IT Security in 2013: Cloud, Mobile Devices, HTML5 to Get More Scrutiny
Embedded Systems Under Attack
As the number of connected devices continues to grow, researchers have started to pay more attention to the security of embedded computer systems and have discovered all too often that many of these systems were not designed with security in mind. At the Black Hat security conferences over the past two years, there were a number of sessions that touched on examples of this, from a hack against car computers to an exploit of a vulnerable insulin pump. In 2013, expect attackers and researchers alike to continue poking holes in the systems inside common devices.
You don't need a crystal ball to predict that the threat landscape for 2013 will be treacherous for organizations. Observers of the security space witnessed numerous examples this year of sophisticated hacks and malware, some of which was used in cyber-espionage campaigns designed to stay hidden and pilfer information. It was also a year that saw some cutting-edge research into embedded security, mobile devices and other areas. As we head into 2013, security professionals can expect hackers to continue to innovate. But just what forms will those innovations take, and what previously ignored attack vectors will now be the focus of hackers' attention? While the crystal balls security vendors use to predict the future are always cloudy, the white-hat community has some juicy theories as to what may be in store for organizations in 2013. Here, eWEEK has compiled some of the better predictions for the coming year to help your organization get a head start on preparation. Without further ado, here are some of the top security predictions for 2013.