People 'n' Issues
Big data breaches will come thick and fast in 2014
One major data breach will occur every month next year, and advanced mobile banking and targeted attacks will accelerate, according to Trend Micro Incorporated.
The forecast was a key findings in the company’s annual security predictions report, ‚”Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond.‚” The report, released yesterday, also highlighted Critical infrastructure threats, as well as emerging security challenges from the Internet of Everything (IoE) and Deep Web.
The report parallels Trend Micro’s long-term projections in the recently released nine-part online video drama entitled, ‚”2020: The Series,‚” depicting a technology saturated society and the corresponding cyber threats.
‚”We see the sophistication of threats expanding at a rapid pace, which will impact individuals, businesses and governments alike,‚” says Gregory Anderson, country manager at Trend Micro, South Africa. ‚”From mobile banking vulnerabilities and targeted attacks, to growing privacy concerns and the potential of a major breach each month, 2014 promises to be a prolific year for cybercrime. We will also see the evolution of the IoE, which serves as a prelude to the surge in technological advancements as the decade closes.‚”
Prominent predications for 2014 include:
The report also focuses on the rise of the IoE, which promises to be the proverbial game changer in personal technology in the years to come. With augmented reality delivered through wearable technology including watches and eyewear, the possibility of large-scale cybercrime from identity theft by 2020 is a very real possibility as the technology continues to proliferate from 2014 and beyond.
This reality is brought to life in Trend Micro’s ‚”2020: The Series,‚” which is based on Project 2020, a white paper developed in collaboration with the International Cyber Security Protection Alliance (ICSPA). The unique series presents a future consumed by technology and seeks to inspire stakeholders to take action now against looming cyber vulnerabilities.
* Image courtesy of Shutterstock.com
*