Accessibility Statement Skip Navigation
  • PRNewswire.com
  • Resources
  • +91 22-69790010
  • Client Login
  • Send a Release
PR Newswire: news distribution, targeting and monitoring
  • News
  • Products
  • Contact
When typing in this field, a list of search results will appear and be automatically updated as you type.

Searching for your content...

No results found. Please use Advanced Search to search all press releases.
  • News in Focus
      • Browse News Releases

      • All News Releases
      • All Public Company
      • Multimedia Gallery

      • All Multimedia
      • All Photos
      • All Videos
  • Business & Money
      • Auto & Transportation

      • Aerospace & Defense
      • Air Freight
      • Airlines & Aviation
      • Automotive
      • Maritime & Shipbuilding
      • Railroads & Intermodal Transportation
      • Supply Chain/Logistics
      • Transportation, Trucking & Railroad
      • Travel
      • Trucking & Road Transportation
      • View All Auto & Transportation

      • Business Technology

      • Blockchain
      • Broadcast Tech
      • Computer & Electronics
      • Computer Hardware
      • Computer Software
      • Data Analytics
      • Electronic Commerce
      • Electronic Components
      • Electronic Design Automation
      • Financial Technology
      • High Tech Security
      • Internet Technology
      • Nanotechnology
      • Networks
      • Peripherals
      • Semiconductors
      • View All Business Technology

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film & Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Financial Services & Investing

      • Accounting News & Issues
      • Acquisitions, Mergers & Takeovers
      • Banking & Financial Services
      • Bankruptcy
      • Bond & Stock Ratings
      • Conference Call Announcements
      • Contracts
      • Cryptocurrency
      • Dividends
      • Earnings
      • Earnings Forecasts & Projections
      • Financing Agreements
      • Insurance
      • Investments Opinions
      • Joint Ventures
      • Mutual Funds
      • Private Placement
      • Real Estate
      • Restructuring & Recapitalisation
      • Sales Reports
      • Shareholder Activism
      • Shareholder Meetings
      • Stock Offering
      • Stock Split
      • Venture Capital
      • View All Financial Services & Investing

      • General Business

      • Awards
      • Commercial Real Estate
      • Corporate Expansion
      • Earnings
      • Environmental, Social and Governance (ESG)
      • Human Resource & Workforce Management
      • Licensing
      • New Products & Services
      • Obituaries
      • Outsourcing Businesses
      • Overseas Real Estate (non-US)
      • Personnel Announcements
      • Real Estate Transactions
      • Residential Real Estate
      • Small Business Services
      • Socially Responsible Investing
      • Surveys, Polls & Research
      • Trade Show News
      • View All General Business

  • Science & Tech
      • Consumer Technology

      • Artificial Intelligence
      • Blockchain
      • Cloud Computing/Internet of Things
      • Computer Electronics
      • Computer Hardware
      • Computer Software
      • Consumer Electronics
      • Cryptocurrency
      • Data Analytics
      • Electronic Commerce
      • Electronic Gaming
      • Financial Technology
      • Mobile Entertainment
      • Multimedia & Internet
      • Peripherals
      • Social Media
      • STEM (Science, Tech, Engineering, Math)
      • Supply Chain/Logistics
      • Wireless Communications
      • View All Consumer Technology

      • Energy & Natural Resources

      • Alternative Energies
      • Chemical
      • Electrical Utilities
      • Gas
      • General Manufacturing
      • Mining
      • Mining & Metals
      • Oil & Energy
      • Oil & Gas Discoveries
      • Utilities
      • Water Utilities
      • View All Energy & Natural Resources

      • Environ­ment

      • Conservation & Recycling
      • Environmental Issues
      • Environmental Policy
      • Environmental Products & Services
      • Green Technology
      • Natural Disasters
      • View All Environ­ment

      • Heavy Industry & Manufacturing

      • Aerospace & Defence
      • Agriculture
      • Chemical
      • Construction & Building
      • General Manufacturing
      • HVAC (Heating, Ventilation & Air-Conditioning)
      • Machinery
      • Machine Tools, Metalworking & Metallurgy
      • Mining
      • Mining & Metals
      • Paper, Forest Products & Containers
      • Precious Metals
      • Textiles
      • Tobacco
      • View All Heavy Industry & Manufacturing

      • Telecomm­unications

      • Carriers & Services
      • Mobile Entertainment
      • Networks
      • Peripherals
      • Telecommunications Equipment
      • Telecommunications Industry
      • VoIP (Voice over Internet Protocol)
      • Wireless Communications
      • View All Telecomm­unications

  • Lifestyle & Health
      • Consumer Products & Retail

      • Animals & Pets
      • Beers, Wines & Spirits
      • Beverages
      • Bridal Services
      • Cannabis
      • Cosmetics & Personal Care
      • Fashion
      • Food & Beverages
      • Furniture & Furnishings
      • Home Improvement
      • Household, Consumer & Cosmetics
      • Household Products
      • Jewellery
      • Non-Alcoholic Beverages
      • Office Products
      • Organic Food
      • Product Recalls
      • Restaurants
      • Retail
      • Supermarkets
      • Toys
      • View All Consumer Products & Retail

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film & Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Health

      • Biometrics
      • Biotechnology
      • Clinical Trials & Medical Discoveries
      • Dentistry
      • FDA Approval
      • Fitness/Wellness
      • Health Care & Hospitals
      • Health Insurance
      • Infection Control
      • International Medical Approval
      • Medical Equipment
      • Medical Pharmaceuticals
      • Mental Health
      • Pharmaceuticals
      • Supplementary Medicine
      • View All Health

      • Sports

      • General Sports
      • Outdoors, Camping & Hiking
      • Sporting Events
      • Sports Equipment & Accessories
      • View All Sports

      • Travel

      • Amusement Parks & Tourist Attractions
      • Gambling & Casinos
      • Hotels & Resorts
      • Leisure & Tourism
      • Outdoors, Camping & Hiking
      • Passenger Aviation
      • Travel Industry
      • View All Travel

  • Policy & Public Interest
      • Policy & Public Interest

      • Animal Welfare
      • Corporate Social Responsibility
      • Economic News, Trends & Analysis
      • Education
      • Environmental
      • European Government
      • Labour & Union
      • Natural Disasters
      • Not For Profit
      • Public Safety
      • View All Policy & Public Interest

  • People & Culture
      • People & Culture

      • Aboriginal, First Nations & Native American
      • African American
      • Asian American
      • Children
      • Diversity, Equity & Inclusion
      • Hispanic
      • Lesbian, Gay & Bisexual
      • Men's Interest
      • People with Disabilities
      • Religion
      • Senior Citizens
      • Veterans
      • Women
      • View All People & Culture

  • Explore Our Platform
  • Plan Campaigns
  • Create with AI
  • Distribute Press Releases
  • Amplify Content
  • All Products
  • General Inquiries
  • Worldwide Offices
  • Hamburger menu
  • PR Newswire: news distribution, targeting and monitoring
  • Send a Release
    • Telephone

    • +91 22-69790010 from 9 AM - 5:30 PM IST

    • Contact
    • Contact

      +91 22-69790010
      from 9 AM - 5:30 PM IST

  • When typing in this field, a list of search results will appear and be automatically updated as you type.

  • Request More Information
  • Journalists
  • News in Focus
    • Browse All News
    • Multimedia Gallery
  • Business & Money
    • Auto & Transportation
    • Business Technology
    • Entertain­ment & Media
    • Financial Services & Investing
    • General Business
  • Science & Tech
    • Consumer Technology
    • Energy & Natural Resources
    • Environ­ment
    • Heavy Industry & Manufacturing
    • Telecomm­unications
  • Lifestyle & Health
    • Consumer Products & Retail
    • Entertain­ment & Media
    • Health
    • Sports
    • Travel
  • Policy & Public Interest
    • Policy & Public Interest
  • People & Culture
    • People & Culture
  • Request More Information
  • Journalists
  • Explore Our Platform
  • Plan Campaigns
  • Create with AI
  • Distribute Press Releases
  • Amplify Content
  • All Products
  • Request More Information
  • Journalists
  • General Inquiries
  • Worldwide Offices
  • Request More Information
  • Journalists

Cyberoam Releases its Security Predictions for 2015


News provided by

Cyberoam Technologies Private Limited

24 Dec, 2014, 16:13 IST

Share this article

Share toX

Share this article

Share toX

Cyberoam Technologies Pvt. Ltd. - Logo (PRNewsFoto/PR NEWSWIRE INDIA)
Cyberoam Technologies Pvt. Ltd. - Logo (PRNewsFoto/PR NEWSWIRE INDIA)

AHMEDABAD, India, December 24, 2014 /PRNewswire/ --

Cyberoam, a leading global provider of network security appliances, has published its Security Predictions for 2015. These predictions give an overview of industry trends and security challenges businesses are likely to come across in 2015. The security predictions have been prepared with insights from the Cyberoam Threat Research Labs (CTRL).

     (Logo: http://photos.prnewswire.com/prnh/20140210/10088491)

The 8 predictions made are based on the latest IT trends that closely impact all of us since they co-exist in our personal as well as professional spaces like the Internet of Things, Geo-political interferences, attacks on iOS, newer authentication methods replacing traditional passwords, and more. New threat trends like malvertising, exploitation of legacy protocols, et al, also share the spotlight among the predictions for 2015.

Dark clouds over Internet of Things (IoT)

This year IoT will gain wider visibility due to its advancements as well as vulnerabilities. As SCADA systems adopt IOT, their exposure to cyber threats will increase. Remotely connected and automated building control systems also face a similar challenge. Around 2.2 million SCADA and BACnet devices are already exposed to potential cyber-threats as these are identifiable via SHODAN - a search engine for Internet-connected devices.

Meanwhile, government safety requirements such as eCall (Internet assisted emergency reporting in vehicles in Europe) and consumer demand for seamless data connectivity have opened gates for Connected Car infrastructure, which is bringing automakers, telcos and the tech-giants (Google, Samsung and Apple) to a common drawing board. This is a classic example of IoT at work in our day-to-day lives. Meanwhile, mobile apps have started featuring in the Connected Car infrastructure and it is just a matter of time before the vulnerabilities are discovered.

Geo-political Interference

In 2014, the US Department of Homeland Security revealed a trojan named Black Energy affecting the nation's critical infrastructure. Exploits of Syrian Electronic Army and Regin APT malware campaign also hit headlines.

The Geo-political landscape is changing dramatically around the world and Internet cannot remain insulated from its effects; in fact Internet has become a critical tool for government sponsored propagandas, espionage and cyber-attacks. APT malwares sometimes used in these campaigns grossly undermine legal boundaries. Such malwares were found waiting to be activated in networks of oil and gas pipelines, power transmission grids, water distribution and filtration systems, wind turbines and even some nuclear plants in the US. In such cases, large private businesses also come in the line of fire every now and then.

If conditions deteriorate, which seems to be a decent probability in the coming year, there will be a larger impetus on cyber-attacks from the nations involved, some of which could be revealed during the year itself.

Legacy Protocols on target

POODLE, Shellshock and Heartbleed are examples of vulnerabilities in code, which sit hidden for years before been discovered and exploited. The legacy protocols on which Internet seems to run all so well are far from perfect and cyber criminals will continue to exploit the loopholes to their advantage. Some of these protocols being open source face a larger threat.

Moreover, as the Internet makes transition from IPv4 to IPv6, cybercriminals would hunt for latent security gaps. In addition to the vulnerabilities in web browsers, one can also expect client side attacks exploiting application vulnerabilities in widely used frameworks like Adobe, Java, thereby aggravating network security challenges for IT admins in 2015.

Healthcare Bleeds

Given that healthcare sector is making rapid strides globally in embracing technology and digitising patient care along with storing personally identifiable information, there is a need to strengthen information security. Securing Healthcare data is critical as it is at a higher risk given the fact that this data fetches much higher value in black market than credit card numbers, because it can provide access to bank accounts or help in obtaining prescriptions for controlled drugs. Healthcare sector needs significant improvements in its cyber-preparedness - a fact FBI made amply clear in 2014 when Community Health Systems faced a security breach leading to theft of 4.5 million patient records in the US. More such breaches are expected in 2015.

Malvertising and Attacks on E-mail

2014 saw ad networks on reputed websites like Yahoo, AOL and Google being compromised to distribute malvertisements. Malvertising (placing malware laden advertisements on reputed/popular webpages) is likely to become more of a nuisance in 2015. Ad networks are continually compromised and threat actors are relying on the fact that blocking every ad or testing every ad network is not a practical solution. Malvertisers are also at advantage as reputed websites (news and infotainment) are rarely blocked by office firewalls.

Meanwhile, if reports are to be believed, spam is on a decline. This is partly due to the fact that spammers have devised other advanced ways to land mail in the inbox, while others have moved on to sophisticated spear phishing attacks targeting individuals behind corporate firewalls. Nonetheless, the old tactics of crafting fraudulent mails around major global/local events is still profitable for spammers. 2015 will not be any different in this regard, though one can expect to see some newer tricks for evading current e-mail security solutions.

Demand for Context Aware Security

Networks these days generate huge amount of data. This data contains enough cues to offer patterns of human behaviour that can be used to predict and prevent cyber-attacks. However, comprehending and co-relating data out of various logs and reports to get meaningful information requires time and skills. Besides, it carries the risk of human oversight. Enterprises need a security model to harness this information and interpret network traffic to identify suspicious patterns and events. In such a scenario, Big Data analytics tools can offer huge help in co-relating the data with a given user model to spot risky users and trends in a network. In fact, BFSI organisations have already started leveraging Big Data based security analytics for early fraud detection and prevention.

Employing the advancements in Big Data analytics, Context Aware Security solutions such as Cyberoam's User Threat Quotient (UTQ) can help IT admins in tasks akin to finding a needle in a haystack - identifying a user posing security risk in a network. In 2015, such solutions will prominently be employed by organisations seeking actionable security intelligence. 

iOS on the radar of cyber-criminals; Android attacks to continue

Mobile malwares will make a major impact in 2015, as more people are now using handheld devices to access critical business data from cloud apart from banking and payments. In this scenario, the new Android OS, Lollipop, will be put to test. At the same time, as enterprises embrace Apple apps and use of iOS-based devices grows, these are getting on the radar of cyber criminals. Recent trends suggest that in 2015, iOS will get hit by phishing attacks and malwares on a larger scale than ever before.

Solving the puzzle called 'Password'

The quest for replacing 'password' as an authentication procedure will gain momentum. It is reported that an increasing number of millennials in the US prefer Apple's Fingerprint Scan for authentication purpose. However, scaling up biometric authentication techniques like fingerprint scan is a big challenge. Moreover, standalone biometric authentication is not as full proof as thought earlier.

Considering recent incidents of data breaches and credential thefts in mind, the FIDO Alliance recently released its long-awaited 1.0 specifications for passwordless and multifactor authentication systems. A major push to move away from passwords is likely to make hackers more than just shift in their seats.

About Cyberoam Technologies Limited

Cyberoam Technologies, a Sophos Company, is a global Network Security appliances provider, offering future-ready security solutions to physical and virtual networks in organizations with its Next-Generation Firewalls (NGFWs) and Unified Threat Management (UTM) appliances. The virtual and hardware Cyberoam Central Console appliances offer Centralized Security Management options to organizations, while Cyberoam iView allows intelligent logging and reporting with one-of-their-kind, in-depth reports. Cyberoam is accredited with prestigious global standards and certifications like EAL4+, CheckMark UTM Level 5 Certification, ICSA Labs, IPv6 Gold logo, and is a member of the Virtual Private Network Consortium. For more information, please visit www.cyberoam.com

Media Contact: Tasneem Sangani, [email protected], +91-9727705962, Manager PR, Cyberoam Technologies Pvt. Ltd. (a Sophos company)

Modal title

Contact PR Newswire

  • +91 22-69790010

Global Sites

  • APAC
  • APAC - Traditional Chinese
  • Asia
  • Brazil
  • Canada
  • Czech
  • Denmark
  • Finland
  • France
  • Germany

 

  • India
  • Indonesia
  • Israel
  • Italy
  • Mexico
  • Middle East
  • Middle East - Arabic
  • Netherlands
  • Norway
  • Poland

 

  • Portugal
  • Russia
  • Slovakia
  • Spain
  • Sweden
  • United Kingdom
  • United States

Do not sell or share my personal information:

  • Submit via [email protected] 
  • Call Privacy toll-free: 877-297-8921
Global Sites
  • Asia
  • Brazil
  • Canada
  • Czech
  • Denmark
  • Finland
  • France
  • Germany
  • India
  • Israel
  • Italy
  • Mexico
  • Middle East
  • Netherlands
  • Norway
  • Poland
  • Portugal
  • Russia
  • Slovakia
  • Spain
  • Sweden
  • United Kingdom
  • United States
+91 (0) 22 6169 6000
from 9 AM - 5:30 PM IST
  • Terms of Use
  • Privacy Policy
  • GDPR
  • Information Security Policy
  • Site Map
  • Cookie Settings
Copyright © 2026 Cision US Inc.