Welcome!

News Feed Item

IID Finds Murder by Internet, NFC Exploits Emerge as Genuine Cybersecurity Threats in 2013

Company's Predictions for 2014 Coming True a Year Early; IID Projects Housefires and Burglaries Caused by Hackers for 2015

TACOMA, WA -- (Marketwired) -- 12/16/13 -- IID, securing the Internet with shared cyber intelligence, today issued a midterm report on its cybersecurity predictions for 2014, revealing we are on our way to seeing many of these prognostications become a reality. The company also released its cybersecurity predictions two years out for 2015, which includes housefires and burglaries caused by hackers, and the demise of Bitcoin and Tor. The below findings are expanded upon at internetidentity.com/news/?id=427.

2014 Predictions Scorecard
Last year at this time, IID boldly envisioned that by the end of 2014:

  • We will witness the first ever public case of murder via hacked Internet-connected device.

    There has yet to be a proven case of murder via Internet however precautions by the U.S. Food and Drug Administration and former Vice President Dick Cheney were put in place to prevent this. Conspiracy theories have also swirled around the death of controversial journalist Michael Hastings.

  • Almost all of the applications written to interface with Near Field Communication (NFC) technology will be riddled with security holes, and massive losses will ensue.

    Many proven examples of the significant security holes in NFC have surfaced but there have been no documented massive losses.

  • There will be a strong response to cyberthreats in the form of an intelligence-sharing network through which companies and government institutions can collaborate on attacks. Also, Congress will enact new cybersecurity legislation that provides safe harbor protections, enabling collaborators to share intelligence more freely.

    This has come true both through directives from President Barack Obama and from congressional action.

  • There will be a large increase of government-sanctioned malware targeting other government institutions around the globe with nation states openly engaging in acts of cyber-espionage and sabotage.

    This has come true with China emerging as a serious cyber espionage threat in 2013, and North Korea reportedly launching cyberattacks.

  • There will be at least one successful penetration of a major infrastructure component like a power grid that results in billions of dollars in damage.

  • There will be an exploit of a significant military assault system like drones that result in real-world consequences.

    Fortunately, neither of these final two predictions has proven accurate that IID is aware of.

"Remember, however, that these prognostications were made for the end-of-year 2014, which means we've got another year to go," said Paul Ferguson, vice president of threat intelligence at IID. "Of course, while IID doesn't normally like being wrong, we would be more than relieved if these potential catastrophes never come to fruition."

New IID Predictions for 2015
IID isn't interested in making easily foreseeable, short-term predictions. Consequently, these latest prognostications are intended for two years from now.

IID predicts the following by the end of 2015:

  • Due to the "Internet of Things," where virtually everything electronic is conveniently connected to the Internet, malicious hackers will take advantage by burning houses down remotely and/or remotely turning off security systems to allow burglars inside.
  • Users will shun Bitcoin, the untraceable digital currency exchange and Tor, the anonymous Web browser, due to the high amount of criminal activity on both. This will lead to their collapse.
  • Cybercriminals will leverage new generic top-level domains (i.e. .aero, .biz, .museum, etc.) to cause mass confusion and disruptions to enterprises and consumers.

For more details about how IID came to its findings, go to internetidentity.com/news/?id=427.

About IID
IID empowers threat intelligence sharing for enterprises and governments in a trusted environment that reaches beyond limited trust groups. The company aggregates and analyzes widely sourced threat data, and delivers actionable intelligence to facilitate the protection of assets, brands and users. Top financial firms, the largest government agencies, and leading e-commerce companies, social networks and ISPs leverage IID to detect and mitigate threats. For more information about IID, go to www.internetidentity.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Andrew Goss
VOXUS Inc. (for IID)
253.444.5446
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change the...
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
SYS-CON Events announced today that IoT Now has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
Updating DevOps to the latest production data slows down your development cycle. Probably it is due to slow, inefficient conventional storage and associated copy data management practices. In his session at @DevOpsSummit at 20th Cloud Expo, Dhiraj Sehgal, in Product and Solution at Tintri, will talk about DevOps and cloud-focused storage to update hundreds of child VMs (different flavors) with updates from a master VM in minutes, saving hours or even days in each development cycle. He will also...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
SYS-CON Events announced today that WineSOFT will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Based in Seoul and Irvine, WineSOFT is an innovative software house focusing on internet infrastructure solutions. The venture started as a bootstrap start-up in 2010 by focusing on making the internet faster and more powerful. WineSOFT’s knowledge is based on the expertise of TCP/IP, VPN, SSL, peer-to-peer, mob...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
With billions of sensors deployed worldwide, the amount of machine-generated data will soon exceed what our networks can handle. But consumers and businesses will expect seamless experiences and real-time responsiveness. What does this mean for IoT devices and the infrastructure that supports them? More of the data will need to be handled at - or closer to - the devices themselves.
SYS-CON Events announced today that Dataloop.IO, an innovator in cloud IT-monitoring whose products help organizations save time and money, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Dataloop.IO is an emerging software company on the cutting edge of major IT-infrastructure trends including cloud computing and microservices. The company, founded in the UK but now based in San Fran...
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...