McAfee Labstoday predicted that cyber attacks and security will become stealthier and warns malware will surge up to 75 percent in 2015.
Cyber espionage attacks will continue to increase in frequency as long-term players will become stealthier information gatherers, while newcomers to cyber-attack capabilities will look for ways to steal sensitive information and disrupt their adversaries, the report said.
Cybercriminals will continue to act more like nation-state cyber espionage actors, focusing on monitoring systems and gathering high-value intelligence on individuals, intellectual property, and operational intelligence. McAfee Labs also predicts that more small nation states and terror groups will use cyber warfare.
Ransomware will evolve its methods of propagation, encryption, and the targets it seeks. More mobile devices are likely to suffer attacks. “We predict ransomware variants that manage to evade security software installed on a system will specifically target endpoints that subscribe to cloud-based storage solutions,” it added.
Mobile attacks will continue to grow rapidly as new mobile technologies expand the attack surface.
The growing availability of malware-generation kits and malware source code for mobile devices will lower the barrier to entry for cybercriminals targeting these devices.
In 2015, McAfee Labs predicts malicious parties will seek to extend their ability to avoid detection over long periods, with non-state actors increasingly adopting cyber espionage capabilities for monitoring and collecting valuable data over extended targeted attack campaigns.
The researchers predict more aggressive efforts to identify application, operating system, and network vulnerabilities, and an increasing focus on the limitations of sandboxing technologies as hackers attempt to evade application- and hypervisor-based detection.
“The year 2014 will be remembered as ‘the Year of Shaken Trust,’” said Vincent Weafer, Senior Vice President, McAfee Labs, part of Intel Security. “This unprecedented series of events shook industry confidence in long-standing Internet trust models, consumer confidence in organizations’ abilities to protect their data, and organizations’ confidence in their ability to detect and deflect targeted attacks in a timely manner. Restoring trust in 2015 will require stronger industry collaboration, new standards for a new threat landscape, and new security postures that shrink time-to-detection through the superior use of threat data. Ultimately, we need to get to a security model that’s built-in by design, seamlessly integrated into every device at every layer of the compute stack.”
In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the quarter, and overall malware surging by 76 percent year over year. The researchers also identified new attempts to take advantage of Internet trust models, including secure socket layer (SSL) vulnerabilities such as Heartbleed and BERserk, and the continued abuse of digital signatures to disguise malware as legitimate code.
Raytheon is broadening its network of cyber research capability globally with the creation of a Cyber Innovation Centre (CIC) based in the South-West of England. The centre is expected to open soon, housing over 100 cyber specialists who will work with a wide range of governmental and commercial customers to solve their complex cybersecurity challenges
The US State Department has shut down its entire unclassified email system after detecting a breach in its computer network. According to reports, the “activity of concern” was detected in the system concurrently with another cyber attack which hit the network at the White House computer network
The Indian government has dedicated a budget of $16. 2 million to increase cyber security and cyber defense in the country
China is implementing stronger cybersecurity measures as cyber attacks grow more rampant and deadly. Lu Wei, minister of cyberspace, told a Beijing press conference last week that in the past month 10,000 websites had been hacked in China, 80 per cent of which were government sites
With data breaches, ransomware and cyber attacks increasing at an alarming rate worldwide, the cyber insurance market is booming as well. The costs of data breaches run in the millions and take months, if not years, to recover, repair and investigate
The United Arab Emirates is gearing up to launch a cyber command within the General Headquarters (GHQ) of the UAE Armed Forces. Sources with knowledge on the matter told Defenseworld
The Pentagon has awarded a contract worth more than a half-billion dollars to three US consulting firms for McAfee security solutions, the Defense Department said in a press release. "This agreement will provide McAfee brand name hardware, software, and services for Department of Defense (DoD), US intelligence community, and Coast Guard activities worldwide," the release said on Wednesday
The US and the UK will be launching cyber attacks against one another to test mutual defenses following last weeks hacking of social media accounts of the US militarys central command (CENTCOM) allegedly by ISIS sympathizers. Both the nations are looking to increase sharing of information about threats and to work out how to best protect them and create a system that lets hostile states and organization know they shouldn't attack, UK Prime Minister David Cameron said in an interview published by the BBC on Friday
Indian, Chinese and American armed forces are among several around the world doling out mobile-based video games to keep their soldiers entertained and enemies petrified. The Indian Air Force recently launched the Phase II of its 3D Mobile Air Combat game, ‘Guardians of the Skies (GOTS) on the android, iOS and windows mobile app stores on December 11
BAE Systems has completed the acquisition of Perimeter Internetworking Corp., which trades as SilverSky, a commercial cyber service provider
Philippine $5.6 Billion Horizon-2 Phase to Fund Four Frigates, Submarines
Diehl to Supply Additional IRIS-T Short Range Air-air Missiles to Thailand
Airbus to Pull Out of UK if Britain Leaves EU without a...
General Dynamics to Supply Hydra Rockets, Warheads to Saudi Arabia, Qatar and...
BEL in Race to Develop Infrared Tracking System For Sukhoi Su-30 MKI...
Draken Wins USAF $280 Million ADAIR Services Contract
Pakistan Signs Deal to Procure 30 T129 ATAK Helicopters from Turkey
BAE Systems Wins $348 Million to Produce 473 Bradley Armored Vehicles
Indias plans of integrating the MBDAs meteor missile on its LCA Tejas and Su-30MKI aircraft may not happen due to...
The most-read stories on the defenseworld
One of the most interesting exhibits at the Dubai Air show 2017 occupies a corner in the Aviation Industries Corporation...
The rising demand for low-cost, combat-capable aircraft that is able to perform a range of missions in an unchallenged environment,...
Amid the proliferation of real-time data from sources such as mobile devices, web, social media, sensors, log files and transactional...
Military activity in various hotspots of the world has increased the demand for ballistic protection that includes headgear, bulletproof vests,...