SYS-CON MEDIA Authors: Elizabeth White, Liz McMillan, Pat Romanski, Esmeralda Swartz, Kevin Jackson

News Feed Item

IID Finds Murder by Internet, NFC Exploits Emerge as Genuine Cybersecurity Threats in 2013

Company's Predictions for 2014 Coming True a Year Early; IID Projects Housefires and Burglaries Caused by Hackers for 2015

TACOMA, WA -- (Marketwired) -- 12/16/13 -- IID, securing the Internet with shared cyber intelligence, today issued a midterm report on its cybersecurity predictions for 2014, revealing we are on our way to seeing many of these prognostications become a reality. The company also released its cybersecurity predictions two years out for 2015, which includes housefires and burglaries caused by hackers, and the demise of Bitcoin and Tor. The below findings are expanded upon at internetidentity.com/news/?id=427.

2014 Predictions Scorecard
Last year at this time, IID boldly envisioned that by the end of 2014:

  • We will witness the first ever public case of murder via hacked Internet-connected device.

    There has yet to be a proven case of murder via Internet however precautions by the U.S. Food and Drug Administration and former Vice President Dick Cheney were put in place to prevent this. Conspiracy theories have also swirled around the death of controversial journalist Michael Hastings.

  • Almost all of the applications written to interface with Near Field Communication (NFC) technology will be riddled with security holes, and massive losses will ensue.

    Many proven examples of the significant security holes in NFC have surfaced but there have been no documented massive losses.

  • There will be a strong response to cyberthreats in the form of an intelligence-sharing network through which companies and government institutions can collaborate on attacks. Also, Congress will enact new cybersecurity legislation that provides safe harbor protections, enabling collaborators to share intelligence more freely.

    This has come true both through directives from President Barack Obama and from congressional action.

  • There will be a large increase of government-sanctioned malware targeting other government institutions around the globe with nation states openly engaging in acts of cyber-espionage and sabotage.

    This has come true with China emerging as a serious cyber espionage threat in 2013, and North Korea reportedly launching cyberattacks.

  • There will be at least one successful penetration of a major infrastructure component like a power grid that results in billions of dollars in damage.

  • There will be an exploit of a significant military assault system like drones that result in real-world consequences.

    Fortunately, neither of these final two predictions has proven accurate that IID is aware of.

"Remember, however, that these prognostications were made for the end-of-year 2014, which means we've got another year to go," said Paul Ferguson, vice president of threat intelligence at IID. "Of course, while IID doesn't normally like being wrong, we would be more than relieved if these potential catastrophes never come to fruition."

New IID Predictions for 2015
IID isn't interested in making easily foreseeable, short-term predictions. Consequently, these latest prognostications are intended for two years from now.

IID predicts the following by the end of 2015:

  • Due to the "Internet of Things," where virtually everything electronic is conveniently connected to the Internet, malicious hackers will take advantage by burning houses down remotely and/or remotely turning off security systems to allow burglars inside.
  • Users will shun Bitcoin, the untraceable digital currency exchange and Tor, the anonymous Web browser, due to the high amount of criminal activity on both. This will lead to their collapse.
  • Cybercriminals will leverage new generic top-level domains (i.e. .aero, .biz, .museum, etc.) to cause mass confusion and disruptions to enterprises and consumers.

For more details about how IID came to its findings, go to internetidentity.com/news/?id=427.

About IID
IID empowers threat intelligence sharing for enterprises and governments in a trusted environment that reaches beyond limited trust groups. The company aggregates and analyzes widely sourced threat data, and delivers actionable intelligence to facilitate the protection of assets, brands and users. Top financial firms, the largest government agencies, and leading e-commerce companies, social networks and ISPs leverage IID to detect and mitigate threats. For more information about IID, go to www.internetidentity.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Andrew Goss
VOXUS Inc. (for IID)
253.444.5446
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, ...
The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small time frames that were unimaginable a few years ago. The consequent move toward lean, agile, and fast development leads to the need for the development and operations sides to work very closely together. Thus, DevOps become...
SYS-CON Media announced that Cisco, a worldwide leader in IT that helps companies seize the opportunities of tomorrow, has launched a new ad campaign in Cloud Computing Journal. The ad campaign, a webcast titled 'Is Your Data Center Ready for the Application Economy?', focuses on the latest data center networking technologies, including SDN or ACI, and how customers are using SDN and ACI in their organizations to achieve business agility. The Cisco webcast is available on-demand.
Datapipe has acquired GoGrid, a provider of multi-cloud solutions for Big Data deployments. GoGrid’s proprietary orchestration and automation technologies provide 1-Button deployment for Big Data solutions that speed creation and results of new cloud projects. “GoGrid has made it easy for companies to stand up Big Data solutions quickly,” said Robb Allen, CEO, Datapipe. “Datapipe customers will achieve significant value from the speed at which we can now create new Big Data projects in the clou...
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what th...
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness,...
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, will discuss how DevSecOps got started and how it has evolved. Shannon Lietz has over two decades of experience pursuing next generation security solutions. She is currently the DevSecOps Leader for Intuit where she is responsible for setting and driv...
Dale Kim is the Director of Industry Solutions at MapR. His background includes a variety of technical and management roles at information technology companies. While his experience includes work with relational databases, much of his career pertains to non-relational data in the areas of search, content management, and NoSQL, and includes senior roles in technical marketing, sales engineering, and support engineering. Dale holds an MBA from Santa Clara University, and a BA in Computer Science f...
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. ...
SYS-CON Media announced today that PagerDuty has launched a popular blog feed on DevOps Journal. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. DevOps Journal brings valuable information to DevOps professionals who are transforming the way enterprise IT is done.
Things are being built upon cloud foundations to transform organizations. This CEO Power Panel at 15th Cloud Expo, moderated by Roger Strukhoff, Cloud Expo and @ThingsExpo conference chair, addressed the big issues involving these technologies and, more important, the results they will achieve. Rodney Rogers, chairman and CEO of Virtustream; Brendan O'Brien, co-founder of Aria Systems, Bart Copeland, president and CEO of ActiveState Software; Jim Cowie, chief scientist at Dyn; Dave Wagstaff, VP ...
SYS-CON Events announced today that CodeFutures, a leading supplier of database performance tools, has been named a “Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. CodeFutures is an independent software vendor focused on providing tools that deliver database performance tools that increase productivity during database development and increase database performance and scalability during production.
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software ...
Cloud Technology Partners on Wednesday announced it has been recognized by the Modern Infrastructure Impact Awards as one of the Best Amazon Web Services (AWS) Consulting Partners. Selected by the editors of TechTarget's SearchDataCenter.com, and by votes from customers and strategic channel partners, the companies acknowledged by the Modern Infrastructure Impact Awards represent the top providers of cloud consulting services for AWS including application migration, application development, inf...
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile ...