $259M Sierra Nevada King Air 350ER ISR Aircraft Sale to...
One of the most interesting exhibits at the Dubai Air show 2017 occupies a corner in the Aviation Industries Corporation...
While investigators in India are following up on the money trial in the AgustaWestland VVIP helicopter scandal, the leads as...
With over 451 submarines in service worldwide, the global market of submarines fleet is expected to surge up to $100...
Amid the proliferation of real-time data from sources such as mobile devices, web, social media, sensors, log files and transactional...
Helmets for pilots and ground troops do much more than stopping bullets
As the role of Unmanned Aerial Vehicles (UAVs) expands from traditional low-resolution reconnaissance to high-res video and infra-red besides precision-attack,...