McAfee Labstoday predicted that cyber attacks and security will become stealthier and warns malware will surge up to 75 percent in 2015.
Cyber espionage attacks will continue to increase in frequency as long-term players will become stealthier information gatherers, while newcomers to cyber-attack capabilities will look for ways to steal sensitive information and disrupt their adversaries, the report said.
Cybercriminals will continue to act more like nation-state cyber espionage actors, focusing on monitoring systems and gathering high-value intelligence on individuals, intellectual property, and operational intelligence. McAfee Labs also predicts that more small nation states and terror groups will use cyber warfare.
Ransomware will evolve its methods of propagation, encryption, and the targets it seeks. More mobile devices are likely to suffer attacks. “We predict ransomware variants that manage to evade security software installed on a system will specifically target endpoints that subscribe to cloud-based storage solutions,” it added.
Mobile attacks will continue to grow rapidly as new mobile technologies expand the attack surface.
The growing availability of malware-generation kits and malware source code for mobile devices will lower the barrier to entry for cybercriminals targeting these devices.
In 2015, McAfee Labs predicts malicious parties will seek to extend their ability to avoid detection over long periods, with non-state actors increasingly adopting cyber espionage capabilities for monitoring and collecting valuable data over extended targeted attack campaigns.
The researchers predict more aggressive efforts to identify application, operating system, and network vulnerabilities, and an increasing focus on the limitations of sandboxing technologies as hackers attempt to evade application- and hypervisor-based detection.
“The year 2014 will be remembered as ‘the Year of Shaken Trust,’” said Vincent Weafer, Senior Vice President, McAfee Labs, part of Intel Security. “This unprecedented series of events shook industry confidence in long-standing Internet trust models, consumer confidence in organizations’ abilities to protect their data, and organizations’ confidence in their ability to detect and deflect targeted attacks in a timely manner. Restoring trust in 2015 will require stronger industry collaboration, new standards for a new threat landscape, and new security postures that shrink time-to-detection through the superior use of threat data. Ultimately, we need to get to a security model that’s built-in by design, seamlessly integrated into every device at every layer of the compute stack.”
In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the quarter, and overall malware surging by 76 percent year over year. The researchers also identified new attempts to take advantage of Internet trust models, including secure socket layer (SSL) vulnerabilities such as Heartbleed and BERserk, and the continued abuse of digital signatures to disguise malware as legitimate code.
Raytheon is broadening its network of cyber research capability globally with the creation of a Cyber Innovation Centre (CIC) based in the South-West of England. The centre is expected to open soon, housing over 100 cyber specialists who will work with a wide range of governmental and commercial customers to solve their complex cybersecurity challenges
The US State Department has shut down its entire unclassified email system after detecting a breach in its computer network. According to reports, the “activity of concern” was detected in the system concurrently with another cyber attack which hit the network at the White House computer network
The Indian government has dedicated a budget of $16. 2 million to increase cyber security and cyber defense in the country
China is implementing stronger cybersecurity measures as cyber attacks grow more rampant and deadly. Lu Wei, minister of cyberspace, told a Beijing press conference last week that in the past month 10,000 websites had been hacked in China, 80 per cent of which were government sites
With data breaches, ransomware and cyber attacks increasing at an alarming rate worldwide, the cyber insurance market is booming as well. The costs of data breaches run in the millions and take months, if not years, to recover, repair and investigate
The United Arab Emirates is gearing up to launch a cyber command within the General Headquarters (GHQ) of the UAE Armed Forces. Sources with knowledge on the matter told Defenseworld
The Pentagon has awarded a contract worth more than a half-billion dollars to three US consulting firms for McAfee security solutions, the Defense Department said in a press release. "This agreement will provide McAfee brand name hardware, software, and services for Department of Defense (DoD), US intelligence community, and Coast Guard activities worldwide," the release said on Wednesday
The US and the UK will be launching cyber attacks against one another to test mutual defenses following last weeks hacking of social media accounts of the US militarys central command (CENTCOM) allegedly by ISIS sympathizers. Both the nations are looking to increase sharing of information about threats and to work out how to best protect them and create a system that lets hostile states and organization know they shouldn't attack, UK Prime Minister David Cameron said in an interview published by the BBC on Friday
Indian, Chinese and American armed forces are among several around the world doling out mobile-based video games to keep their soldiers entertained and enemies petrified. The Indian Air Force recently launched the Phase II of its 3D Mobile Air Combat game, ‘Guardians of the Skies (GOTS) on the android, iOS and windows mobile app stores on December 11
BAE Systems has completed the acquisition of Perimeter Internetworking Corp., which trades as SilverSky, a commercial cyber service provider
Schiebel’s Camcopter S-100 Integrated on French Navy's Mistral Carrier
Turkey's ASELSAN Wins $195.7M Sub-systems Contract for Pakistan’s Milgem Frigate
German Army to get 1,500 Spike Missiles
Senegal Orders 3 Armed Piriou Offshore Patrol Vessels
Russia Seeks Customers for 6 Upgraded, Former Indian Air Force Su-30 Fighters
Italian Arms Exports to Pakistan Jump four-folds in 1 year
Indonesia Plans F-16 V Fighter Jets Purchase, Russian Su-35 still on Anvil
Boeing admits Parachute 'Deployment Anomaly' in Spaceflight Abort Test
Several joint production and direct procurement programs could be halted if the US and Europe carry through with their threat...
Sanctions-hit Iran has found ingenious ways to develop military hardware
Artificial Intelligence (AI) is rapidly permeating the defence industry to aid and improve human decision-making
Upgrade of Russias Sukhoi Su-30SM fighters to equip them with armaments, radar, sensors and engines from the more powerful Su-35...
US companies sanctioned by China for supplying weapons to Taiwan may be denied rare earth elements (REEs), which have critical...
While the US F-35 stealth aircraft has become one the fastest selling fighter jets in the world aircraft market, thanks...