Find a Question:
Intel, plus review the most prominent security threats during the next five years
Revealed the expected security threats for 2016 issued by the company report Intel, plus the security of mail, for a series of expectations growing include the ferocity of the attacks on the financial sector and the theft of millions of dollars of banking systems, and the development of new techniques to penetrate the automotive Internet-connected systems, grab the salaries of employees of, and the increasing programs threats the ransom, and operations penetrate, store and sell stolen data. The report also reviewed a set of expectations for the scene-mail Security until 2020.
And the handling of the report prepared by the company’s McAfee Labs experts, the expected consequences of these threats and their different effects in the short and long term group, governments, individuals, and businesses and the economy, society and cyber crime in general.
Said Hamed Diab, regional director for Intel, plus in the Middle East and North Africa: “Our expectations indicate that 2016 will see the uptick scary in the diversification of criminal methods attackers to circumvent security systems, and achieve greater material gains and spirits across multiple sectors.”
He said Diab “Today, through participating our expectations for next year, following four years until 2020, we hope to help companies and various sectors to remain fully prepared to face the upcoming security challenges, and continue to invest to get the latest integrated solutions in information security.”
It included highlighted expectations for 2016 in the report group, the expansion of electronic attacks to include penetration of the tools of electronic and mechanical devices and computer systems, and in light of the tools market growth, as well as to target virtual machines.
In terms of wearable technology, it revealed expectations for pirates continue to target these techniques although they contain a limited number of personal information, in order to penetrate and subvert the smart phone related.
And it will continue to information security companies protect the most vulnerable to potential attacks such as the nuclei of operating systems, programs and networks and wireless Internet “Wi-Fi” interfaces, and user interfaces, memory, and files, systems and conservation, and virtual devices, and web applications.
The report predicted as well as the pursuit of hackers and criminals to target institutions through its staff, through the targeting of home systems for employees and which are relatively less secure, as many of the institutions are increasingly began to recognize security threats on the operational systems, and has strengthened the power of the security systems and the use of the latest solutions, and attracting staff of experienced professionals.
The report also highlighted the continuing researchers in information security in the development of methods to prevent the penetration of smart systems for cars by focusing on the possibility of exploiting automotive-related systems, which lack basic security capabilities or security policies best practices scenarios.
You will providers of security solutions and automakers together on the development of benchmarks, and technical solutions to protect the facades prone to attack such units control access to cars, and units of engine control, and operation of the engine and systems conquest remotely, and the system of opening without key, carriers USB, and applications contact the vehicle remote remote link type apps, and in using the smartphone.
The report pointed out a number of other security threats projected for 2016, such as, the growing number of inexperienced hackers to exploit the ransom programs as a service to achieve material gain, and the targeting of cloud services by exploiting loopholes in the weak security policies, to steal confidential business information.
The report also revealed the development of the attackers a new and integrated offensive strategies to seize the bank statements to customers, Kalkiem change the deposit salary victim settings and deposit money in another account, as Intel, plus the company expects to contribute to this integrated on the financial sector in inflict casualties great losses attacks, and the theft of millions of dollars.
As for the expectations down for 2020, they include the changes that are expected to occur in the next five years, and with regard to the behavior and goals of the attackers, and how to meet these challenges by public security institutions and the industry.
It is expected that the attackers to search for weaknesses in electronic and mechanical computer system components, and firmware and in light of the increasing reluctance of applications and operating systems to conventional attacks, which will allow these attackers to achieve comprehensive control and enables them to have access to more resources and take over management and control capabilities Number .
With regard to the methods of evasion, it is expected that the attackers were trying to avoid detection by targeting new interfaces, and employ sophisticated methods of attack, and evasion of security technology. And attack methods include the use of software without files, encrypted and infiltration, evasion and software applications from the protection mechanism.
While it has not yet been a significant increase in attacks on the Internet and mobile devices things observed, but it is expected to increase by 2020 the use of these systems to the extent that it attracted the largest component of the attackers. It will technology companies and providers of security solutions on the issuance of user safety and best practices guidance, and install the devices in the engineering security controls when necessary.
McAfee Labs expects to malicious code and services market piracy allow the use of spyware networking software, used in the attacks on the public sector and institutions, in the collection of financial information and market manipulation in favor of the attackers.
With regard to the privacy challenges and opportunities, it expected that the volume and value of personal digital data continues to increase, which will attract hackers, leading in turn to the adoption of new regulations to save the Privacy worldwide. While individuals will seek to request and receive compensation for the distribution of their own data, which will lead to the creation of a private market in this area may change the way digital privacy management by individuals and institutions.
As for the response industry security solutions, it will run security solutions industry to develop more effective to detect and correct attacks sophisticated tools. It may also be the development of behavioral analysis to detect unusual user activities and that may help in the detection of the electronic accounts at risk.
It is likely also to contribute to the exchange of information about threats to provide faster and better protection systems. While integrated to improve visibility and control of cloud computing security may work. Finally, it is a computerized detection and correction to the protection of the institutions of the most common attacks, which will provide for IT security professionals room to focus on the most important security incidents.Viewing:-193
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!