SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
www.cyberoam.com I sales@cyberoam.com
2014 - A Security View-point
With a careful analysis of security and IT trends in the most recent past and a strong foresight
that comes from years of industry experience and intelligent extrapolation of the past and the
present, Cyberoam brings to you Security Predictions for 2014.
“Client-side
software
exploits” –
it will be!
Attacks on
Industrial Control
Systems & SCADA
systems to continue
Context-Aware
security – the saviour
of rising mobility
Security of
Hybrid Cloud
Browser-based
attacks are still hot!
Mobiles still
remain a darling of
malware attackers
01
02
03
04
05
06
07
08
09
10
New exploit kits will be
explored and used
Attack vectors to
get more intelligent
“Internet of Things”
adds Security risks for
home devices
Windows users at risk as Windows XP
comes to end-of-life
Attacks in 2013 have left us with one clear picture – the rising sophistication and
professionalism among attackers. In times to come, Cyberoam predicts attacks,
wherein the attackers will get more specific, both in terms of their objective and
attack strategies. Gone are the days when attacks were meant for the masses.
Attackers nowknowwhom and howtheywould attackand theyarechangingtheir
attackstrategiestohitstraightonthebull's-eyeratherthanshootinginthedark.In
addition to this, few attacks from 2013 indicate the evolution of attacks including
proven components from already-used attacks, combined to form more
detrimentalattacks.
Attack vectors to get more intelligent
The amplified impact that an attack on Industrial Control Systems (ICS) can cause,
justifies the interest attackers have on such systems. ICS/SCADA system attacks can
cause catastrophic damage not only to a single unit but at times to an entire
country/province. It is the spread of impact compounded with lack of adequate
security available in such systems that have made ICS/SCADA networks a lucrative
target for attackers. As per statistics, there were 198 cyber attacks in 2012 and the
numbersincreasedto240in2013.Cyberoampredictsfurtherriseinsuchattackson
ICS/SCADAnetworksin2014andbeyond.
Attacks on Industrial Control Systems &
SCADA systems to continue
“Client-side software exploits” – it will be!
Cyberoam Threat Research Labs foresees an increase in Client-side software
exploits compared to the Server-side in next few years. 2013 has seen numerous
such exploits where base client software like Microsoft and Adobe were exploited
to spread the attack vectors across the network. The recent Microsoft advisories
indicating client side exploits also support this prediction. Reasons for this hike
include increased scope of exploitation with increase in attack vectors, higher base
of users who use these softwares, and lastly, the money involved in it. The exploit
kits used to exploit server side vulnerabilities cost much less than client side exploit
kits, indicating the premium the latter demand. Realizing that client side exploits
will bring in more money, the focus on exploiting client-side vulnerabilities will
increasetoo!
With increase in number of security features or solutions in an organization's
network to tackle emerging security risks, the job of security professionals is
getting more complex. With rising number of devices, users and applications to
monitor, this becomes even more difficult. The volume of data that the security
appliance(s) offer on various parameters is becoming a problem for network
administrators, presenting a need for context-aware security that enables faster
decision making and action with the security intelligence it offers. Cyberoam
predicts an increase in demand for context-aware security for 2014. The rising
needincontext-awaresecuritygoesincontinuationwithCyberoam'spredictionin
2013regardingtheriseinneedforUserThreatQuotient&DeviceThreatQuotient.
Increase in need for Context-Aware security
Inagenerationofincreasedmobilitywheretabletsandsmartdevicesaredisplacing
desktops and paper-based processes, more users are turning to Cloud, specifically
the Hybrid Cloud, as it offers more efficiency, business optimization, access to real-
time data and always-on availability. However, the ability of Hybrid clouds to burst
into the public cloud space when necessary is bringing up security concerns.
Although this capability is particularly useful to organisations, it may be a call for
danger and users and security vendors are realizing this. Cyberoam predicts an
increaseindemandforsecurityinHybridCloudenvironments.
Security of Hybrid Cloud
New exploit kits will be explored and used
Use of Blackhole exploit kit for attacks is a known fact. It is no secret that it was used
extensively for attacks in the past. But with the arrest of 'Paunch' in 2013, the man
behind the Blackhole exploit kit, new exploit kits are slowly showing up. In addition
to this, as attacks utilising Blackhole exploit kit have been exposed, it emerges as a
need among attackers to come up with new ways to target their victims. Also, with
recenttrends showingriseinexploitsbased on clientsidevulnerabilities,Cyberoam
predictsthatthismenaceisonlygoingtoaggravate.
Increasing base of smartphone users is a primary reason for attackers to find
interest in attacking those devices. In addition to this, users use their personal
devices to access work emails and connect to company networks, which
aggravates this interest further. Applications are the backbones of smart phones
and most of the mobile apps lack adequate security, adding to the misery of
security on mobile devices. All of these factors collate to increase the interest
attackers have in smart devices. 2014 is sure to experience newer and sharper
mobilethreats.
Mobiles still remain a darling of malware
attackers and exploits
IOT- 'Internet of Things' is something we all are waking up to, these days. Everything
seems to be on the Internet! Right from our work to social lives, and storage needs,
Internet has also opened its doors to home devices now! As more and more home
devices get connected to the Internet, it is obvious that attackers will soon find their
way through them too. Cyberoam predicts a rise in need for security solutions for
home devices, besides your office devices. Because one thing is evident – the level
of risk and quantum of vulnerability is similar, irrespective of whether the device
residesinyourhomeorinyourofficenetwork.
“Internet of Things” adds Security risks for
home devices
Browser-based attacks are still hot!
In a bait to achieve sure-shot infection and victimize users, use of browser-based
attacks like Water hole will further rise. This will include a rise in exploitation of
browser vulnerabilities and also use of malicious websites. Attackers will continue
totargetusersbydirectingthemtotrustedandcommonlyvisitedURLswhichwould
be infected with malicious codes. Water hole mechanism includes cyber offenders
infecting websites that are frequently visited by their targets. In 2013, many have
already agreed on the rise seen in watering holes. In fact a lot of hackers that were
usingspearphishingattackstotargetusershavealsostartedusingwateringholes.
Windows users at risk as Windows XP
comes to end-of-life
As Microsoft decides to stop supporting Windows XP after 8th April 2014, users will
need to upgrade to newer Windows versions, and so will the attackers shift their
focus to these versions. Moreover, users who still continue to use Windows XP, will
nothavetheirvulnerabilitiespatched,leavingthemopentoexploits.
www.cyberoam.com I sales@cyberoam.com Copyright © 1999-2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved
Toll Free Numbers
USA : +1-800-686-2360 | India : 1-800-301-00013
APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958
CERTIFIED
VPNC
Interop
Basic
AES
Interopwww.check-mark.com
SSL Advanced
Network Extension
SSL Basic
Network Extension
SSL
JavaScript
SSL
Firefox
SSL
Exchange
SSL
Portal
CERTIFIED
VPNC
AboutCyberoamTechnologiesPrivateLimited
Cyberoam Technologies Private Limited is a global Network Security appliances company, offering future-ready
security solutions to physical and virtual networks in organizations with its Next-Generation Firewalls (NGFWs) and
Unified Threat Management (UTM) appliances. Cyberoam network security appliances offer multiple security
features like stateful inspection firewall, Application Visibility & Control, Web Filtering, VPN, Intrusion Prevention
System, Gateway Anti-Virus, Gateway Anti-Spam, Web Application Firewall, Bandwidth Management and Multiple
Link Management over these appliances, depending on the need of organizations. The virtual and hardware
Cyberoam Central Console appliances offer Centralized Security Management options to organizations, while
Cyberoam iView allows intelligent logging and reporting with one-of-their-kind, in-depth reports. Cyberoam is
accredited with prestigious global standards and certifications like EAL4+, CheckMark UTM Level 5 Certification,
ICSALabs,IPv6Goldlogo,andisamemberoftheVirtualPrivateNetworkConsortium.Formoreinformation,please
visitwww.cyberoam.com
For more news and updates on latest security trends, Subscribe to Cyberoam blogs at www.cyberoam.com/blogs

Contenu connexe

Tendances

Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
Andreas Hiller
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
K Singh
 

Tendances (20)

IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
188
188188
188
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAdvanced Phishing The Art of Stealing
Advanced Phishing The Art of Stealing
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 

Similaire à Security_prediction_2014

Top cyber security trends for 2014
Top cyber security trends for 2014Top cyber security trends for 2014
Top cyber security trends for 2014
Abdullah Al-Ghamdi
 

Similaire à Security_prediction_2014 (20)

Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictions
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Top cyber security trends for 2014
Top cyber security trends for 2014Top cyber security trends for 2014
Top cyber security trends for 2014
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 

Plus de Truong Minh Yen (10)

Sitram brand book
Sitram brand bookSitram brand book
Sitram brand book
 
Sach trang 2017
Sach trang 2017Sach trang 2017
Sach trang 2017
 
Comodo 2017 report
Comodo 2017 reportComodo 2017 report
Comodo 2017 report
 
Comodo_Vietnam_Overview
Comodo_Vietnam_OverviewComodo_Vietnam_Overview
Comodo_Vietnam_Overview
 
Southeast Asia Digital 2015
Southeast Asia Digital 2015Southeast Asia Digital 2015
Southeast Asia Digital 2015
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3
 
DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)
DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)
DLP solution - myData Leake Prevention (Chống rò rỉ mất cắp thông tin)
 
2014 asia pacific digital overview
2014 asia pacific digital overview2014 asia pacific digital overview
2014 asia pacific digital overview
 
Product presentation retail_2013_eng
Product presentation retail_2013_engProduct presentation retail_2013_eng
Product presentation retail_2013_eng
 
Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Panda security corporate_presentation_2012
Panda security corporate_presentation_2012
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Security_prediction_2014

  • 1. www.cyberoam.com I sales@cyberoam.com 2014 - A Security View-point With a careful analysis of security and IT trends in the most recent past and a strong foresight that comes from years of industry experience and intelligent extrapolation of the past and the present, Cyberoam brings to you Security Predictions for 2014. “Client-side software exploits” – it will be! Attacks on Industrial Control Systems & SCADA systems to continue Context-Aware security – the saviour of rising mobility Security of Hybrid Cloud Browser-based attacks are still hot! Mobiles still remain a darling of malware attackers 01 02 03 04 05 06 07 08 09 10 New exploit kits will be explored and used Attack vectors to get more intelligent “Internet of Things” adds Security risks for home devices Windows users at risk as Windows XP comes to end-of-life
  • 2. Attacks in 2013 have left us with one clear picture – the rising sophistication and professionalism among attackers. In times to come, Cyberoam predicts attacks, wherein the attackers will get more specific, both in terms of their objective and attack strategies. Gone are the days when attacks were meant for the masses. Attackers nowknowwhom and howtheywould attackand theyarechangingtheir attackstrategiestohitstraightonthebull's-eyeratherthanshootinginthedark.In addition to this, few attacks from 2013 indicate the evolution of attacks including proven components from already-used attacks, combined to form more detrimentalattacks. Attack vectors to get more intelligent The amplified impact that an attack on Industrial Control Systems (ICS) can cause, justifies the interest attackers have on such systems. ICS/SCADA system attacks can cause catastrophic damage not only to a single unit but at times to an entire country/province. It is the spread of impact compounded with lack of adequate security available in such systems that have made ICS/SCADA networks a lucrative target for attackers. As per statistics, there were 198 cyber attacks in 2012 and the numbersincreasedto240in2013.Cyberoampredictsfurtherriseinsuchattackson ICS/SCADAnetworksin2014andbeyond. Attacks on Industrial Control Systems & SCADA systems to continue “Client-side software exploits” – it will be! Cyberoam Threat Research Labs foresees an increase in Client-side software exploits compared to the Server-side in next few years. 2013 has seen numerous such exploits where base client software like Microsoft and Adobe were exploited to spread the attack vectors across the network. The recent Microsoft advisories indicating client side exploits also support this prediction. Reasons for this hike include increased scope of exploitation with increase in attack vectors, higher base of users who use these softwares, and lastly, the money involved in it. The exploit kits used to exploit server side vulnerabilities cost much less than client side exploit kits, indicating the premium the latter demand. Realizing that client side exploits will bring in more money, the focus on exploiting client-side vulnerabilities will increasetoo!
  • 3. With increase in number of security features or solutions in an organization's network to tackle emerging security risks, the job of security professionals is getting more complex. With rising number of devices, users and applications to monitor, this becomes even more difficult. The volume of data that the security appliance(s) offer on various parameters is becoming a problem for network administrators, presenting a need for context-aware security that enables faster decision making and action with the security intelligence it offers. Cyberoam predicts an increase in demand for context-aware security for 2014. The rising needincontext-awaresecuritygoesincontinuationwithCyberoam'spredictionin 2013regardingtheriseinneedforUserThreatQuotient&DeviceThreatQuotient. Increase in need for Context-Aware security Inagenerationofincreasedmobilitywheretabletsandsmartdevicesaredisplacing desktops and paper-based processes, more users are turning to Cloud, specifically the Hybrid Cloud, as it offers more efficiency, business optimization, access to real- time data and always-on availability. However, the ability of Hybrid clouds to burst into the public cloud space when necessary is bringing up security concerns. Although this capability is particularly useful to organisations, it may be a call for danger and users and security vendors are realizing this. Cyberoam predicts an increaseindemandforsecurityinHybridCloudenvironments. Security of Hybrid Cloud New exploit kits will be explored and used Use of Blackhole exploit kit for attacks is a known fact. It is no secret that it was used extensively for attacks in the past. But with the arrest of 'Paunch' in 2013, the man behind the Blackhole exploit kit, new exploit kits are slowly showing up. In addition to this, as attacks utilising Blackhole exploit kit have been exposed, it emerges as a need among attackers to come up with new ways to target their victims. Also, with recenttrends showingriseinexploitsbased on clientsidevulnerabilities,Cyberoam predictsthatthismenaceisonlygoingtoaggravate.
  • 4. Increasing base of smartphone users is a primary reason for attackers to find interest in attacking those devices. In addition to this, users use their personal devices to access work emails and connect to company networks, which aggravates this interest further. Applications are the backbones of smart phones and most of the mobile apps lack adequate security, adding to the misery of security on mobile devices. All of these factors collate to increase the interest attackers have in smart devices. 2014 is sure to experience newer and sharper mobilethreats. Mobiles still remain a darling of malware attackers and exploits IOT- 'Internet of Things' is something we all are waking up to, these days. Everything seems to be on the Internet! Right from our work to social lives, and storage needs, Internet has also opened its doors to home devices now! As more and more home devices get connected to the Internet, it is obvious that attackers will soon find their way through them too. Cyberoam predicts a rise in need for security solutions for home devices, besides your office devices. Because one thing is evident – the level of risk and quantum of vulnerability is similar, irrespective of whether the device residesinyourhomeorinyourofficenetwork. “Internet of Things” adds Security risks for home devices Browser-based attacks are still hot! In a bait to achieve sure-shot infection and victimize users, use of browser-based attacks like Water hole will further rise. This will include a rise in exploitation of browser vulnerabilities and also use of malicious websites. Attackers will continue totargetusersbydirectingthemtotrustedandcommonlyvisitedURLswhichwould be infected with malicious codes. Water hole mechanism includes cyber offenders infecting websites that are frequently visited by their targets. In 2013, many have already agreed on the rise seen in watering holes. In fact a lot of hackers that were usingspearphishingattackstotargetusershavealsostartedusingwateringholes.
  • 5. Windows users at risk as Windows XP comes to end-of-life As Microsoft decides to stop supporting Windows XP after 8th April 2014, users will need to upgrade to newer Windows versions, and so will the attackers shift their focus to these versions. Moreover, users who still continue to use Windows XP, will nothavetheirvulnerabilitiespatched,leavingthemopentoexploits. www.cyberoam.com I sales@cyberoam.com Copyright © 1999-2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Toll Free Numbers USA : +1-800-686-2360 | India : 1-800-301-00013 APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 CERTIFIED VPNC Interop Basic AES Interopwww.check-mark.com SSL Advanced Network Extension SSL Basic Network Extension SSL JavaScript SSL Firefox SSL Exchange SSL Portal CERTIFIED VPNC AboutCyberoamTechnologiesPrivateLimited Cyberoam Technologies Private Limited is a global Network Security appliances company, offering future-ready security solutions to physical and virtual networks in organizations with its Next-Generation Firewalls (NGFWs) and Unified Threat Management (UTM) appliances. Cyberoam network security appliances offer multiple security features like stateful inspection firewall, Application Visibility & Control, Web Filtering, VPN, Intrusion Prevention System, Gateway Anti-Virus, Gateway Anti-Spam, Web Application Firewall, Bandwidth Management and Multiple Link Management over these appliances, depending on the need of organizations. The virtual and hardware Cyberoam Central Console appliances offer Centralized Security Management options to organizations, while Cyberoam iView allows intelligent logging and reporting with one-of-their-kind, in-depth reports. Cyberoam is accredited with prestigious global standards and certifications like EAL4+, CheckMark UTM Level 5 Certification, ICSALabs,IPv6Goldlogo,andisamemberoftheVirtualPrivateNetworkConsortium.Formoreinformation,please visitwww.cyberoam.com For more news and updates on latest security trends, Subscribe to Cyberoam blogs at www.cyberoam.com/blogs