AppRiver Presents Top Security Trend Predictions For 2014

December 11, 2013

AppRiver Presents Top Security Trend Predictions For 2014

AppRiver, LLC, a leading provider of email messaging and Web security solutions, today released its list of the top IT security trend predictions for 2014.

AppRiver's security experts actively monitor cyber-risks 24 hours a day, every day. By scanning millions of messages, they uncover new and emerging threats in real time, helping AppRiver protect its 45,000 client businesses worldwide.

Based on the company's 11 years of experience blocking spam, viruses and malware - combined with its most recent threat data -- AppRiver predicts organizations will see the following in 2014:

State-sponsored Attacks and Cyber-espionage-Security professionals are keenly aware of the frequency and success rate of state-sponsored cyber attacks, but for many others it is out-of-sight and out-of-mind (quick…look away!). Every day, critical infrastructure and organization entities face state-sponsored cyber attack. Far less common is for nation states to admit being behind them. But as more countries become equipped, empowered and emboldened to orchestrate these attacks we can only expect the frequency and severity to increase.

Nontraditional, Internet-connected Device Attacks-There is proof-of-concept evidence that it could be possible to take control of medical devices such as a pacemaker. Though this is a pretty terrifying scenario, it has yet to happen in the real world. Of course, not all devices are as crucial as the pacemaker, but that doesn't deter hackers who enjoy "pranking" hacks, which target devices connected to the Internet like Internet-controlled thermostats. With more and more things connected to the Internet we can expect to these attacks to rise in 2014.

Improved Public Awareness of the Cost of Cybercrime-Cybercriminals are targeting a staggering number of people and businesses for the purpose of mass data theft. They are after anything of value such as credit card numbers, personal information (that can be used for identity theft), bank account details, corporate trade secrets and more. As long as this type of data is stored online then it will always be targeted by malicious actors- individual hackers, activist groups, organized crime rings or nation states.

Adobe-like Breaches-In October 2013, Adobe announced that there had been a security breach in its systems. The breach included the source code of Adobe's ColdFusion and Acrobat software along with 150 million active user accounts according to reports. With so many breaches of user data, the data can end up being sold to the highest bidder. With all of that information, it can make issuing attacks or stealing money easier for the attacker later on. But in a case of stolen software or source code, there is also a large risk of a hacker knowing the ins and outs of the software thereby allowing them to write malicious code aimed at weaknesses they find. With the source code at their power, we may be seeing these exploits come to light in 2014 and more Adobe patches being created for the new exploits.

Mobile Malware-Along with the growing popularity of mobile devices, malware has been lurking right alongside. Most malware targets Google's Android operating system. The Android OS is more of an open operating system compared to iOS or the Blackberry OS, allowing developers to have more freedom in the creation of apps, which in turn provides more opportunity for those developers to create malware. With Android being the most popular mobile device operating system out there, we suspect to see the malware volume continue to increase in 2014. As the mobile malware market continues to grow next year, Google will most likely be right there taking steps to further secure the Android operating system.

Ransomware-Thanks to the media hype and the sheer effectiveness of malware such as Citadel and CryptoLocker in 2013, we should expect to see a continued if not an increased use of Ransomware well into 2014. CryptoLocker's technique of encrypting data on its targets making it unusable even after CryptoLocker is removed proved to be highly effective for the cybercriminals. When something works for the bad guys, they tend to stick with it. The only thing that would possibly hinder the appearances of more Ransomware on the horizon would be the capture of the CryptoLocker group by authorities.

The Onion Router-Thanks to the recent arrests of Ross Ulbricht, founder of the Silk Road, and his associates, there will be a lot of chatter about what's next for TOR and the hidden internet, or Deep Web, as it's sometimes called. As the FBI proved with the Silk Road arrests however, TOR isn't completely anonymous anymore. People will be having the discussion about whether or not we will truly be able to remain anonymous online.

About AppRiver

AppRiver is a Software-as-a-Service (SaaS) provider offering award-winning email and Web security solutions to businesses of all sizes. Understanding the need to protect networks from today's increasingly complex IT threats, AppRiver offers businesses a comprehensive, yet affordable subscription-based solution that incorporates the latest spam and virus protection, email encryption and Web security on the market. In addition, the company provides a complete managed service for Microsoft Exchange, as well as a bundled Office 365 solution. Since its inception, AppRiver has sustained an impressive 93% customer retention rate while growing its customer base to more than 45,000 companies and over 8 million mailboxes worldwide. The company maintains offices in Florida, New York and Switzerland, and is led by an Ernst & Young Florida Entrepreneur of the Year award winner. For more information, please visit www.appriver.com.