Welcome!

News Feed Item

IID Finds Murder by Internet, NFC Exploits Emerge as Genuine Cybersecurity Threats in 2013

Company's Predictions for 2014 Coming True a Year Early; IID Projects Housefires and Burglaries Caused by Hackers for 2015

TACOMA, WA -- (Marketwired) -- 12/16/13 -- IID, securing the Internet with shared cyber intelligence, today issued a midterm report on its cybersecurity predictions for 2014, revealing we are on our way to seeing many of these prognostications become a reality. The company also released its cybersecurity predictions two years out for 2015, which includes housefires and burglaries caused by hackers, and the demise of Bitcoin and Tor. The below findings are expanded upon at internetidentity.com/news/?id=427.

2014 Predictions Scorecard
Last year at this time, IID boldly envisioned that by the end of 2014:

  • We will witness the first ever public case of murder via hacked Internet-connected device.

    There has yet to be a proven case of murder via Internet however precautions by the U.S. Food and Drug Administration and former Vice President Dick Cheney were put in place to prevent this. Conspiracy theories have also swirled around the death of controversial journalist Michael Hastings.

  • Almost all of the applications written to interface with Near Field Communication (NFC) technology will be riddled with security holes, and massive losses will ensue.

    Many proven examples of the significant security holes in NFC have surfaced but there have been no documented massive losses.

  • There will be a strong response to cyberthreats in the form of an intelligence-sharing network through which companies and government institutions can collaborate on attacks. Also, Congress will enact new cybersecurity legislation that provides safe harbor protections, enabling collaborators to share intelligence more freely.

    This has come true both through directives from President Barack Obama and from congressional action.

  • There will be a large increase of government-sanctioned malware targeting other government institutions around the globe with nation states openly engaging in acts of cyber-espionage and sabotage.

    This has come true with China emerging as a serious cyber espionage threat in 2013, and North Korea reportedly launching cyberattacks.

  • There will be at least one successful penetration of a major infrastructure component like a power grid that results in billions of dollars in damage.

  • There will be an exploit of a significant military assault system like drones that result in real-world consequences.

    Fortunately, neither of these final two predictions has proven accurate that IID is aware of.

"Remember, however, that these prognostications were made for the end-of-year 2014, which means we've got another year to go," said Paul Ferguson, vice president of threat intelligence at IID. "Of course, while IID doesn't normally like being wrong, we would be more than relieved if these potential catastrophes never come to fruition."

New IID Predictions for 2015
IID isn't interested in making easily foreseeable, short-term predictions. Consequently, these latest prognostications are intended for two years from now.

IID predicts the following by the end of 2015:

  • Due to the "Internet of Things," where virtually everything electronic is conveniently connected to the Internet, malicious hackers will take advantage by burning houses down remotely and/or remotely turning off security systems to allow burglars inside.
  • Users will shun Bitcoin, the untraceable digital currency exchange and Tor, the anonymous Web browser, due to the high amount of criminal activity on both. This will lead to their collapse.
  • Cybercriminals will leverage new generic top-level domains (i.e. .aero, .biz, .museum, etc.) to cause mass confusion and disruptions to enterprises and consumers.

For more details about how IID came to its findings, go to internetidentity.com/news/?id=427.

About IID
IID empowers threat intelligence sharing for enterprises and governments in a trusted environment that reaches beyond limited trust groups. The company aggregates and analyzes widely sourced threat data, and delivers actionable intelligence to facilitate the protection of assets, brands and users. Top financial firms, the largest government agencies, and leading e-commerce companies, social networks and ISPs leverage IID to detect and mitigate threats. For more information about IID, go to www.internetidentity.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Andrew Goss
VOXUS Inc. (for IID)
253.444.5446
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walked through how Octob...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
SYS-CON Events announced today that Catchpoint, a leading digital experience intelligence company, has been named “Silver Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Catchpoint Systems is a leading Digital Performance Analytics company that provides unparalleled insight into your customer-critical services to help you consistently deliver an amazing customer experience. Designed for digital business, C...
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
"We formed Formation several years ago to really address the need for bring complete modernization and software-defined storage to the more classic private cloud marketplace," stated Mark Lewis, Chairman and CEO of Formation Data Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.