Trend Micro Warns Of Monthly Cyber Attacks In 2014

The security firm said advanced mobile banking and targeted attacks will accelerate over the next year.



Trend Micro, the security software company, has released its annual security predictions report warning that one major data breach will occur every month in 2014.

The Blurring Boundaries study also cited that advanced mobile banking and targeted attacks will accelerate over the next year.

Critical infrastructure threats, as well as emerging security challenges from the Internet of Everything (IoE) and Deep Web – online content that is not indexed by search engines – were also highlighted.

“We see the sophistication of threats expanding at a rapid pace, which will impact individuals, businesses and governments alike,” said Raimund Genes, CTO, Trend Micro.

“From mobile banking vulnerabilities and targeted attacks, to growing privacy concerns and the potential of a major breach each month, 2014 promises to be a prolific year for cybercrime.

“We will also see the evolution of the IoE, which serves as a prelude to the surge in technological advancements as the decade closes.”

With augmented reality devices increasing through wearable technology, including watches and eyewear, there is a very real possibility of large-scale cybercrime from identity theft by 2020, warned the report.

Trend Micro’s predictions for 2014 include:

• Malicious and high-risk Android applications will reach three million
• Banking via mobile devices will be compromised by an uptick of Man-in-the-Middle attacks, making two-step verification inadequate
• Cybercriminals will increasingly use targeted-attack-type methodologies like open source research and highly customised spear phishing
• Targeted attackers will increasingly use advanced threats such as clickjacking and watering hole attacks and target mobile devices
• Lack of support for popular software such as Java 6 and Windows XP will expose millions of PCs to attack
• Public trust, compromised by revelations of state-sponsored monitoring, will result in a variety of efforts to restore privacy
• The Deep Web will continue to vex law enforcement’s ability to address widespread cybercrime