ESET®, the global leader in proactive digital protection with a record of 10 years consecutive VB100 awards for its award-winning ESET NOD32® technology, has released today its annual predictions for the threatscape in the upcoming year “Trends 2014 – The Challenge of Internet Privacy”. This year, in wake of revelations of Edward Snowden related to the US National Security Agency (NSA), the main topic focuses on the growing concern expressed by users regarding their online privacy.
The report is specifically elaborating on three main areas of trends for 2014:
Loss of privacy and mechanisms to improve protection on the Internet – the trend of “going to the cloud” and how it effects privacy; the NSA and the privacy debate and how can the user protect his information on the internet (e.g. data encryption).
“The challenge to internet privacy has not meant a decrease in cases of people affected by any malicious code or other kind of computer threat. It can be asserted that concern about privacy is a good starting point on the user side; however, it is essential for people to be aware of all aspects of Information Security. Otherwise, it is not possible to mitigate the impact of computer threats”, states the report.
Computer threats for Android OS – already in its 2013 report, ESET has predicted major increase of Android malware. Comparing the detections that occurred in 2012 and 2013, they have increased by more than 60 percent. This significant increase will continue in 2014.
The report prepared by researchers at ESET Latin America’s Research Laboratory in Buenos Aires, notes that cybercriminals are applying classic attack methodologies of attacks to mobile platforms. On this basis, the discovery of critical vulnerabilities and their later exploitation through malicious code represent an evolution of cybercrime affecting mobile technology.
Other trends – new spread of malicious code in form of ransomware (e.g. filecoders like Cryptolocker); vulnerabilities in Java, ever-present and more complex botnets; 64-bit threats and malicious codes which try to obtain profits by stealing electronic coins and a variety of non-traditional devices such as smart cars, game consoles, smart TVs and others which introduce the possibility that in a future, threats for this kind of technology may be seen.