ASUS Strix GeForce GTX 970
MSI GE60 2PE
Transcend StoreJet 35U3
First Impressions: Xiaomi Redmi Note
How offline retailers can make a comeback
Preview: Digit December 2014 Collector’s Edition
6 important takeaways from Google's study on e-commerce in India
Android Lollipop vs KitKat on Nexus 4
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Scientists develop polarizing filter that brighten LCDs
Google to host Great Online Shopping Festival December 10-12
Xiaomi considering the idea of manufacturing phones in India
StoreDot develops tech can charge your mobile phone in 30 seconds
Asus launches PadFone Mini in India for Rs. 15,999
Obi Alligator S454
Intex Aqua V4
Huawei Ascend P7
Micromax Bolt AD4500
Microsoft Lumia 535 Dual
Case Study: Building an award winning multi-touch enabled music app
Case Study: Developing a Health App for Windows 8
Case Study: Developing an augmented reality app for Intel based devices
Use Spotify, Netflix in India on your PC, Android smartphone
Overview: Implementing fast real-time GPU-based image blur algorithms
Nokia Lumia 730 Review
How to upgrade your laptop or ultrabook's hard drive to an mSATA or M.2 SSD
Jolla Smartphone Review
iPhone 5S vs iPhone 6 Showdown
Samsung Galaxy Note 4 - The best phablet today
Five phones with 2K displays that you can buy in India
5 essential system utilities for Android
Hands On: Xiaomi Redmi Note
4 Android features erased by Lollipop update
5 great Android games launched this month
Intel Developer Zone
Intel Windows Developer Zone
Dsk International Campus Zone
Acer Aspire E5Intel Core i7 Processor, Windows 8.1 , 12 GB RAM, 1TB Hard Disk Space, 2GB GraphicsClick to know more
How to Develop 3D Games for WindowsHow to develop a soccer penalties shootout game with Microsoft Visual Studio 3D Starter Kit
Click to know more
The growing usages of mobile communication devices and an 'overlap of work and personal data' poses an increased threat of data theft and other malware attacks in the coming year, warn the cyber security software companies.
According to these firms, the governments will look to enter the cyber warfare arena, while there could be surge in timed and targeted spear-phishing e-mail attacks, and malicious e-mail attachments.
Websense Security Labs forecasts the mobile devices will emerge the top target for cross-platform threats with a particular focus on Windows 8, Android and iOS. The company predicts a significant growth in Microsoft mobile devices.
The McAfee Threats Report for Q3 2012 says there's two-fold growth in mobile malware as compared to the previous quarter's total. There's also a surge in some categories of malware such as ransomware and signed binaries.
"As development barriers are removed, mobile threats will be able to leverage a huge library of shared code. Social engineering lures to capture user credentials on mobile devices will be used. Cybercriminals will use bypass methods to avoid traditional sandbox detection. More organizations are utilizing virtual machine defenses to test for malware and threats. As a result, attackers are taking new steps to avoid detection by recognizing virtual machine environments," the report said.
On the possibilities of the governments entering cyber warfare arena, the report said, "In the wake of several publicized cyber-warfare events, there are a number of contributing factors that will drive more countries toward these strategies and tactics," the report said, adding that countries and individual cybercriminals all have access to the blueprints for previous state-sponsored attacks like Stuxnet, Flame and Shamoon.
"The past year illustrated how quickly the threat landscape continues to evolve, with attacks and exploits redefining the concepts of crime, business espionage and warfare. The risk to organizations continues to be amplified by the frailty of human curiosity. It's now expanding across diverse mobile platforms, evolving content management systems and an ever-increasing population of online users," says Charles Renert, vice president of Websense Security Labs.
"2013 will absolutely reinforce the fact that traditional security measures are no longer effective in thwarting advanced cyber attacks. Organizations and security providers need to evolve toward more pro-active real-time defenses that stop advanced threats and data theft," he concluded.