Written by Tomer Teller, Security evangelist at Check Point:
1. BYOD as a primary or even a secondary attack vector
2013 will bring more malicious applications, techniques and exploits to the mobile and portable devices. This includes, botnets and worms that will infect the devices over Bluetooth, WI-FI, NFC, Drive-By-Download and Spyware that will track your location and data espionage. This, coupled with the increasing percentage of the BYOD integration in companies opens the door for a new type of attacks – bypassing traditional defense mechanism due to lack of security standards for BYOD.
2. Internal Threats - A shift from remote exploits attacks to “inside jobs” executed by unsuspecting careless...
|