Your privacy: After the
Your money: In 2014, cybercriminals will continue to develop tools for stealing cash – directly or indirectly. To plunder pockets directly, fraudsters will further refine their tools, designed to access the bank accounts of mobile device owners (mobile
Your Bitcoins: There will be a considerable rise in the number of attacks targeting the Bitcoin users’ wallets, Bitcoin pools and stock exchanges.
How it will affect businesses
Internet service providers: A number of popular Internet services have already announced the implementation of additional measures to protect user data, for example, encryption of all data transmitted between their own servers. Implementing more sophisticated measures will continue and is likely to become a key factor when users choose between rival web services.
Cloud storage providers: Hackers are targeting Cloud service employees, seeing them as
Software developers: The theft of popular product sources (gaming industry, mobile apps developers, etc.,) gives attackers an excellent opportunity to find vulnerabilities in the products and further use them for their own fraudulent purposes. In addition, if cybercriminals have access to the victim’s repositories, they can modify the programme source code and embed backdoors into it.
Rival companies: Snowden’s leaks have demonstrated that one of the goals of cyber espionage between states is to provide economic aid to ‘friendly’ companies. This factor has broken down the ethical barriers which initially restrained businesses from using unconventional methods to compete with their rivals. In the new realities of cyberspace, businesses are contemplating the possibility of conducting this kind of activity for themselves. Companies will employ cyber-mercenaries, organised groups of qualified hackers who can offer bespoke cyber-espionage services.
A fragmented World Wide Web on the cards?
“The Internet has begun to break up into national segments. Snowden’s revelations have intensified the demand for rules prohibiting the use of foreign services. Individual countries are no longer willing to let a single byte of information out of their networks. These aspirations will grow stronger and legislative restrictions will inevitably transform into technical prohibitions. The next step will most likely be attempts to limit foreign access to data inside a country. As this trend develops further, it may lead at some point to the collapse of the current Internet, which will break into dozens of national networks. The shadowy Darknet will then be the only truly World Wide Web,” says Alexander Gostev, chief security expert of the global research & analysis team.
Several countries have adopted or are planning to adopt legislation prohibiting the use of foreign services. In November, Germany announced that all communications between the German authorities would be fully locked within the country.
Altaf Halde is the Managing Director, Kaspersky Lab -South Asia.
Image: Thinkstock