6 emerging security trends, from electric cars to the connected home

Dell has released its annual Threat Report, highlighting emerging threat trends and looking at the most common attacks observed in 2015.

The report is based on research from Dell’s Global Response Intelligence Defense (GRID) network and telemetry data from Dell SonicWall network traffic, and aims to identify emerging threats facing organizations of all sizes.

Looking back at the 2014 threat landscape, Dell reported a surge in point-of-sale malware, increased malware traffic within encrypted web protocols, and a doubling of attacks on supervisory control and data acquisition (SCADA) systems.

“Everyone knows the threats are real and the consequences are dire, so we can no longer blame lack of awareness for the attacks that succeed,” said Patrick Sweeney, executive director of Dell Security, in a statement. “Hacks and attacks continue to occur, not because companies aren’t taking security measures, but because they aren’t taking the right ones.”

Looking ahead to 2015, Dell also offered predictions around six emerging security trends that organizations should be aware of and planning for going into the coming year, and beyond.

  • Two-factor authentication: Dell believes more organizations will develop security policies that require two-factor authentication and, consequently, attacks against biometrics and other two-factor authentication solutions will increase.
  • Android still a target: Dell expects new and more sophisticated attack techniques to be targeting Android devices, attempting to thwart Android malware researchers by making the malware harder to identify. Android malware will also become more tailored, targeting specific apps, banks, and user demographics, as well as technologies.
  • Wearable malware: With wearable technology growing in popularity, only to be furthered by the coming release of the Apple Watch, Dell warns the first wave of malware targeting wearables is not far away.
  • Digital cash: Dell expects digital currencies like Bitcoin to remain in the crosshairs for cybercriminals, with botnets being employed for digital currency mining attacks.
  • Connected home: DDoS attacks will no longer be restricted to PCs, as Dell expects home routers and home network utilities like surveillance systems to be compromised and enlisted by attackers for their DDoS attacks
  • Not my car: With more and more technology going into our cars, Dell expects electric vehicles and their operating systems will be targeted by attackers.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Jeff Jedras
Jeff Jedras
Jeff Jedras is a technology journalist with IT World Canada and a member of the IT Business team. He began his career in technology journalism in the late 1990s, covering the Ottawa technology sector for Silicon Valley North and the Ottawa Business Journal. He later covered the technology scene in Vancouver before joining IT World Canada in Toronto in 2005, covering enterprise IT for ComputerWorld Canada and the channel for Computer Dealer News. His writing has also appeared in the Vancouver Sun & the Ottawa Citizen.

Featured Story

How the CTO can Maintain Cloud Momentum Across the Enterprise

Embracing cloud is easy for some individuals. But embedding widespread cloud adoption at the enterprise level is...

Related Tech News

Get ITBusiness Delivered

Our experienced team of journalists brings you engaging content targeted to IT professionals and line-of-business executives delivered directly to your inbox.

Featured Tech Jobs