Stonesoft Predicts the Top Security Threats for 2013

Stonesoft predicts that the world will experience more unseen and unknown targeted cyber-attacks, espionage, and hacking in the coming year.

With 2013 just around the corner, IT security experts reflect on what has been and predict what is yet to come. Below are network security vendor Stonesoft’s top six predictions around the threats that we will be seeing in 2013.

“I believe in 2013 the security of the digital world will become even more dominant. It is a security trend, which is growing rapidly at the moment, and its importance will just continue to grow in the future,” says Jarno Limnell, director of cyber-security at Stonesoft. “This means there is also an increasing need and pressure to think about international norms, rules and regulations.”

With over 20 years of experience in network security, Stonesoft’s predicts:

1. The world will experience more targeted cyber-attacks. The development of highly sophisticated malware by state-sponsored organizations has the potential to radically affect the speed at which the wider threat landscape evolves. Cyber threats will become more unpredictable than ever before.

2. Espionage by nation-states will continue to rise. In 2012, botnets and malware silently sent the whole contents of the user’s hard drive to a control machine. This will continue to be a problem in 2013. The protection of critical national infrastructure will continue to be an extremely important aspect of cyber security.

3. Hacking will grow and become increasingly relevant and dreaded ­ in particular; it will become more aggressive and its means and impact will become more powerful. At the same time, the role of non-nation players will become more important, particularly in respect to expertise, not just resources.

4. We will see even more advanced evasions techniques (AETs) being used against organizations and governments. As security technologies and the overall capability to catch cyber criminals and hackers improve, they will invest their R&D resources in developing increasingly sophisticated and stealthy attack delivery technologies to improve their ROI. The most worrying part of this is that current security technologies are not capable of stopping AETs and the targets will remain unaware that they have been attacked.

5. In 2012, there were a lot of vulnerabilities in closed source enterprise applications such as Oracle, SAP and SCADA. These applications contain business critical data and are highly valuable targets for intruders. This will continue to be a problem in 2013.

6. Hackers will continue to target Android. The platform provides an attractive environment for malware, and hackers will take advantage of this. It is likely we will see the first global consumer brand go bankrupt as a consequence of a cyber-attack that ruins its reputation and customer confidence.

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.