Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • Nepal protests
  • Nepal Protests Live
  • Vice-presidential elections
  • iPhone 17
  • IND vs PAK cricket
  • Israel-Hamas war
fp-logo
McAfee's Top 10 Threat Predictions For 2013
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Biztech
  • McAfee's Top 10 Threat Predictions For 2013

McAfee's Top 10 Threat Predictions For 2013

FP Archives • February 2, 2017, 23:55:22 IST
Whatsapp Facebook Twitter

2013 will see significantly more targeted attacks and targeted malware, predicts McAfee.

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
McAfee's Top 10 Threat Predictions For 2013

In the wake of rising threats, it is important for everyone to be geared with new cyber challenges that would arise in the New Year. Jagdish Mahapatra, Managing Director, McAfee India & SAARC shares the threats the enterprise sector should be wary of in 2013.

Top 10 Enterprise Security Predictions

1. Targeted Attacks: 2012 saw an increased growth in targeted attacks that proved successful in disrupting service and fraudulently obtaining significant amounts of intellectual property. McAfee expects cyber criminals will continue to use this method and as a result, 2013 will see significantly more targeted attacks and targeted malware. This type of attack is more difficult to protect against. Uniform attacks are still out there but as soon as they are identified and a security fix is released they are no longer effective.One disturbing development in this trend across 2012 was that more targeted attacks that also destroyed evidence of the attack afterwards were seen and it is likely to continue. There have been attacks where 30,000 hard drives were left non-operational after an attack. Dealing with the clean-up distracts the IT administrators who don’t immediately realise they have been hacked. It also adds to the difficulty in ensuring effective incident response as hackers literally attack any hardware on the way out. Protecting against this will be a major challenge – particularly for enterprise and government.

STORY CONTINUES BELOW THIS AD

2. Signed malware: Signed malware was prevalent in 2012 and this is likely to continue. Signed malware is present when a hacker obtains a digital certificate from an organisation and appends it to malware, allowing the malware to pass through an organisation’s operating system. Stuxnet is a high profile example of this threat. There will be a large increase in this type of threat and it will be harder to stop because it appears more legitimate.

More from Biztech
Future Group - Reliance Retail Deal approved by CCI Future Group - Reliance Retail Deal approved by CCI RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market

3. Big business at risk: Enterprises can be at a higher risk of an attack as there is often a greater attack surface and more ‘visibility gaps’ in their security posture. With targeted attacks on the rise, the motives to target a large enterprise are often greater than a smaller organisation.

4. Non-Windows attacks: We suspect non-Windows attacks will continue to increase in 2013. Android devices are now the highest selling mobile devices in the Asia Pacific market and hackers will take advantage of that by developing mobile malware. Consumers aren’t the only ones at risk of mobile threats. Enterprises, particularly those embracing Bring Your Own Device (BYOD), are also at risk. Interestingly, the mobile malware growth rate is similar to what was seen for Windows malware some time ago, which shows it is a genuine threat. McAfee’s Q3 Threat Report for 2012 showed mobile malware almost doubled when compared to the previous quarter’s numbers.

5. Ransomware: This will also be prevalent in 2013. Ransomware is operated by encrypting files on a victim’s computer which can only be unlocked by paying the criminals a ‘fine’. It has been a big issue in other countries around the world in the past.

6. Impact of changing regulations: The Indian banking regulator (RBI) has generally been proactive in advising banks on issues relating to security and has acted as an important institution to drive the importance of this matter at the level of Board of Directors. According to the Reserve Bank of India report released in January 2011, the regulator acknowledges that given the increasing reliance of customers on electronic delivery channels to conduct transactions, any security related issues have the potential to undermine public confidence in the use of e-banking channels and lead to reputation risks to the banks. The regulator has institutionalised a whistle-blowing system by means of a quarterly assessment of all banks towards their progress on these guidelines in the AFI (Annual Financial Inspection) cycle 2011-2012. To conform to these guidelines, financial services organisations in India will need to demonstrate compliance with RBI regulatory mandates, which include data protection, event collection and analysis, endpoint controls, and related security measures.

STORY CONTINUES BELOW THIS AD

7. Need for incident response: In 2013, organisations will have to review their processes for dealing with a targeted attack. If the organisation falls foul from a targeted attack or Advanced Persistent Threat (APT) they will need to adopt a process of incident response and many organisations don’t necessarily have the technologies in place to ensure timely investigation and remediation is possible .As such, solutions providing incident response capabilities will become a security infrastructure priority for many organisations over the next year.

8. Security Process Automation: Interestingly, many organisations’ cyber security function is one of the only IT functions that have not yet leveraged the speed, visibility and comprehensive capabilities provided through automation. With an increasing number, variety and complexity of the threats faced by organisations, many security technologies still require significant hands-on management. We expect that IT managers will have to embrace security automation in order to keep up.

9. Connected Devices: We also anticipate the growth in number and variety of new connected devices will provide additional gateways for hackers to access personal or business networks – these ‘connected devices’ include connected homes and connected cars. While the home or car may not be hacked, they are used as a vehicle to access other networks.

STORY CONTINUES BELOW THIS AD

10. Bring Your Own Application (BYOA): With BYOD comes Bring Your Own Applications where many employees are now downloading Apps within the organisation. As a result IT Administrators are losing control of what tools and applications are used inside the Enterprise and business users (often lacking in an understanding of the potential security risks these applications can pose) are becoming their own system administrators. There are many examples of Apps that transmit information with no security, Apps that leak sensitive information, through to Apps that are malicious and place the user and the information at risk.

Tags
Security McAfee Malware threat
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Top Stories

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV