SlideShare a Scribd company logo
2015 CYBERSECURITY 
PREDICTIONS
THE YEAR 2015 IS GOING TO BE 
A LANDMARK YEAR FOR MOBILE.
W E ’ R E G O I N G T O S E E A N I N C R E A S E I N 
PRIVACY CONCERNS, MALWARE IN 
THE U.S., AND iOS ATTACKS. 
B U T W E ’ L L A L S O W I T N E S S 
BIG CHANGES IN THE WAY THE WORLD 
THINKS ABOUT SECURITY AND THE 
TECHNOLOGY BEHIND THE PROTECTION 
W E A L L D E P E N D U P O N A N D T R U S T.
LOOKOUT CO-FOUNDERS JOHN HERING 
AND KEVIN MAHAFFEY PUT TOGETHER THIS 
LIST OF PREDICTIONS – THE WAY WE SEE 
THE MOBILE SECURITY INDUSTRY MOVING.
There will no longer be a 
technology industry. All industries 
will be technology industries. 
K E V I N M A H A F F E Y
AS THE DIGITAL SURFACE AREA 
INCREASES, SECURITY AND 
PRIVACY WILL BE CRITICAL.
In the past, there has been a divide between 
technology companies—Facebook, Google, 
Yahoo, Oracle—and the rest of the economy. 
! 
Getting a taxi, booking a hotel, watching a 
movie, listening to music, and buying a used 
car are all examples where technology is 
transforming industries that would not, in the 
past, consider themselves to be technology 
industries. 
! 
Existing companies will either turn 
themselves into technology companies or be 
disrupted by innovative competitors
Privacy concerns will head 
J O H N H E R I N G 
to the enterprise.
ENTERPRISES WILL BE INCREASINGLY 
FACED WITH A SET OF COMPLICATED 
CHALLENGES AS THEY STRIVE TO 
RESPECT INDIVIDUAL PRIVACY WHILE 
KEEPING CORPORATE INTERESTS 
SAFE FROM ATTACKERS.
Regardless of who owns the device, 
smartphones and tablets have become 
innately personal, oftentimes housing 
personal photos and banking information 
alongside corporate data. That means that 
most employees want some level of control 
over the device. 
! 
Multinational corporations will have a 
particularly tough time as each country in 
which they operate has unique regulations 
and user expectations with regard to 
privacy.
Cybercrime will just be 
called crime. 
K E V I N M A H A F F E Y
AS MORE VALUE IN THE WORLD IS 
STORED ON CONNECTED COMPUTING 
DEVICES, THERE’S MORE INCENTIVE 
FOR CRIMINALS TO STOP STEALING 
CARS AND START STEALING DATA AND 
MONEY FROM COMPUTERS.
In the past, crimes committed using 
computers were so rare relative to 
physical-world crimes that we gave them a 
fancy name, “cybercrime.” Today, 
prominent organizations are hacked on a 
weekly basis and as a result, millions of 
consumers are put at risk of identity theft 
and financial fraud whether it be through 
their PC or mobile device. 
! 
The Center for Strategic and International 
Studies estimated the likely annual cost of 
cybercrime and economic espionage to 
the world economy at more than $400 
billion. This shift to online crime is a 
benefit and a curse. The curse is that 
breaches can be much more severe in the 
online world, but the benefit is that we 
have new tools such as predictive security 
to prevent crime and catch criminals that 
are not practical to deploy in physical-world 
crime.
United States will become more 
of a target for mobile malware. 
J O H N H E R I N G
THE U.S. HAS TYPICALLY REMAINED 
SOMEWHAT REMOVED FROM THE 
MOBILE MALWARE AND THREATS 
SEEN IN OTHER PARTS OF THE WORLD. 
THAT WON’T BE THE CASE FOR LONG.
NotCompatible, a kind of malware that turns 
phones into bots, targeted between 4 and 4.5 
million U.S. smartphones this year. We estimate 
that U.S. phones were an attractive target 
because U.S. IP addresses are like a high-profile 
zip code. Having access to a range of them 
would give malware operators the legitimacy 
to target American entities, such as 
TicketMaster for scalping tickets. 
! 
We also saw hundreds of thousands of Android 
users in the U.S. affected by a particularly 
concerning form of malware called 
“ransomware” -- so named because it literally 
holds its victims’ devices hostage until they pay 
a ransom. Given the ransomware authors’ 
success in 2014, there will likely be more 
versions of ransomware introduced to the U.S. 
market in 2015.
Mainstream iOS attacks 
will increase. 
K E V I N M A H A F F E Y
NO COMPUTING DEVICE IS IMMUNE FROM 
ATTACK; HOWEVER, SOME ARE LESS 
FREQUENTLY TARGETED THAN OTHERS.
While targeted remote access trojans 
(RATs) and exploits have existed on iOS 
for years, now that iOS has gained 
significant market share around the 
world, criminals have begun targeting it 
more broadly. 
! 
For example, the WireLurker malware 
that was discovered in November 
monitors any iOS device connected via 
USB with an infected OS X computer and 
installs downloaded third-party or 
malicious applications onto the device, 
regardless of whether it is jailbroken. 
This makes all iOS devices vulnerable, 
not just those that have been jailbroken. 
! 
As iOS continues to grow around the 
world, particularly in emerging markets, 
we’ll likely see more attackers focus their 
efforts on mainstream iOS users.
Companies will replace reactive 
security with predictive security. 
K E V I N M A H A F F E Y
BREACHES OF HIGH-PROFILE COMPANIES 
HAVE BECOME THE NORM. THE SECURITY 
STATUS QUO IN MOST ENTERPRISES 
CLEARLY DOES NOT WORK.
Anti-virus tries to identify attacks that 
have been used in the past, but attackers 
can slightly modify their code to get 
around signatures. Behavioral 
sandboxes installed on the network 
perimeter try to fool attackers into 
executing their payloads in a virtual 
environment, but either can’t identify 
sophisticated attacks or produce so 
much noise that they are unusable. 
! 
Early-adopter security organizations 
have started using large datasets and 
machine intelligence to predict attacks 
on their internal networks. Mobile and 
cloud will start to see predictive security 
get more widely adopted over the next 
two years.
Pre-installed malware 
will increase. 
K E V I N M A H A F F E Y
AS LOW-COST ANDROID PHONES HIT 
THE WORLD MARKET AT MASSIVE 
SCALE, ATTACKERS WILL START 
TARGETING THE SUPPLY CHAIN TO 
PRE-INSTALL MALWARE ON DEVICES.
In the past year, Lookout identified two 
families of malware pre-loaded on 
phones, Deathring and Mouabad. 
Because pre-loaded malware is part of 
the “system” partition of a device, it is 
nearly impossible for ordinary users to 
remove it. 
! 
Such supply chain issues are particularly 
concerning to businesses who may have 
employees bring in their own, pre-exploited 
devices onto the sensitive 
corporate network.
Internet of Things/wearable 
devices will not be a priority 
for cybercriminals… yet. 
J O H N H E R I N G
IOT AND WEARABLES ARE NOT 
MAINSTREAM ENOUGH YET, AND 
WON’T BE FOR ANOTHER 3-5 YEARS, TO 
BE SIGNIFICANT TARGETS FOR 
CYBERCRIMINALS.
Today, cybercriminals remain focused on 
the most lucrative targets: PCs and 
increasingly, mobile devices. It will take 
multiple generations of wearables and 
IoT devices on the market to achieve the 
critical mass necessary for us to be 
highly concerned. 
! 
That said, connected devices need to be 
built with a potential threat top of mind, 
particularly given the amount of sensitive 
or personal information they have the 
ability to store and transmit.
Vulnerable apps will become a 
bigger problem than vulnerable 
operating systems. 
K E V I N M A H A F F E Y
AS DEVELOPERS SEEK TO 
CHURN OUT APPS FASTER THAN 
THEIR COMPETITORS, SECURITY 
AND PRIVACY ARE OFTEN AN 
AFTERTHOUGHT.
As of January 2014, mobile apps (not 
mobile browsers) replaced desktop web 
browsers as the primary way people use 
the Internet. Mobile operating systems 
have been getting more secure over the 
past several years; however the attack 
surface due to mobile apps has 
increased. 
! 
Apps can contain vulnerabilities that put 
both their data at risk as well as open a 
hole for a network-based attacker to run 
arbitrary code on a device. For example, 
with a recent vulnerability (Android 
unsafe usage of addJavascriptInterface), 
Lookout measured over 90,000 apps 
that were likely vulnerable. This is an 
impossible patch logistics problem. 
Operating system patch cycles are still a 
problem, but the numbers are relatively 
tractable relative to the huge numbers 
of mobile apps.
For more mobile security information, follow

More Related Content

What's hot

Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
Lookout
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
IBM Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Lookout
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
Skycure
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
Stephanie Vanroelen
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
SHOLOVE INTERNATIONAL LLC
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
IBM Security
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
Santosh Satam
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Craig Walker, CISSP
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
NowSecure
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
Anjoum .
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approach
NowSecure
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
Ping Identity
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
Kavita Rastogi
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
Innovation Network Technologies: InNet
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
Saad Ahmad
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
Mahima Anand Sharma
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
IBM Security
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
Kim Jensen
 

What's hot (20)

Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approach
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 

Viewers also liked

What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
Lookout
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
Lookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
Lookout
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
Okta-Inc
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
Skyhigh Networks
 
Lava Jato: Reclamação Constitucional
Lava Jato: Reclamação ConstitucionalLava Jato: Reclamação Constitucional
Lava Jato: Reclamação Constitucional
Luiz Carlos Azenha
 
펜션평창『LG777』.『XYZ』제주도팬션예약
펜션평창『LG777』.『XYZ』제주도팬션예약펜션평창『LG777』.『XYZ』제주도팬션예약
펜션평창『LG777』.『XYZ』제주도팬션예약
dehryes
 
LMS What's Out There and How to Decide
LMS What's Out There and How to DecideLMS What's Out There and How to Decide
LMS What's Out There and How to Decide
Lori Reed
 
El mito de el Dorado - lectura octavo-noviembre
El mito de el Dorado - lectura octavo-noviembreEl mito de el Dorado - lectura octavo-noviembre
El mito de el Dorado - lectura octavo-noviembre
Colegio Camilo Henríquez
 
Los 7 hábitos de la gente altamente efectiva
Los 7 hábitos de la gente altamente efectivaLos 7 hábitos de la gente altamente efectiva
Los 7 hábitos de la gente altamente efectiva
digennaromarina12
 

Viewers also liked (12)

What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
iPad for Administrators
iPad for AdministratorsiPad for Administrators
iPad for Administrators
 
Lava Jato: Reclamação Constitucional
Lava Jato: Reclamação ConstitucionalLava Jato: Reclamação Constitucional
Lava Jato: Reclamação Constitucional
 
펜션평창『LG777』.『XYZ』제주도팬션예약
펜션평창『LG777』.『XYZ』제주도팬션예약펜션평창『LG777』.『XYZ』제주도팬션예약
펜션평창『LG777』.『XYZ』제주도팬션예약
 
LMS What's Out There and How to Decide
LMS What's Out There and How to DecideLMS What's Out There and How to Decide
LMS What's Out There and How to Decide
 
El mito de el Dorado - lectura octavo-noviembre
El mito de el Dorado - lectura octavo-noviembreEl mito de el Dorado - lectura octavo-noviembre
El mito de el Dorado - lectura octavo-noviembre
 
Los 7 hábitos de la gente altamente efectiva
Los 7 hábitos de la gente altamente efectivaLos 7 hábitos de la gente altamente efectiva
Los 7 hábitos de la gente altamente efectiva
 

Similar to 2015 Cybersecurity Predictions

BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
- Mark - Fullbright
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
EMC
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
EMC
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
Javier Gonzalez
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
Juniper Networks
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
Kulani Mahadewa
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
acijjournal
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
- Mark - Fullbright
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
Core Security
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
Courion Corporation
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016
James_08
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
at MicroFocus Italy ❖✔
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
kostikjaylonshaewe47
 

Similar to 2015 Cybersecurity Predictions (20)

BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 

More from Lookout

When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
Lookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
Lookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
Lookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
Lookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
Lookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
Lookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
Lookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
Lookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
Lookout
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
Lookout
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
Lookout
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
Lookout
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
Lookout
 
Dragon lady
Dragon ladyDragon lady
Dragon ladyLookout
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
Lookout
 
History of Lookout
History of LookoutHistory of Lookout
History of LookoutLookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up Lookout
Lookout
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
Lookout
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101Lookout
 

More from Lookout (19)

When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up Lookout
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

2015 Cybersecurity Predictions

  • 2. THE YEAR 2015 IS GOING TO BE A LANDMARK YEAR FOR MOBILE.
  • 3. W E ’ R E G O I N G T O S E E A N I N C R E A S E I N PRIVACY CONCERNS, MALWARE IN THE U.S., AND iOS ATTACKS. B U T W E ’ L L A L S O W I T N E S S BIG CHANGES IN THE WAY THE WORLD THINKS ABOUT SECURITY AND THE TECHNOLOGY BEHIND THE PROTECTION W E A L L D E P E N D U P O N A N D T R U S T.
  • 4. LOOKOUT CO-FOUNDERS JOHN HERING AND KEVIN MAHAFFEY PUT TOGETHER THIS LIST OF PREDICTIONS – THE WAY WE SEE THE MOBILE SECURITY INDUSTRY MOVING.
  • 5. There will no longer be a technology industry. All industries will be technology industries. K E V I N M A H A F F E Y
  • 6. AS THE DIGITAL SURFACE AREA INCREASES, SECURITY AND PRIVACY WILL BE CRITICAL.
  • 7. In the past, there has been a divide between technology companies—Facebook, Google, Yahoo, Oracle—and the rest of the economy. ! Getting a taxi, booking a hotel, watching a movie, listening to music, and buying a used car are all examples where technology is transforming industries that would not, in the past, consider themselves to be technology industries. ! Existing companies will either turn themselves into technology companies or be disrupted by innovative competitors
  • 8. Privacy concerns will head J O H N H E R I N G to the enterprise.
  • 9. ENTERPRISES WILL BE INCREASINGLY FACED WITH A SET OF COMPLICATED CHALLENGES AS THEY STRIVE TO RESPECT INDIVIDUAL PRIVACY WHILE KEEPING CORPORATE INTERESTS SAFE FROM ATTACKERS.
  • 10. Regardless of who owns the device, smartphones and tablets have become innately personal, oftentimes housing personal photos and banking information alongside corporate data. That means that most employees want some level of control over the device. ! Multinational corporations will have a particularly tough time as each country in which they operate has unique regulations and user expectations with regard to privacy.
  • 11. Cybercrime will just be called crime. K E V I N M A H A F F E Y
  • 12. AS MORE VALUE IN THE WORLD IS STORED ON CONNECTED COMPUTING DEVICES, THERE’S MORE INCENTIVE FOR CRIMINALS TO STOP STEALING CARS AND START STEALING DATA AND MONEY FROM COMPUTERS.
  • 13. In the past, crimes committed using computers were so rare relative to physical-world crimes that we gave them a fancy name, “cybercrime.” Today, prominent organizations are hacked on a weekly basis and as a result, millions of consumers are put at risk of identity theft and financial fraud whether it be through their PC or mobile device. ! The Center for Strategic and International Studies estimated the likely annual cost of cybercrime and economic espionage to the world economy at more than $400 billion. This shift to online crime is a benefit and a curse. The curse is that breaches can be much more severe in the online world, but the benefit is that we have new tools such as predictive security to prevent crime and catch criminals that are not practical to deploy in physical-world crime.
  • 14. United States will become more of a target for mobile malware. J O H N H E R I N G
  • 15. THE U.S. HAS TYPICALLY REMAINED SOMEWHAT REMOVED FROM THE MOBILE MALWARE AND THREATS SEEN IN OTHER PARTS OF THE WORLD. THAT WON’T BE THE CASE FOR LONG.
  • 16. NotCompatible, a kind of malware that turns phones into bots, targeted between 4 and 4.5 million U.S. smartphones this year. We estimate that U.S. phones were an attractive target because U.S. IP addresses are like a high-profile zip code. Having access to a range of them would give malware operators the legitimacy to target American entities, such as TicketMaster for scalping tickets. ! We also saw hundreds of thousands of Android users in the U.S. affected by a particularly concerning form of malware called “ransomware” -- so named because it literally holds its victims’ devices hostage until they pay a ransom. Given the ransomware authors’ success in 2014, there will likely be more versions of ransomware introduced to the U.S. market in 2015.
  • 17. Mainstream iOS attacks will increase. K E V I N M A H A F F E Y
  • 18. NO COMPUTING DEVICE IS IMMUNE FROM ATTACK; HOWEVER, SOME ARE LESS FREQUENTLY TARGETED THAN OTHERS.
  • 19. While targeted remote access trojans (RATs) and exploits have existed on iOS for years, now that iOS has gained significant market share around the world, criminals have begun targeting it more broadly. ! For example, the WireLurker malware that was discovered in November monitors any iOS device connected via USB with an infected OS X computer and installs downloaded third-party or malicious applications onto the device, regardless of whether it is jailbroken. This makes all iOS devices vulnerable, not just those that have been jailbroken. ! As iOS continues to grow around the world, particularly in emerging markets, we’ll likely see more attackers focus their efforts on mainstream iOS users.
  • 20. Companies will replace reactive security with predictive security. K E V I N M A H A F F E Y
  • 21. BREACHES OF HIGH-PROFILE COMPANIES HAVE BECOME THE NORM. THE SECURITY STATUS QUO IN MOST ENTERPRISES CLEARLY DOES NOT WORK.
  • 22. Anti-virus tries to identify attacks that have been used in the past, but attackers can slightly modify their code to get around signatures. Behavioral sandboxes installed on the network perimeter try to fool attackers into executing their payloads in a virtual environment, but either can’t identify sophisticated attacks or produce so much noise that they are unusable. ! Early-adopter security organizations have started using large datasets and machine intelligence to predict attacks on their internal networks. Mobile and cloud will start to see predictive security get more widely adopted over the next two years.
  • 23. Pre-installed malware will increase. K E V I N M A H A F F E Y
  • 24. AS LOW-COST ANDROID PHONES HIT THE WORLD MARKET AT MASSIVE SCALE, ATTACKERS WILL START TARGETING THE SUPPLY CHAIN TO PRE-INSTALL MALWARE ON DEVICES.
  • 25. In the past year, Lookout identified two families of malware pre-loaded on phones, Deathring and Mouabad. Because pre-loaded malware is part of the “system” partition of a device, it is nearly impossible for ordinary users to remove it. ! Such supply chain issues are particularly concerning to businesses who may have employees bring in their own, pre-exploited devices onto the sensitive corporate network.
  • 26. Internet of Things/wearable devices will not be a priority for cybercriminals… yet. J O H N H E R I N G
  • 27. IOT AND WEARABLES ARE NOT MAINSTREAM ENOUGH YET, AND WON’T BE FOR ANOTHER 3-5 YEARS, TO BE SIGNIFICANT TARGETS FOR CYBERCRIMINALS.
  • 28. Today, cybercriminals remain focused on the most lucrative targets: PCs and increasingly, mobile devices. It will take multiple generations of wearables and IoT devices on the market to achieve the critical mass necessary for us to be highly concerned. ! That said, connected devices need to be built with a potential threat top of mind, particularly given the amount of sensitive or personal information they have the ability to store and transmit.
  • 29. Vulnerable apps will become a bigger problem than vulnerable operating systems. K E V I N M A H A F F E Y
  • 30. AS DEVELOPERS SEEK TO CHURN OUT APPS FASTER THAN THEIR COMPETITORS, SECURITY AND PRIVACY ARE OFTEN AN AFTERTHOUGHT.
  • 31. As of January 2014, mobile apps (not mobile browsers) replaced desktop web browsers as the primary way people use the Internet. Mobile operating systems have been getting more secure over the past several years; however the attack surface due to mobile apps has increased. ! Apps can contain vulnerabilities that put both their data at risk as well as open a hole for a network-based attacker to run arbitrary code on a device. For example, with a recent vulnerability (Android unsafe usage of addJavascriptInterface), Lookout measured over 90,000 apps that were likely vulnerable. This is an impossible patch logistics problem. Operating system patch cycles are still a problem, but the numbers are relatively tractable relative to the huge numbers of mobile apps.
  • 32. For more mobile security information, follow