MUMBAI, INDIA: As wearable technology becomes more widespread in the next year, expect to see the first wave of malware targeting these devices. Another area to watch is Digital currencies including Bitcoin which will continue to be targeted; Botnets will be involved in the digital currency mining attacks. Home routers and home network utilities, such as surveillance systems, will be targeted and perhaps used to assist large DDoS attacks.
Dell’s Threat Report has identified some trends and predictions and hints that more organizations will enforce security policies that include two-factor authentication. Along with this development there is expected an increase in attacks against these technologies.
Android will remain a hot target for malware writers. Dell expects new, more sophisticated techniques to thwart Android malware researchers and users by making the malware hard to identify and research.
The emergence of more malware for Android devices targeting specific apps, banks, and user demographics, along with more malware tailored for specific technologies, such as watches and televisions, is expected.
It also adds that Electric vehicles and their operating systems will be targeted.
The data for Dell’s report was gathered by the Dell Global Response Intelligence Defense (GRID) Network, which sources information from a number of devices and resources including more than 1 million security sensors in more than 200 countries; activity from honeypots in Dell’s threat centers; malware/IP reputation data from tens of thousands of firewalls and email security devices around the globe; and shared threat intelligence from more than 50 industry collaboration groups and research organizations; intelligence from freelance security researchers; as well as spam alerts from millions of computer users protected by Dell SonicWALL email security solutions.
Murli Mohan, Director and General Manager, Dell Software Group, India said, “Companies more often focus on protecting against existing security (cyber) issues and the known vulnerabilities, the next gen threats have become turned out to be advanced and hazardous. Mega trend such as BYOD, big data, cloud, mobile computing, Internet of things, and mobile apps continue to disrupt the cyber behavior. Today, organizations need to be well-equipped to ensure protection from both existing and previously undetected threats and a predictive and context aware security fabric that will evolve and adapt to business needs.”