Pulse

By GCN Staff

Blog archive

Less malware predicted for 2014 but new tactics emerge

Cybersecurity was a hot topic in 2013 with agencies increasingly focusing on insider threats, attacks from nation states, and compliance. Last week Websense Security Labs released its cybersecurity predictions for 2014, suggesting areas IT managers should monitor: 

Advanced malware volume will decrease. Research has shown that the quantity of new malware is beginning to decline. However, this means cybercriminals will rely less on high-volume advanced malware because over time it runs a higher risk of detection. They will instead use lower volume, more targeted attacks to hack into networks. 

Attackers will be more interested in cloud data than networks. Because critical business data is increasingly stored in cloud-based systems, criminals will focus their attacks more on data stored in the cloud than data stored on the network. 

Java will remain highly exploitable and highly exploited. Organizations that continue to use older versions of Java will remain extremely exposed to exploitation. In 2014 criminals will devote more time to finding new uses for tried-and-true attacks and crafting other aspects of advanced, multistage attacks. 

Attackers will compromise organizations via professional social networks. As the business community continues to increase its social media use, attackers will increasingly use professional websites, such as LinkedIn, to get in touch with executives to gather intelligence and compromise networks.

Criminals will target the weakest links in the “data-exchange chain.” Attackers will target the consultants outside the network who have the most information. This includes contractors, vendors and others who typically share sensitive information with the large corporate and government entities. 

Read the full report.

Posted by GCN Staff on Nov 21, 2013 at 9:15 AM


Featured

  • Defense

    DOD wants prime contractors to be 'help desk' for new cybersecurity model

    The Defense Department is pushing forward with its unified cybersecurity standard for contractors and wants large companies and industry associations to show startups and smaller firms the way.

  • FCW Perspectives
    tech process (pkproject/Shutterstock.com)

    Understanding the obstacles to automation

    As RPA moves from buzzword to practical applications, agency leaders say it’s forcing broader discussions about business operations

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.