“Internet for Citizens” (also known as Internet Things) has become one of the leading technologies in technology 2013, so Google Trends can be easily seen. This term refers to increasing digitalization of everyday objects – any new technology device is designed with connection in mind whether the device in question is a smart tv or smart tooth. With more and more online devices, make sure that these devices become one of the biggest security challenges.
Increased players and reality
2014 has a fantastic series of exciting technologies to start. The players have a lot to look forward to: Not only did the last console war begin, but Valve will also bring the Linux game forward with the steam engine, Oculus Rift can revolutionize the interactive game. Gambling has already been a profitable goal for offenders, where game accounts are traded regularly in criminal forums. If the steam engines are popular, Linux malware can be on the cards.
2014 may be the year in which the extra reality (RA) begins to become more prevalent in everyday life. There are lots of AR apps that you can play on your smartphone; However, a phone is not suitable for AR. You have to pick it out of the pocket, unlock it, open an app, take it to the item you’re interested in – and even after all, you work with a relatively small screen of 4 or 5 inches.
AR works best with full immersion – and this is portable technology like Google Glass and SpaceGlasses. There are many interesting and even psychological attacks that can be performed against these devices. For example, the owners of these devices (literally) go with a camera attached to their head. It’s not great for a bank malware expert to realize that this is a great way to keep your PIN and bank passwords.
SCADA then four
Since the discovery of Stuxnet, the ICS / SCADA community has had an intense control of the security industry. Most security conferences now contain at least one SCADA-secure chat. Trend Micro’s proposed threat research team launched a series of papers on the subject in 2013 and showed that SCADA is not only attacking theoretically but actually occurs.
By 2014, this will certainly continue, especially in targeted assaults or cases of deposit and abstinence. A new area begins heating for researchers and security attacks – the entire area of radio communication. Because the radio does not use wires and is sent “magically” through the air, many people assume (inaccurate) that it is certain.
Trend Micro has shown that the AIS standard for ship tracking has many problems this year – and other researchers have shown similar problems with ADS-B (used in the aircraft). We expect to see more research published in 2014. More technology than ever in mind, or being easily accessible from the remote – is suddenly connected to the Internet and leaves your security barriers to everyone watching them.
With all this exciting and new technology on the horizon will Internet Assaults be a major issue in 2014? No, we do not think so. Although we are confident that the attacks on IoT inventories and basic architecture will be an important area of attack in the future, this future will not be until 2015 and beyond.
As discussed later in our 2014 predictions, what is now missing is the “abductor app” that will drive the adoption of an IOT. There are many innovative devices, but no major development. Google Glass (or something) may be the closest to finding your “slaughtered app”, but even then it will take time to be complete. Only at that time – when there is a critical mass of targetable users – it makes sense for offenders to go after it.
But when this device reaches the big appeal – this world’s cyber crime will not be slow to trade.