Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

The Top Threats of 2013 According to ENISA

E-mail Print PDF

EU cyber security agency ENISA releases its Threat Landscape 2013 report, an annual analysis of over 200 reports and articles with the aim to find the top security threats, adversaries and trends of the year.

ENISA"This threat analysis presents indispensable information for the cyber security community regarding the top threats in cyber-space, the trends, and how adversaries are setting up their attacks by using these threats," ENISA executive director Prof. Udo Helmbrecht says.

According to the report threat agents have become even more sophisticated in attacks and tools, while attack patterns and tools targeting PCs have now migrated to the mobile ecosystem as Big Data and the Internet of Things emerge as the digital battlefields of the (near) future.

ENISA believes cyber activities are not a matter for a handful of nation states anymore-- multiple states now have the capacity to infiltrate governmental and private targets.

The top 3 threats in the current threats and trends list are drive-by downloads, worms/trojans and code injections.

The agency also lists some positive developments-- the year saw some admittedly impressive law-enforcement successes, such as the arrests of the gang responsible for the Police Virus, the Silk Rode operator, and the developer and operator of popular exploit kit Blackhole.

Meanwhile reports and data regarding threats are growing in both quality and quantity, and vendors are getting faster at patching products in response to new vulnerabilities.

As for key open issues, ENISA says end-users still lack the knowledge they need to be actively involved, since the adoption of simple security measures by end-users would reduce the global number of incidents by at least 50%. The greater coordination in the collection, analysis, assessment and validation of information by various organisations is also of importance, as is the reduction of threat detection and assessment cycles.

Go ENISA Threat Landscape 2013 Report