• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   CTO Insights   »   Trend Micro Predictions for 2013 and Beyond: Threats to Business, the Digital Lifestyle, and the Cloud

Trend Micro Predictions for 2013 and Beyond: Threats to Business, the Digital Lifestyle, and the Cloud

  • Posted on:December 13, 2012 at 4:29 am
  • Posted in:CTO Insights, Malware, Mobile
  • Author:Raimund Genes (Chief Technology Officer)
1

As the year draws to a close it’s time for us to take a step back, absorb the lessons of 2012, and look at what 2013 and beyond will bring for users, the security industry, and even cybercriminals. Here are some of my predictions:

The volume of malicious and high-risk Android apps will hit 1 million in 2013.

As Android grows, so does the threat of malicious and high risk apps for its users. In 2013, we will be able to detect a million Android apps – a threefold increase from the 350,000 projected to be found by the end of 2012. Android may well be on its way to dominating the mobile space the way Windows dominated the desktop/laptop arena, but this very popularity lures in attackers and cybercriminals.

This growth is likely to result in an arms race between attackers and Android security providers, similar to the one that occurred more than a decade ago in the Windows ecosystem. However, these steps will not decrease the platform’s appeal to criminals.

Consumers will use multiple computing platforms and devices. Securing these will be complex and difficult.

The Windows-centric computing environment of the past has been replaced with a diverse, multi-screen environment thanks to tablets and smartphones. Each operating system brings its own unique usage model and interface. Because of this, it becomes a challenge for users to secure each and every device they own.

It’s quite possible that many users will simply give up and leave the defaults are in place. However, these may not be the most secure or private settings.

Conventional malware threats will only gradually evolve, with few, if any, new threats. Attacks will become more sophisticated in terms of deployment.

Malware authors already have a wide variety of tools at their disposal to carry out their objectives. Because of these, I expect conventional malware to evolve relatively slowly. Developments here will largely revolve around refinements to existing tools, or as a response to moves by security vendors. (A good example of the latter case in 2012 was the release of Blackhole Exploit Kit 2.0, a direct response to successful efforts to block attacks that used the previous 1.x version.)

What will change is how the attacks are conducted. What we will see is an increase in the sophistication, skill, and cunning in how victims are made to click on links, open e-mails, and download attachments.

Africa will become a new safe harbor for cybercriminals.

Africa is already home to the infamous 419 scam. As cybercriminals elsewhere feel the heat from law enforcement in their home countries, they are likely to set up shop in Africa.

There are two factors that will drive this development. First of all, the continent’s Internet infrastructure is gradually improving. Secondly, local law enforcement of anti-cybercrime laws is still weak. This combination could make cybercrime a “growth industry” in Africa.

These are just some of my predictions for 2013 and beyond. The rest of my predictions can be found in our full predictions document titled Security Threats to Business, the Digital Lifestyle, and the Cloud, which you can read by clicking the cover below.

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: 2013predictions

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
  • August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
  • Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.