{"id":52767,"date":"2015-01-15T07:42:46","date_gmt":"2015-01-15T12:42:46","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/experts-pick-the-top-5-security-threats-for-2015\/"},"modified":"2015-01-15T07:42:46","modified_gmt":"2015-01-15T12:42:46","slug":"experts-pick-the-top-5-security-threats-for-2015","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/politically-incorrect\/experts-pick-the-top-5-security-threats-for-2015\/","title":{"rendered":"Experts pick the top 5 security threats for 2015"},"content":{"rendered":"<p><p>    Massive,     high-profile data breachespockmarked 2014,    culminating in the bizarre events surrounding the hack of Sony    Picturesallegedly    by North Korea in retaliation for the politically incorrect    stoner comedy     The Interview. Thats a tough act to follow, but Im    sure 2015 will make an effort. I spoke with security    experts to find out what we have to look forward to.  <\/p>\n<p>    1. IoT: The    Insecurity of Things  <\/p>\n<p>    The Internet of Things has    become an inundation of things. Hundreds of innovative,    connected devices have emerged to interact with, track,    monitor, and simplify just about every area of our lives.    Butthese technologies typically have access to sensitive,    personal information, and they also introduce a wide variety of    new security issues for attackers to exploit.  <\/p>\n<p>    2015 may be the year that IoT    takes on a new meaningthe Insecurity of Things. In previous    years the Internet of Things was not a big deal,\" warns Robert    Hansen, VP of WhiteHat Labs for WhiteHat Security, \"but    were seeing an increasing number of vulnerabilities in    internet capable devices, like TVs, home security systems,    automation.  <\/p>\n<p>    2. Sophisticated DDoS    Attacks  <\/p>\n<p>    Denial-of-service attacks are    more of an annoyance than anything else. They dont directly    steal your information, or cause any overt harmthey just flood    a site or service with so much traffic that it becomes    overwhelmed and prevents legitimate users from connecting to    it. As many     Xbox and PlayStation gamers learned over the holidays,    though, DDoS attacks are becoming more advanced, and have a    very real impact.  <\/p>\n<p>    In 2014, DDoS attacks became    much more sophisticated. Though much of the reporting focused    on the size of attacks, a more troubling trend was the    advancement in attack techniques, stresses Barry Shteiman,    director of security strategy for Imperva. He notes that attackers    have evolved beyond simple flooding of traffic, and can now    morph and adapt based on the defenses in place on the target    network.  <\/p>\n<p>    3. Social Media    attacks  <\/p>\n<p>    Mark Bermingham, director of    global B2B marketing atKaspersky    Lab, anticipates a rise in social media and waterholing    attackscompromising a website or service commonly used by the    target group in an effort to infect one or more of them, and    allow the malware to spread from there.Attackers continue    to develop new techniques to exploit social networks. As    Bermingham puts it, Security measures cant overcome stolen    credentials and click-throughs to dubious links.  <\/p>\n<p>    Kevin Epstein, VP of advanced    security and governance at     Proofpoint, agrees that social media attacks are a serious    concern for 2015. In a     recent blog post, he notes, In 2015, Proofpoint expects    inappropriate or malicious social media content to grow 400    percent as attackers target enterprise social media accounts to    perpetrate confidence schemes, distribute malware, and steal    customer data.Greater awareness and vigilance are the    best defenses.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2867566\/experts-pick-the-top-5-security-threats-for-2015.html\/RK=0\/RS=JKNQe8JJVsL1t4MMCCUiJTMD_FY-\" title=\"Experts pick the top 5 security threats for 2015\">Experts pick the top 5 security threats for 2015<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Massive, high-profile data breachespockmarked 2014, culminating in the bizarre events surrounding the hack of Sony Picturesallegedly by North Korea in retaliation for the politically incorrect stoner comedy The Interview. Thats a tough act to follow, but Im sure 2015 will make an effort. I spoke with security experts to find out what we have to look forward to <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/politically-incorrect\/experts-pick-the-top-5-security-threats-for-2015\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":["post-52767","post","type-post","status-publish","format-standard","hentry","category-politically-incorrect"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/52767"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=52767"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/52767\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=52767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=52767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=52767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}