Page All:
Page 1
Trend Micro 2012 Threat Predictions: Attacks Take on More Sophistication in the Post-PC, BYOD Era
CUPERTINO, Calif., Dec. 12, 2011 /PRNewswire/ -- The upcoming new year will see cybercriminals act with even more persistency and sophistication, as the world shifts from the PC-centric desktop toward mobile and cloud computing. The repercussion for IT administrators will be an imperative to approach security with a data-centric framework - protecting the data, not just the systems -- according to Trend Micro's global network of threat researchers and analysts. The company has just released its "12 Threat Predictions for 2012" report that spans four primary areas: Big IT trends, mobile landscape, threat landscape, and data leaks and breaches.
Trend Micro's "12 Threat Predictions for 2012" include:
The real challenge for data center owners will be the increasing complexities of securing physical, virtual, and cloud-based systems.
While attacks specifically targeting virtual machines (VMs) and cloud computing services remain a possibility, attackers will find no immediate need to resort to these because conventional attacks will remain effective in these new environments. Virtual and cloud platforms are just as easy to attack but more difficult to protect. The burden will thus fall on IT administrators who will have to secure their company's critical data as they adopt these technologies.
Security and data breach incidents in 2012 will force companies worldwide to face BYOD-related challenges.
The Bring-Your-Own-Device (BYOD) Consumerization Era is here to stay. With more corporate data stored or accessed by devices that are not fully controlled by IT administrators, the likelihood of data loss incidents caused by improperly secured personal devices will rise.
Security vulnerabilities will be found in legitimate mobile apps, making data extraction easier for cybercriminals.
Mobile platform threats usually come in the form of malicious apps, but moving forward, Trend Micro expects cybercriminals to go after legitimate apps, finding vulnerabilities or coding errors that can lead to data exposure or theft.
More hacker groups will pose a bigger threat to organizations that protect highly sensitive data.
Online groups such as Anonymous and LulzSec rose to prominence in 2011, targeting companies and individuals for various political reasons. These groups are likely to become even more motivated in 2012. They will become more skilled both at penetrating organizations and at avoiding detection by IT professionals and law enforcement agencies.
The new social networking generation will redefine "privacy."
Young social networkers have a different attitude toward protecting and sharing information: They are more likely to reveal personal information online to a wider audience beyond their friends. In time, privacy-conscious people will become the minority--an ideal prospect for attackers.
Supporting assets
-- Watch CTO Raimund Genes expand upon these predictions with further
insight and commentary in this new video here.
http://www.youtube.com/watch?v)5NnwdrYDA
-- To download the full "12 Predictions for 2012" report, please visit:
http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandana
lysis/12_security_predictions_for_2012.pdf
About Trend Micro
Trend Micro Incorporated (TYO: 4704; TSE: 4704) a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.
Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://trendmicro.mediaroom.com and as part of an RSS feed at http://www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.
<font size="2" face="Arial"> </font>
SOURCE Trend Micro Incorporated
Trend Micro Incorporated
CONTACT: Andrea Mueller, Trend Micro, Public Relations, andrea_mueller@trendmicro.com
Web Site: http://www.trendmicro.com
Trend Micro 2012 Threat Predictions: Attacks Take on More Sophistication in the Post-PC, BYOD Era
CUPERTINO, Calif., Dec. 12, 2011 /PRNewswire/ -- The upcoming new year will see cybercriminals act with even more persistency and sophistication, as the world shifts from the PC-centric desktop toward mobile and cloud computing. The repercussion for IT administrators will be an imperative to approach security with a data-centric framework - protecting the data, not just the systems -- according to Trend Micro's global network of threat researchers and analysts. The company has just released its "12 Threat Predictions for 2012" report that spans four primary areas: Big IT trends, mobile landscape, threat landscape, and data leaks and breaches.
Trend Micro's "12 Threat Predictions for 2012" include:
The real challenge for data center owners will be the increasing complexities of securing physical, virtual, and cloud-based systems.
While attacks specifically targeting virtual machines (VMs) and cloud computing services remain a possibility, attackers will find no immediate need to resort to these because conventional attacks will remain effective in these new environments. Virtual and cloud platforms are just as easy to attack but more difficult to protect. The burden will thus fall on IT administrators who will have to secure their company's critical data as they adopt these technologies.
Security and data breach incidents in 2012 will force companies worldwide to face BYOD-related challenges.
The Bring-Your-Own-Device (BYOD) Consumerization Era is here to stay. With more corporate data stored or accessed by devices that are not fully controlled by IT administrators, the likelihood of data loss incidents caused by improperly secured personal devices will rise.
Security vulnerabilities will be found in legitimate mobile apps, making data extraction easier for cybercriminals.
Mobile platform threats usually come in the form of malicious apps, but moving forward, Trend Micro expects cybercriminals to go after legitimate apps, finding vulnerabilities or coding errors that can lead to data exposure or theft.
More hacker groups will pose a bigger threat to organizations that protect highly sensitive data.
Online groups such as Anonymous and LulzSec rose to prominence in 2011, targeting companies and individuals for various political reasons. These groups are likely to become even more motivated in 2012. They will become more skilled both at penetrating organizations and at avoiding detection by IT professionals and law enforcement agencies.
The new social networking generation will redefine "privacy."
Young social networkers have a different attitude toward protecting and sharing information: They are more likely to reveal personal information online to a wider audience beyond their friends. In time, privacy-conscious people will become the minority--an ideal prospect for attackers.
Supporting assets
-- Watch CTO Raimund Genes expand upon these predictions with further
insight and commentary in this new video here.
http://www.youtube.com/watch?v)5NnwdrYDA
-- To download the full "12 Predictions for 2012" report, please visit:
http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandana
lysis/12_security_predictions_for_2012.pdf
About Trend Micro
Trend Micro Incorporated (TYO: 4704; TSE: 4704) a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.
Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://trendmicro.mediaroom.com and as part of an RSS feed at http://www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.
<font size="2" face="Arial"> </font>
SOURCE Trend Micro Incorporated
Trend Micro Incorporated
CONTACT: Andrea Mueller, Trend Micro, Public Relations, andrea_mueller@trendmicro.com
Web Site: http://www.trendmicro.com