2 min read

The future of IT Security

Răzvan LIVINTZ

October 07, 2010

The future of IT Security

A few months ago, a very good friend and colleague of mine asked me about the future of IT Security. To be more precise, he wanted to know what the prospects look like for our domain and who will be the main driver: the vendor, the end-user, the criminal or the government?

In my opinion, the realm of IT&C Security has reached a more diverse and intricate stage today compared to where it used to stand, let’s say, ten years ago. On the one hand, there’s the proliferation of high-speed Internet connections in the last decade, which has become a standard de facto for both business and home users. As I have travelled quite a lot lately, it has become even more obvious to me that almost everywhere (in Europe and the Americas) all you need to do is open your wireless adaptor and easily find at least one or two networks strong enough to be used.

On the other hand, there’s the advent of Web 2.0 and of other communication sites based on new technologies as well as their rapid evolution during the past 5 years. On my way home there is always someone next to me who either texts, tweets or e-mails someone else using a laptop, netbook or a mobile phone.

What I believe to be obvious in both cases is the fact that these developments have opened the way to a new type of connection between individuals (with all its pros and cons), while also creating specific means for companies to do business and reach their customers (just think about the way you can check in at the airport using a bar code you receive onto your smart phone).

Meanwhile, attackers, hackers, harvesters, phishers and spammers have got their own share of profit from this advance in technology. The dark masterminds behind e-threats and cybercrime have multiplied, spreading globally and organizing into genuine underground networks, which follow a simple, yet unique goal – profit. Just as in any other industry, to ensure considerable gains, cybercriminals needed a way to compromise a large number of systems within which to deploy as many bots, and as much adware and spyware as possible, at little or no cost at all. This is exactly what the current architecture of WWW offers. To give you a simple example, no farther than last week, when connecting my laptop through a wire to a friend’s network, my security suite notified me about a dozen of port listening attempts in less than five minutes.

Hence, the most difficult task of today’s cybercrime is not that of disseminating malware and spam, but that of breaching the security of networks and computers and of exposing them to other threats, while also remaining undetected. This fact explains both the automation of spread processes, as well as the heavy mass production of e-threats in the past years. As a countermeasure, data security vendors have introduced heuristics and behavior-based technologies to make malware writers’ job more difficult, and they are now focusing on “in-the-cloud” defensive systems, on-line backup and encryption mechanisms.

As for users… well, we’ll see about them in the next post. Until then, as usual, safe surfing everybody!

All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of their respective owners.

tags


Author



Right now

Top posts

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read
The Top Five Security Risks Smartphone Users Face Today

The Top Five Security Risks Smartphone Users Face Today

July 02, 2021

4 min read
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

July 02, 2021

3 min read
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

June 30, 2021

2 min read
Mobile security threats: reality or myth?

Mobile security threats: reality or myth?

June 13, 2021

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

How to keep your Android device immune to malicious vaccine themed apps How to keep your Android device immune to malicious vaccine themed apps
Cristina POPOV

April 22, 2021

2 min read
Facebook Takes Down Two Hacking Groups Operating out of Palestine Facebook Takes Down Two Hacking Groups Operating out of Palestine
Silviu STAHIE

April 22, 2021

2 min read
Ransomware attack causes supermarket cheese shortage in the Netherlands Ransomware attack causes supermarket cheese shortage in the Netherlands
Graham CLULEY

April 13, 2021

2 min read