TahawulTech.com
  • TahawulTech.com
  • Region
    • UAE
      • Human error fuels breaches as only half of professionals receive cybersecurity training 
      • Saudi’s cybersecurity evolution accelerates with Kaspersky’s new academy and MoUs
      • Black Hat MEA surges on day two with Capture the Flag taking centre stage
      • Black Hat MEA becomes world’s largest cybersecurity gathering after surging 55%
      • Seclore strengthens commitment to Saudi Arabia’s digital transformation agenda
    • Saudi Arabia
      • GCC enterprises boost security readiness for post-quantum future, says QuantumGate
      • Human error fuels breaches as only half of professionals receive cybersecurity training 
      • AI observability, hybrid visibility and post-quantum readiness to drive 2026: Gigamon
      • Saudi’s cybersecurity evolution accelerates with Kaspersky’s new academy and MoUs
      • Black Hat MEA surges on day two with Capture the Flag taking centre stage
    • Oman
      • Microsoft AI Tour showcases groundbreaking AI innovations for Oman
      • Open Innovation AI collaborates with Intel to revolutionize AI orchestration with Gaudi
      • KROHNE delivers insights to inspire the next generation of engineers in Oman
      • Oracle supports major project to accelerate Oman digital economy
      • Ooredoo accelerates cybersecurity in Oman with new deal
    • Bahrain
      • Bahrain sets global benchmark with GCC’s first stablecoin regulatory framework
      • Open Innovation AI collaborates with Intel to revolutionize AI orchestration with Gaudi
      • BDB launches “tijara” platform for SMEs
      • Bahrain achieves full nationwide 5G coverage
      • Batelco, SonicWall launch integrated security solutions for SMEs in Bahrain
    • Kuwait
      • Open Innovation AI collaborates with Intel to revolutionize AI orchestration with Gaudi
      • Infopercept opens its first Middle East office in Kuwait
      • Microsoft Compliance Manager now available in Kuwait
      • Commercial Bank of Kuwait gets mobile payments moving with Thales Digital Solutions
      • Ooredoo chooses Fortinet to deliver secure SD-WAN managed services in Kuwait
    • Africa
      • ODC Africa and ME partners with Hedera Africa Hackathon to boost Web3 innovation
      • Dubai’s Omining unveils first African site in Kenya’s Special Economic Zone
      • Rise of Fearless unites 2,500+ gamers through African heritage, battle royale
      • Rise of Fearless launches $700K investment round to advance Web3 mobile gaming in Africa 
      • e& enterprise and RAIN Technology to revolutionise Operating Room efficiency in hospitals across MEA
    • Middle East
      • GCC enterprises boost security readiness for post-quantum future, says QuantumGate
      • Human error fuels breaches as only half of professionals receive cybersecurity training 
      • Group-IB charts frontier of cyber defence with latest innovations in Saudi Arabia 
      • Nozomi Networks to showcase AI-powered OT/IoT security tools at Black Hat MEA
      • Cybersecurity leaders confront new risk realities as Black Hat returns to Riyadh
    • Global
      • Commvault unveils conversational AI, data rooms to advance cyber resilience in region
      • From data to dignity: SAS calls for human-centred AI shaping cities of tomorrow
      • Netscout extends visibility into Kubernetes containers with observability innovation
      • A potential breakthrough in US-China TikTok discussions
      • Japan records record smartphone growth in Q2 2025
  • Industry
    • Education
      • Ericsson and e& launch the second cohort of Excelerate&
      • Saudi Arabian University and Cisco collaborate on AI institute
      • Bimser launches University Programme to drive innovation in higher education
      • Coursera’s Skills Tracks set new standard for workforce readiness, says top official
      • Kaspersky launches online course for universities to integrate cybersecurity knowledge in curriculums
    • Energy
      • Hitachi Energy powers sustainable future with eco-efficient, AI-driven grid innovations
      • Google invests in nuclear power for its data centres
      • Can U.S. power grids keep up with the data centre boom? 
      • Tesla applies for UK electricity supply license
      • Google invests heavily in hydroelectric energy
    • Financial services
      • ServiceNow signs multi-year agreement with one of the largest banks in the world
      • Future of Finance 2025 sets stage for transformative dialogue in Dubai
      • Rak Properties enables cryptocurrency payments via partnership with Hubpay
      • Zain powers Iraq’s digital future through customer-driven innovation, inclusion
      • American University of Sharjah, Ghaf Labs partner to boost student industry exposure 
    • Government
      • EU delays AI rules after industry backlash
      • The EU raises concerns over Google’s spam policy
      • UK government looks to tackle telco fraud
      • Germany reportedly tied with the removal of Huawei equipment from regional networks
      • US soldier plans, executes autonomous Black Hawk Missions using MATRIX Technology at Northern Strike 25-2
    • Healthcare
      • Oracle pitches new software to transform U.S. healthcare
      • AI to help doctors diagnose broken bones
      • SPARK, Aster DM Healthcare set to shape future of healthcare research, innovation
      • myAster app expands reach, impacts over five million lives in three years, says CEO
      • BD drives healthcare innovation at Global Health Saudi 2025
    • Property
      • Grovy Developers elevates smart living with AURA’s fully integrated home ecosystem
      • Siemens supplies digital technology for factory-built housing
      • DLD boosts transparency with AI-enabled real estate advertising governance 
      • MBRHE and Beyond Limits AI MoU to enhance digital transformation
      • Huspy launches GCC’s first AI-powered mortgage chatbot to transform home financing  
    • Retail
      • Nothing introduces Phone (3a) Lite: Bringing latest style and innovation to more users
        Nothing introduces Phone (3a) Lite: Bringing latest style and innovation to more users
      • Microsoft, Sharaf DG bring AI to life with fun, creativity and unforgettable mall activation
      • The microsecond economy: AI rewrites customer engagement rules in MENA
      • Line Investments, Sheikh Al Nuaimi and Mulk Int’l to deliver Mirkaaz Mall by LuLu
      • Blue Ocean Global shifts to E-Commerce as digital transaction value exceed $60b in UAE
    • Technology
      • StarLink sharpens AI-first cybersecurity vision to power KSA’s next decade of growth
      • Saudi’s cybersecurity evolution accelerates with Kaspersky’s new academy and MoUs
      • Group-IB charts frontier of cyber defence with latest innovations in Saudi Arabia 
      • SentinelOne’s new regional headquarters in Riyadh to support digital transformation
      • Al Masaood Power accelerates Gulf’s shift toward cleaner and smarter energy system
    • Transport & Logistics
      • SelfDrive Mobility launches SIA — region’s first conversational AI car rental booking
      • Emirates to bring ultra-fast connectivity on 232 Boeing 777 and A380 aircraft
      • US soldier plans, executes autonomous Black Hawk Missions using MATRIX Technology at Northern Strike 25-2
      • UK airport suffers cyber-attack disruption
      • Chinese flying cars crash at air show rehearsal
    • Travel & Hospitality
      • Sojern and PubMatic join forces to power next-gen travel advertising solutions
      • Cluster 2 signs agreement to advance smart airport operations in Saudi Arabia
      • 8th Int’l Conference on Education Quality kicks off in Dubai; highlights AI innovations
      • Arabian Travel Market to gather global AI experts to explore new frontiers in travel
      • Smartphones, social media drive travel decisions for Indians, says travel report
  • Company
    • Enterprise
      • The UAE Cybersecurity Council and QuantumGate collaborate on 3 new programs
      • Tenable Co-CEO Mark Thurmond to provide keynote at Black Hat MEA 2025
      • Back by Popular Demand: The Best of Experience 2025
      • Huawei outlines 5G-A and AI Telecom vision for the GCC Region at MWC25 Doha
      • Amazon invests billions on AI for U.S. agencies
    • Corporate
      • Qlik expands cloud footprint with new AWS region in Middle East
      • PeopleStrong powers UAE’s talent shift, accelerates ME growth: Mrigank Tripathi
      • Microsoft names Samer Abu-Ltaif president for Europe, ME and Africa
      • Open Innovation AI collaborates with Intel to revolutionize AI orchestration with Gaudi
      • YouGotaGift CEO says ‘product-centricity’ the key to their phenomenal success
    • SME
      • AI-powered solutions shape future of SMEs, says Zoftware founder 
      • Open Innovation AI collaborates with Intel to revolutionize AI orchestration with Gaudi
      • Kaspersky exposes new scam targeting SMBs
      • Thriwe: Enhancing the Omni-channel experience
      • Alaris expands information capture ecosystem for SMEs
    • Startup
      • AI without borders: Startups leading the next global leap 
      • Secure Domains brings cutting-edge DNS protection to MENA region 
      • Open Innovation AI collaborates with Intel to revolutionize AI orchestration with Gaudi
      • Kaspersky exposes new scam targeting SMBs
      • Thriwe: Enhancing the Omni-channel experience
    • Vendor
      • Splunk report shows observability is a major business catalyst
      • The UAE Cybersecurity Council and QuantumGate collaborate on 3 new programs
      • DXC expands SAP capabilities in region with projects in the KSA and Egypt
      • 33% of database admins eye career move as demands increase
      • Tenable Co-CEO Mark Thurmond to provide keynote at Black Hat MEA 2025
    • Channel
      • The UAE Cybersecurity Council and QuantumGate collaborate on 3 new programs
      • “Payments have always been about trust, but they are being redefined by technology.” – Alistair Lukies, Endava
      • 92% of industry leaders say geopolitical shifts are increasing data sovereignty risks
      • Cisco and IBM embark on a quantum computing effort
      • “This partnership with 1X brings together the physical and digital AI worlds.” – Christian Pedersen, IFS
  • Trending
    • Digital Transformation
      • Internet of Things
      • Big Data
      • Blockchain
      • Smart City
      • Cloud Computing
    • Artificial Intelligence
      • Data Centre
      • Machine Learning
      • Virtual Reality
      • Robotics
      • Systems Integrator
      • E-commerce
    • 3D Printing
      • Self-driving Cars
      • Drones
      • Automation
      • Smartphones
      • Wearables
      • Virtualisation
    • Fintech
      • Storage
      • Mobile Payment
      • Startups
      • Applications
      • Security
  • News
    • All News
      • StarLink sharpens AI-first cybersecurity vision to power KSA’s next decade of growth
      • GCC enterprises boost security readiness for post-quantum future, says QuantumGate
      • Human error fuels breaches as only half of professionals receive cybersecurity training 
      • Saudi’s cybersecurity evolution accelerates with Kaspersky’s new academy and MoUs
      • Black Hat MEA surges on day two with Capture the Flag taking centre stage
    • Software
      • Building home for innovation: UAE Software Dev group empowers next-gen of engineers
      • Grok gets agentic coding upgrade
      • Trump Administration threatens a U.S. TikTok ban 
      • X accused of breaching advertising rules 
      • WeTransfer clarifies stance on training AI
    • Hardware
      • HOT Systems to showcase hardware powered by PNY at GITEX 2025
      • Apple weighs the value of AI-designed hardware
      • Netherlands talks with Nvidia and AMB over supply for AI-facility
      • ASUS Evo lineup: Enhancing the online experience
      • ASUS A3402-Next level computing performance
    • Networking
      • Nokia’s private wireless offering looks to be getting cut
      • Cloudflare apologises for the recent service outage
      • WhatsApp to explore third-party messaging support
      • T-Mobile U.S. invests in free emergency messaging
      • Germany reportedly tied with the removal of Huawei equipment from regional networks
    • Security
      • StarLink sharpens AI-first cybersecurity vision to power KSA’s next decade of growth
      • GCC enterprises boost security readiness for post-quantum future, says QuantumGate
      • Human error fuels breaches as only half of professionals receive cybersecurity training 
      • Saudi’s cybersecurity evolution accelerates with Kaspersky’s new academy and MoUs
      • Black Hat MEA surges on day two with Capture the Flag taking centre stage
    • Channel
      • The UAE Cybersecurity Council and QuantumGate collaborate on 3 new programs
      • “Payments have always been about trust, but they are being redefined by technology.” – Alistair Lukies, Endava
      • 92% of industry leaders say geopolitical shifts are increasing data sovereignty risks
      • Cisco and IBM embark on a quantum computing effort
      • “This partnership with 1X brings together the physical and digital AI worlds.” – Christian Pedersen, IFS
    • Telecoms
      • UK government looks to tackle telco fraud
      • Japan records record smartphone growth in Q2 2025
      • AST SpaceMobile outlines 2026 satellite deployment plans 
      • EE introduces new child-safe smartphone plan
      • e&’s Monitoring-as-a-Service offers UAE businesses real-time infrastructure visibility
    • Video
      • SEE Holding elevates network security and scalability with HPE Networking and Bits Secure
      • EP1: Put a Fork In It Podcast – Sayed Hashish on life lessons, parenting and the AI bubble
        EP1: Put a Fork In It Podcast – Sayed Hashish on life lessons, parenting and the AI bubble
      • Catch up on Exabeam, Alcon Cyber Security and VAD Technologies’ recent AI SOC roundtable
      • ASUS is on a mission to help transform the education sector in Middle East 
      • Resecurity empowers the UAE’s cyber resilience with AI-driven intelligence
  • Features
    • Features
      • SEE Holding elevates network security and scalability with HPE Networking and Bits Secure
      • EP1: Put a Fork In It Podcast – Sayed Hashish on life lessons, parenting and the AI bubble
        EP1: Put a Fork In It Podcast – Sayed Hashish on life lessons, parenting and the AI bubble
      • Quantum reality check: Race to secure data has already begun
      • Galaxy S25 Edge sets new benchmarks for design, AI, and performance in Gulf region
      • False confidence, real consequences: Why it’s time to rethink file scanning in business
    • CIO Spotlight
      • DMCC
        Rare commodity: DMCC IT director Abdalla Al Ali
      • HSBC MENAT CIO Ghinwa Baradhi
        The bigger picture: HSBC MENAT CIO Ghinwa Baradhi
      • Mubadala Investment Company CIO Mansour Al Ketbi
        Mansour Al Ketbi unites IT teams for $125 billion Mubadala Investment Company
      • Tariq Al Usaimi, head of digital strategy for the Central Bank of Kuwait
        The new breed: National Bank of Kuwait CDO Tariq Al-Usaimi
      • Al Masah Capital CIO Ashith Piriyattiath
        Ashith Piriyattiath’s diverse & transformative GCC career
    • Case Studies
      • Survey reveals misalignment between cybersecurity and business goals in the UAE and KSA
      • 3,200+ fake Meta profiles used in Facebook scam attempt
      • Edenred UAE: Transforming Customer Service Over WhatsApp with Conversations and Answers
      • Customer Story: Nissan Saudi Arabia
      • elseco
        DIFC prioritises digital transformation to enhance connectivity and accessibility with Wi-Fi 6
    • Partner Watch
      • Juniper Networks Expands Partner Ecosystem Leveraging AI-Native Networking Solutions
      • Commvault selects AlJammaz Technologies as key distributor in the Kingdom of Saudi Arabia
      • Kaspersky signs MoU with Zayed University
      • F5 Appoints Al Jammaz as a Value-Added Distribution Partner
      • The time is now for RNS Managed Security Services
    • Vendor focus
      • Dell Technologies To Establish New Merge & Logistics Fulfilment Hub in Riyadh
      • Dell Technologies study reveals innovation leaders better equipped for economic challenges
      • A10 Networks partners on a mission to ‘accelerate’
      • “The world is on the verge of a new intelligent era powered by Industry 5.0” – David Shi, Huawei
      • Huawei signs new partnership in effort to accelerate SMBs digital transformation
    • Analysis
      • Gulf cybersecurity spend expected to top Dh120 billion, AI fuels sovereign resilience
      • Gartner 2026 technology trends include AI supercomputing, preemptive cybersecurity
      • Emirati entrepreneurs learn, sell, and grow in a digital world, says new GoDaddy data 
      • Special Feature: Data Security in the Banking and Financial Sectors
      • Safeguarding Healthcare: Protecting Critical Data and Patient Privacy
    • Video
      • SEE Holding elevates network security and scalability with HPE Networking and Bits Secure
      • EP1: Put a Fork In It Podcast – Sayed Hashish on life lessons, parenting and the AI bubble
        EP1: Put a Fork In It Podcast – Sayed Hashish on life lessons, parenting and the AI bubble
      • Catch up on Exabeam, Alcon Cyber Security and VAD Technologies’ recent AI SOC roundtable
      • ASUS is on a mission to help transform the education sector in Middle East 
      • Resecurity empowers the UAE’s cyber resilience with AI-driven intelligence
    • Lifestyle
      • ChatGPT aims to better investigate signs of mental health emergencies in users
      • German audio specialist Neumann expands KH monitor line with advanced subwoofers
      • Predator Helios Neo 16S AI showcases cutting-edge portable gaming power
      • Mecomed unveils digital health whitepaper to boost value-based healthcare in MEA 
      • myAster expands to Abu Dhabi, RAK, Ajman and Sharjah through 24×7 Express delivery
    • Insight
      • Splunk report shows observability is a major business catalyst
      • Quantum reality check: Race to secure data has already begun
      • 33% of database admins eye career move as demands increase
      • 92% of industry leaders say geopolitical shifts are increasing data sovereignty risks
      • Frontline investments unlock productivity and profit for manufacturers
    • Opinion
      • False confidence, real consequences: Why it’s time to rethink file scanning in business
      • The KSA’s AI ambitions mark a strategic inflection for Vision 2030
      • Trading in milliseconds: The critical role of speed, flash storage to shape finance sector
      • Driving change, seen and unseen: LLMs in the Middle East’s cybersecurity arena
      • From data to dignity: SAS calls for human-centred AI shaping cities of tomorrow
    • Blogs
      • Opinion: TeKnowledge CTO on the Enterprise AI Execution Gap
      • Why I joined Cloudflare: To build world-class partnerships in EMEA
      • Revolutionising fan engagement in football through data, gamification, and smart stadium experiences
      • How enterprises can raise their cyber security readiness by going through 3 stages of preparation
      • Maestro Blocks: Transferring passion into businesses!
  • News
    • Region
      • StarLink sharpens AI-first cybersecurity vision to power KSA’s next decade of growth
      • GCC enterprises boost security readiness for post-quantum future, says QuantumGate
      • Human error fuels breaches as only half of professionals receive cybersecurity training 
      • AI observability, hybrid visibility and post-quantum readiness to drive 2026: Gigamon
      • Saudi’s cybersecurity evolution accelerates with Kaspersky’s new academy and MoUs
  • Magazines
    • CNME
      • October 2025 – Citrix
      • October 2025 – Core42
      • September 2025
      • July 2025
      • May 2025
    • Reseller ME
      • October 2025
      • September 2025
      • August 2025
      • July 2025
      • May 2025
    • Security Advisor ME
      • November 2025
      • October 2025
      • September 2025
      • August 2025
      • June 2025
    • GITEX 60 Minutes
      • 60mins Day 5 – PM (2025)
      • 60mins Day 5 – AM (2025)
      • 60mins Day 4 – PM (2025)
      • 60mins Day 4 – AM (2025)
      • 60mins Day 3 – PM (2025)
    • LEAP 60 Minutes
    • BLACK HAT MEA 60 Minutes
    • Supplements
      • LinkShadow Special Report November 2025
      • GITEX Tech Vision 2025
      • GISEC 2025 – Special Report
      • GovTech – October 2024
      • GITEX Tech Vision 2024
  • Podcasts
  • Events & Conferences
    • Awards
      • KSA Future Enterprise Awards 2026
      • AI Conference & Awards 2025
      • Reseller Middle East Partner Excellence Awards 2025
      • CIO Leadership Awards 2026
      • CISO 50 & Future Security Awards 2025
    • Customer Events
      • Planview Middle East Launch
      • Infosec & Cybersecurity Congress 2025 – Abu Dhabi
      • Infosec & Cybersecurity Congress 2024
      • Infosec & Cybersecurity Congress 2023
      • Race to innovate | Your Voice | Tahawul Tech
        Race to Innovate
    • Forums
      • AI Conference & Awards 2025
      • Planview Middle East Launch
      • The Channel Leaders Forum & Awards 2025
      • Infosec & Cybersecurity Congress 2025 – Abu Dhabi
      • The Future of Finance Conference
    • Your Voice
      • Race to innovate | Your Voice | Tahawul Tech
        Race to Innovate
      • Combating credit crunch
      • Rise of e-commerce
      • Expectations vs Investment
    • Webinars
      • Freshworks virtual webinar highlights increasing role of IT industry in accelerating digital transformation
      • Mimecast virtual webinar highlights importance of brand protection
      • Huawei and IDC collaborate on Autonomous Network white paper
      • WEBINAR: Experience the Intelligent HPE Hyperconverged and Composable Infrastructure
      • WEBINAR: How Alpha Data and Veritas Enable Enterprises to Win the War Against Ransomware
  • GITEX 2025
  • Black Hat
Don’t show this ad again.
D-Link
Bespin Global
Fortinet
Insight

SophosLabs’ trends to watch in 2014

by SophosLabs
December 22, 2013, 2:55 pmDecember 22, 2013

953715_300Major technology developments over the last year—and a series of revelations about the National Security Agency that shook the international security community—made 2013 an interesting year. In highlighting the past year’s security events, we’ve considered some emerging trends we are likely to see in the coming year.

Attacks on corporate and personal data in the cloud
As businesses increasingly rely on various cloud services for managing their customer data, internal project plans and financial assets, we expect to see an emergence of attacks targeting endpoints, mobile devices and credentials as a means of gaining access to corporate or personal clouds.

It’s hard to predict what form future attacks will take — but we can imagine ransomware taking not just your local documents hostage, but any type of cloud-hosted data. These attacks may not require data encryption and could take the form of blackmail — threats of going public with your confidential data.

Strong password and cloud data access policies are more important than ever. Your security is only as good as your weakest point, in many cases your Windows endpoint and your users’ awareness.

APTs meet financially motivated malware
We expect the success of advanced persistent threats (APTs) in carrying out attacks for the purposes of industrial espionage will inspire old-school financial malware gangs to adopt their techniques. In fact, we’re already seeing exploit techniques borrowed from APT groups being used for malware distribution.

As security vendors make progress with improving layers of defence, OS security and user awareness, cybercriminals are forced to make bigger financial gains from a smaller number of victims. New attacks initiated by traditional malware actors may in the future include components and delivery mechanisms purposely built or customised for a narrower target audience. The line marking the difference between APT and traditional malware will continue to blur in 2014.

Increasingly complex Android malware seeks out new targets
In 2013 we saw exponential growth in Android malware, not only in terms of the number of unique families and samples, but also the number of devices affected globally.

While we expect that new security features in the Android platform will make a positive change in infection rates over time, their adoption will be slow, leaving most users exposed to simple social engineering attacks. Cybercriminals will continue to explore new avenues for Android malware monetisation. Although their options on this platform are more limited than Windows, mobile devices are an attractive launch pad for attacks aimed at social networks and cloud platforms.

Mitigate this risk by enforcing a BYOD policy that prevents side-loading of mobile apps from unknown sources and mandates anti-malware protection.

Malware diversifies and specializes
The diversity in financially-motivated malware reflects differences between various geographic and economic regions. We already see it through country-specific social engineering techniques, malware monetisation options and attack purposes. Malware diversity by targeted audience will likely continue to grow in 2014, especially to differentiate between consumer and business users. We can also expect more specialised attacks in relation to the varying degrees of cyber-defense levels and target value.

Personal data danger from mobile apps and social networks
Mobile security in general will continue to be a hot topic in 2014. The continuing adoption of emerging apps for personal and business communication widens the attack surface, particularly for socially engineered scams and data exfiltration attempts. Your address book and your social connections graph is a treasure for cyber-crooks of all sorts, so be mindful of who you entrust to access it and why. Mobile and web applications control for business users will help mitigate this risk.

Penetrating defences
In the never-ending fight between the cybercriminals and security vendors, we expect to see new weapons aimed at the latest cyber-defense mechanisms. Reputation services, cloud security databases, whitelisting and sandboxing layers will be attacked in new and sinister ways. We’ll see more malware signed with stolen digital signatures, attempts to poison security data and telemetry analytics, new sandbox detection and bypass techniques, and increased use of legitimate tools for malicious purposes.

64-bit malware
With growing adoption of 64-bit operating systems on PCs, we’re expecting a growth of malware that is unable to run on 32-bit PCs.

Exploit kits continue to be a primary threat for Windows
Although Microsoft has made technological advances in the Windows operating system that raise the bar for exploit developers, the company is not yet winning the war.

With Windows XP reaching end-of-life after 12 years, it will become a huge target for attackers.

Threat delivery that requires user interaction (social engineering) will also continue to be a major infection vector. But malware authors will have to refine their techniques to convince victims to execute the payload, as people become smarter about distinguishing malicious from benign.

Undermining hardware, infrastructure and software at the core
The revelations throughout 2013 of government agency spying and backdoors (not only by governments, but also commercial organisations) showed the world that broad-scale compromise of the core infrastructure we all operate on is not only possible, but has happened and will continue to. We’ll need to re-evaluate technologies and trusted parties.

The discoveries so far likely only scratch the surface and we can expect to see many more of these stories in 2014. Most enterprises won’t have the resources or skills to go digging for backdoors. But it would be wise to closely monitor the work of security researchers and media outlets for new revelations.

Hacking everything
We have continued to diversify the devices in our environments, and those devices hold sensitive business data. The security ecosystem simply is not as well developed around such devices as the traditional PC environment.

For those wishing to harm us, embedded devices in our homes, offices and even cities represent interesting attack targets. And new electronic currencies and payment techniques make far more than just the credit card worth considering.

While we don’t expect attacks against the “Internet of Things” to become widespread in 2014, we do predict an increase in reported vulnerabilities and proof-of-concept exploits.

Related Articles

  • Android malware attacks are reportedly on the rise
  • Kaspersky uncovers sophisticated malware targeting online trading platforms
  • The malware that must not be named: Suspected espionage campaign delivers “Voldemort”
[easy-social-share buttons="facebook,twitter,google,linkedin,stumbleupon,pinterest" counters=0 hide_names="force" fixedwidth="yes" fixedwidth_px="111"]
64-bit malware Android APTs cloud computing CNME exploit kit malware mobile malware SophosLabs

Previous ArticleAbu Dhabi police release Blackberry 10 appNext ArticleEMC: EMEA Predictions for 2014

Related Articles

  • ESET discovers Telegram app for Android targeted by zero-day exploit
  • Opinion: Role of AI in cybersecurity
  • Out of the Sandbox: WikiLoader Digs Sophisticated Evasion

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

tahawultech tahawultech.com @tahawultech ·
3 Dec

Mohammad Tahmaz, Country Sales Manager – KSA, discusses how real-time complete visibility with Zero Blind Spots, in corporate networks are shaping the Kingdom’s next phase of critical infrastructure protection at Black Hat MEA 2025.
https://ow.ly/Vp4U50XBtPR

Reply on Twitter 1996287268575683041 Retweet on Twitter 1996287268575683041 Like on Twitter 1996287268575683041 Twitter 1996287268575683041
tahawultech tahawultech.com @tahawultech ·
3 Dec

Saudi organisations are ambitious and forward-thinking, and we see the Kingdom playing a leadership role in defining the future of secure digital transformation, says Uraz Farukh, Vice President Sales – MENA, Seclore.
https://ow.ly/COBJ50XBmSg

Reply on Twitter 1996245875467624758 Retweet on Twitter 1996245875467624758 Like on Twitter 1996245875467624758 Twitter 1996245875467624758
tahawultech tahawultech.com @tahawultech ·
3 Dec

Seclore is emerging as a key enabler of intelligent data protection, offering enterprises and public-sector entities the ability to understand, govern, and secure data across complex, fast-moving environments, says Justin Endres, Chief Revenue Officer.
https://ow.ly/INV950XBkPU

Reply on Twitter 1996234653368193316 Retweet on Twitter 1996234653368193316 Like on Twitter 1996234653368193316 Twitter 1996234653368193316
Load More

RECOMMENDED FOR YOU

  • Embracing a fee-free future for AI in the Cloud
  • Security Navigator 2023 shows Cyber Extortion dominates as malware attackers target Europe and beyond
  • Adversaries exploit stolen session cookies to bypass Multi Factor Authentication & gain access to corporate resources: Sophos Report
  • Play it safe: 5 reasons not to download pirated games

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines

CPI Media Group
TahawulTech.com is the definitive platform in the Middle East for IT content. Covering stories across enterprise technology, cybersecurity and the region’s IT channel industry, TahawulTech.com brings business leaders and technology decision makers together to share their stories of transformation.

OTHER LINKS

  • Events and Conferences
  • Media Pack
  • Resource Centre
  • Subscription

 

  • Advertise
  • Contact Us
  • Privacy Policy

Contact Us

Office:
Office 1307, Dubai Studio City
Dubai, United Arab Emirates, PO Box 13700
Tel: +971 4 568 2993
Email: info@tahawultech.com
© 2025 All Rights Reserved. Product of CPI
Menu
  • Region
    • UAE
    • Saudi Arabia
    • Oman
    • Bahrain
    • Kuwait
    • Africa
    • Middle East
    • Global
  • Industry
    • Education
    • Energy
    • Financial services
    • Government
    • Healthcare
    • Property
    • Retail
    • Technology
    • Transport & Logistics
    • Travel & Hospitality
  • Company
    • Enterprise
    • Corporate
    • SME
    • Startup
    • Vendor
    • Channel
  • Trending
    • Digital Transformation
      • Internet of Things
      • Big Data
      • Blockchain
      • Smart City
      • Cloud Computing
    • Artificial Intelligence
      • Data Centre
      • Machine Learning
      • Virtual Reality
      • Robotics
      • Systems Integrator
      • E-commerce
    • 3D Printing
      • Self-driving Cars
      • Drones
      • Automation
      • Smartphones
      • Wearables
      • Virtualisation
    • Fintech
      • Storage
      • Mobile Payment
      • Startups
      • Applications
      • Security
  • News
    • All News
    • Software
    • Hardware
    • Networking
    • Security
    • Channel
    • Telecoms
    • Video
  • Features
    • Features
    • CIO Spotlight
    • Case Studies
    • Partner Watch
    • Vendor focus
    • Analysis
    • Video
    • Lifestyle
    • Insight
    • Opinion
    • Blogs
  • News
    • Region
  • Magazines
    • CNME
    • Reseller ME
    • Security Advisor ME
    • GITEX 60 Minutes
    • LEAP 60 Minutes
    • BLACK HAT MEA 60 Minutes
    • Supplements
  • Podcasts
  • Events & Conferences
    • Awards
    • Customer Events
    • Forums
    • Your Voice
    • Webinars
  • GITEX 2025
  • Black Hat
  • Bitz News
    • Business News
    • Financial News
  • Example Column Title
    • Bitz News Group Websites:
    • Insider Journal
    • Business Day
    • Weekly Selection
    • Tech News
    • Cool Stories
    • Geek Reviews
 

Loading Comments...
 

    tahawultech.com Intro