Welcome!

@CloudExpo Authors: Pat Romanski, Elizabeth White, Liz McMillan, Zakia Bouachraoui, Yeshim Deniz

News Feed Item

Trend Micro Releases Security Predictions for 2013 & Beyond

Security Threats to Business, the Digital Lifestyle, and the Cloud Highlight Report

CUPERTINO, Calif., Dec. 13, 2012 /PRNewswire/ -- Threats to Android, the Cloud and digital lifestyle devices will make fighting cybercriminals more complex in 2013 than ever before, according to a report released today by the global cloud security leader Trend Micro Incorporated.

"In 2013, people are going to have a harder time managing the security of their devices," said Raimund Genes, CTO, Trend Micro. "Different platforms, operating systems and security models will make it more difficult to protect ourselves than ever before."

The Trend report, "Security Threats to Business, the Digital Lifestyle, and the Cloud," outlines the 10 top threats facing business and consumers next year. It is now available for download.

Among its findings:

  • The most serious threat during 2013 may be malicious and high-risk Android apps. Trend predicts they will reach 1 million in 2013, up from 350,000 at the end of 2012.
  • While traditional PC malware may recede a bit next year, threats to devices running the Android operating system will more than replace it.
  • The emergence of more digital lifestyle devices means that threats could appear in new and unexpected places, such as television sets and home appliances.
  • Africa appears on its way to becoming the next safe harbor for cybercriminals on the run.

Other predictions include:

  • Slow adoption of Windows 8 by business means consumers will be the leading beneficiaries from its security enhancements during the coming year.
  • Cybercriminals will target legitimate cloud services and data breaches will remain a serious threat in 2013, in part because existing security tools do not protect cloud data as well as traditional storage.
  • Consumers will increasingly use multiple computing platforms and devices, making securing them a difficult challenge.
  • Politically motivated attacks will become more destructive during 2013.
  • Conventional malware threats will evolve gradually, with few, if any, significant new attacks. Still, attacks that do occur will become more sophisticated and harder to detect.
  • Efforts to address global cybercrime are gaining traction, but will take two or three more years to reach full implementation.

There is, however, hope amid this gloomy forecast.

"The good news is that the timing is perfect for security defenders to set new standards and deliver new solutions that will have a disturbing impact on the underground economy," said Genes.

If that happens, 2013 may be remembered as a decisive turning point in the war on cybercrime.

Supporting assets:

Trend Micro, CTO, Raimund Genes, Video blog

CTO Blog:
http://ctoinsights.trendmicro.com/2012/12/2013-threat-predictions/

Security Intelligence Blog
http://blog.trendmicro.com/trendlabs-security-intelligence/predictions-for-2013

"The Growing Threat of Mobile Malware"
http://about-threats.trendmicro.com/us/mobilehub/mobilereview/rpt_mothly_mobile_review_201209_the_growing_problem_of_mobile_adware.pdf

"US 2012 Election Apps May Lead to Data Disclosure"
http://blog.trendmicro.com/trendlabs-security-intelligence/us-2012-election-apps-may-lead-to-data-disclosure/

"More Adware and PLANKTON Variants Seen in App Stores"
http://blog.trendmicro.com/trendlabs-security-intelligence/more-adware-and-plankton-variants-seen-in-app-stores/

"Apps As Browsers: Can You Trust Your Mobile Apps"
http://blog.trendmicro.com/trendlabs-security-intelligence/apps-as-browsers-can-you-trust-your-mobile-apps/

"Only 20% of Android Mobile Device Users Have a Security App installed"
http://fearlessweb.trendmicro.com/2012/misc/only-20-of-android-mobile-device-users-have-a-security-app-installed/

THE REPORT IS AVAILABLE AT:
http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/spotlight-articles/sp-trend-micro-predictions-for-2013-and-beyond.pdf

About Trend Micro

Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ global threat intelligence data mining framework, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. 

Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://newsroom.trendmicro.com/  and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Jo Peterson is VP of Cloud Services for Clarify360, a boutique sourcing and benchmarking consultancy focused on transforming technology into business advantage. Clarify360 provides custom, end-to-end solutions from a portfolio of more than 170 suppliers globally. As an engineer, Jo sources net new technology footprints, and is an expert at optimizing and benchmarking existing environments focusing on Cloud Enablement and Optimization. She and her team work with clients on Cloud Discovery, Cloud Planning, Cloud Migration, Hybrid IT Architectures ,Cloud Optimization and Cloud Security. Jo is a 25-year veteran in the technology field with tenure at MCI, Intermedia/Digex, Qwest/CenturyLink in pre-sales technical, selling and management roles.
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.