A few months ago, a very good friend and colleague of mine asked me about the future of IT Security. To be more precise, he wanted to know what the prospects look like for our domain and who will be the main driver: the vendor, the end-user, the criminal or the government?
In my opinion, the realm of IT&C Security has reached a more diverse and intricate stage today compared to where it used to stand, let’s say, ten years ago. On the one hand, there’s the proliferation of high-speed Internet connections in the last decade, which has become a standard de facto for both business and home users. As I have travelled quite a lot lately, it has become even more obvious to me that almost everywhere (in Europe and the Americas) all you need to do is open your wireless adaptor and easily find at least one or two networks strong enough to be used.
On the other hand, there’s the advent of Web 2.0 and of other communication sites based on new technologies as well as their rapid evolution during the past 5 years. On my way home there is always someone next to me who either texts, tweets or e-mails someone else using a laptop, netbook or a mobile phone.
What I believe to be obvious in both cases is the fact that these developments have opened the way to a new type of connection between individuals (with all its pros and cons), while also creating specific means for companies to do business and reach their customers (just think about the way you can check in at the airport using a bar code you receive onto your smart phone).
Meanwhile, attackers, hackers, harvesters, phishers and spammers have got their own share of profit from this advance in technology. The dark masterminds behind e-threats and cybercrime have multiplied, spreading globally and organizing into genuine underground networks, which follow a simple, yet unique goal – profit. Just as in any other industry, to ensure considerable gains, cybercriminals needed a way to compromise a large number of systems within which to deploy as many bots, and as much adware and spyware as possible, at little or no cost at all. This is exactly what the current architecture of WWW offers. To give you a simple example, no farther than last week, when connecting my laptop through a wire to a friend’s network, my security suite notified me about a dozen of port listening attempts in less than five minutes.
Hence, the most difficult task of today’s cybercrime is not that of disseminating malware and spam, but that of breaching the security of networks and computers and of exposing them to other threats, while also remaining undetected. This fact explains both the automation of spread processes, as well as the heavy mass production of e-threats in the past years. As a countermeasure, data security vendors have introduced heuristics and behavior-based technologies to make malware writers’ job more difficult, and they are now focusing on “in-the-cloud” defensive systems, on-line backup and encryption mechanisms.
As for users… well, we’ll see about them in the next post. Until then, as usual, safe surfing everybody!
All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of their respective owners.