/ciol/media/post_banners/wp-content/uploads/2014/11/ID-100240948.jpg)
BANGALORE, INDIA: Emergency maintenance releases will consume a lot more of the vendors' time and resources in 2015, resulting in a slowdown to the pace of innovation overall, said Ambarish Deshpande, MD- India, Blue Coat Systems.
Here is the complete information security predictions for 2015 by the vendor, based on reports produced by it in 2014 and the industry trends witnessed so far.
Privacy and security dig in for a long war
Encrypted Traffic will Increase…So will Data Breaches– Use of encryption will continue to increase to protect consumer privacy. Malware will increasingly hide behind encryption to evade detection by most enterprises that are struggling to balance employee privacy with attacks hiding behind encryption.
Big media will say no to malvertising
As Malvertising Increases, Media Companies will Pressure Ad Partners– Major Media properties will increasingly display ads from partner networks that host malware. As the risks of infection by visitors to their Web properties increase, these media companies will put more pressure on their ad partners to eliminate malvertising.
2015 will be the year of PUS...Eww
Potentially unwanted software (PUS) is picking up on mobile devices. Hidden deep down in end-user licensing agreements and frequently missed by users downloading free aps, PUS will increasingly be part of downloads to gather information about your web surfing, in order to "improve your browsing experience", such as serving you more relevant advertisements. As PUS is increasingly added to free software by developers seeking to monetize their creations, it will slow down -- and even destabilize -- an infected devices.
“ . . . In unmarked bills or you will never see your data again
Ransomware will Aim Higher and Cost More --Ransomware hit a lot of people in 2014. The next logical next step for ransomware creators is to say “how can I increase value from my victim?” Blue Coat predicts that the next real targets will be small businesses or small government organizations – entities with hundreds of thousands in their bank account. These attacks will involve conducting reconnaissance on target computers/systems – not just blindly encrypting all the documents. If attacks can access the network storage, attacks can demand higher ransoms.
In your face!
Attackers will Get Social - Attack tools will increasingly leverage information from social networks to customize the attacks in a better way. Most targeted attacks have a social context, which increases efficacy and is easier to do now. Attackers will exploit their knowledge of target victims to gain access to critical systems and data.
Big brother will absolutely be watching
The Rise of Espionageware – While it was relatively low in volume in 2014, expect an increase in surveillance software that is created by security companies or nation states to monitor certain people. As international conflicts emerge, these tools will inevitably be used to keep track of what people are doing and whether they’re a security risk or not.
Heartbleed, shellshock, and poodle, oh my…
“Common mode failure" events, where a single defect causes failures to ripple through a system, like Heartbleed, Shellshock. Vulnerability seekers (researchers, attackers) have had their first taste of this, and there's no going back now. In 2015 we expect to see:
-Increased development and technology costs, as developers start to invest more in code analysis on open-source, or move toward commercial alternatives where a 3rd party / licensee can be liable
-Open source factionalizing, as more "indignant forking" starts to happen, like LibreSSL
-A slowdown to the pace of innovation overall, as vendors are forced to spend more resources on emergency maintenance releases.