ESET launches annual Threat Trends Predictions for 2014

21st December 2013 | By Mouseworld Now Correspondent |

New Delhi, India, December 21, 2013: ESET, the global player in proactive digital protection with a record of 10 years consecutive VB100 awards for its award-winning ESET NOD32 technology, has launched its annual predictions for the threatscape in the upcoming year “Trends 2014 – The Challenge of Internet Privacy”. This year, in wake of revelations of Edward Snowden related to the US National Security Agency (NSA), the main topic focuses on the growing concern expressed by users regarding their online privacy.

The report is specifically elaborating on three main areas of trends for 2014:

Loss of privacy and mechanisms to improve protection on the Internet – the trend of “going to the cloud” and how it effects privacy; the NSA and the privacy debate and how can the user protect his information on the internet (e.g. data encryption).

“The challenge to internet privacy has not meant a decrease in cases of people affected by any malicious code or other kind of computer threat. It can be asserted that concern about privacy is a good starting point on the user side; however, it is essential for people to be aware of all aspects of Information Security. Otherwise, it is not possible to mitigate the impact of computer threats”, states the report.

Computer threats for Android OS – already in its 2013 report, ESET has predicted major increase of Android malware. Comparing the detections that occurred in 2012 and 2013, they have increased by more than 60 percent. This significant increase will continue in 2014.

The report prepared by researchers at ESET Latin America’s Research Laboratory in Buenos Aires, notes that cybercriminals are applying classic attack methodologies of attacks to mobile platforms. On this basis, the discovery of critical vulnerabilities and their later exploitation through malicious code represent an evolution of cybercrime affecting mobile technology.

Other trends – new spread of malicious code in form of ransomware (e.g. filecoders like Cryptolocker); vulnerabilities in Java, ever-present and more complex botnets; 64-bit threats and malicious codes which try to obtain profits by stealing electronic coins and a variety of non-traditional devices such as smart cars, game consoles, smart TVs and others which introduce the possibility that in a future, threats for this kind of technology may be seen.

 

© Mouseworld Now News Service

Tags: , , , ,

Leave your comment

IMPORTANT! To be able to proceed, you need to solve the following simple math

What is 15 + 15 ?
Please leave these two fields as-is:

Mouseworldnow Videos
  • r chandrashekhar president nasscom
  • Anant Maheshwari, President, Microsoft India
  • Suresh_Vaswani-220 by 220

Channel News

  • Cloudera Awards Top APAC Partners at annual Partner Summit more...
  • Rashi Peripherals Bags Indywood IT Excellence Award more...
  • Rashi Peripherals Conducts Multi-City Enterprise Partner Meet more...
  • Second Edition of Annual 4.5G & 5G Innovation Summit concludes on a successful note more...
  • Wydr launches India Wholesale E-Fair more...
Subscribe via email

Enter your email address:

Follow us on Facebook
QUESTION HOUR
What does the mouse ask?

Will the spurt in online video advertisement steal the twinkle from the TV ad platform?

View Results

Loading ... Loading ...
Newsletter Registration