Intel's McAfee Labs Publishes Threat Predictions Report


Where do you go to get the most updated information on iCloud security for yourself or your business? If you are searching for some reliable information, then try Intel.

The company’s Security department released its McAfee Labs 2017 Threats Predictions Report. This report identifies 14 threat trends to watch in 2017, the most critical developments to watch for in cloud security and the Internet of Things (IoT) security, and the six most difficult-to-solve challenges facing the cyber security industry.

The researchers at Intel extended an invitation to 31 of its Security thought leaders to ask their opinions on the topic. The report examined current trends in cybercrime and made predictions about what the future may hold for organizations working to take advantage of new technologies for both advancement of their businesses and security protection.

“To change the rules of the game between attackers and defenders, we need to neutralize our adversaries’ greatest advantages,” said Vincent Weafer, vice president, Intel Security’s McAfee Labs.

What are some of the predictions for the upcoming year? The report predicts that ransomware attacks will decrease in volume and effectiveness in the second half of 2017. Windows vulnerability exploits will continue to decline. At the same time, those targeting infrastructure software and virtualization software will increase. Also hardware and firmware will be increasingly targeted by sophisticated attackers.

The McAfee Report noted that hackers using software running on laptops will attempt “dronejackings” for a variety of criminal or hacktivist purposes. Mobile attacks will combine mobile device locks with credential theft, which will allow cyber thieves to access such things as banks accounts and credit cards. IoT malware will open backdoors into the connected home that could go undetected for years. Machine learning will accelerate the proliferation of and increase the sophistication of social engineering attacks. And fake ads and purchased “likes” will continue to proliferate and erode consumers’ trust. This upcoming year could prove to have security departments at major companies on their toes.

The McAfee Labs report also described more of the role of the hacktivist. They are able to hack more easily with ad copied by attackers to boost malware delivery capabilities.

It is of the utmost of importance that companies and cybercrime units come together to target those hacktivists who could pose a threat and put an end to their cyber attacks.

How will Intel’s Security attempt to solve this menacing problem?

“As a new defensive technique is developed, its effectiveness increases until attackers are compelled to develop countermeasures to evade it. To overcome the designs of our adversaries, we need to go beyond understanding the threat landscape to changing the defender-attacker dynamics in six key areas: information asymmetry, making attacks more expensive, improving visibility, better identifying exploitation of legitimacy, improving protection for decentralized data, and detecting and protecting in agentless environments,” said Weafer.

Intel will continue to strive to protect their consumers from cyber attacks and other types of breaches through their technology and their dedication to assisting in the protection of cyber security.  

Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]
Related Articles

iVALT Builds Upon IoT Security Measures and Smarter Device Management

By: Alex Passett    6/18/2024

iVALT is looking to stake its claim as a top provider of identity security solutions, and IoT is just one area it can provide support for.

Read More

Accelerating Greatness in IoT: Soracom Officially Joins the AWS ISV Accelerate Program

By: Alex Passett    6/18/2024

Official as of this morning, Soracom Inc. - a provider of advanced IoT solutions on a global scale - announced that it has joined the AWS ISV Accelera…

Read More

Extending the 'Reach' for Powering In-Flight Drones, Courtesy of Engineers at Reach

By: Alex Passett    6/17/2024

"Wireless Power-at-a-Distance" solutions provider Reach has successfully demonstrated how a unified mesh network and wireless power transfer (WPT) sys…

Read More

New Wi-Fi 6 Module from Ezurio will Tackle Greater Connectivity for IIoT Applications

By: Alex Passett    6/17/2024

Ezurio (i.e. the rebranded name of the company known formerly as Laird Connectivity) has announced a new addition to its portfolio of Wi-Fi 6 modules:…

Read More

ICYMI: Your Mid-June 'IoT TGIF' News Recap

By: Alex Passett    6/14/2024

We've compiled a handful of Internet of Things stories that will benefit readers interested autonomous racecars, robotics deployments and more IoT dev…

Read More