Trend Micro Predicts Cyber Security Concerns for 2014 and Beyond

       Trend Micro Predicts Cyber Security Concerns for 2014 and Beyond

Mobile threats, targeted attacks and vulnerabilities for the Internet of
Everything highlighted

PR Newswire

DALLAS, Dec. 9, 2013

DALLAS, Dec. 9, 2013 /PRNewswire/ --Trend Micro Incorporated (TYO: 4704; TSE:
4704) today released its annual security predictions report, "Blurring
Boundaries: Trend Micro Security Predictions for 2014 and Beyond." The outlook
cites that one major data breach will occur every month next year, and
advanced mobile banking and targeted attacks will accelerate. Critical
infrastructure threats, as well as emerging security challenges from the
Internet of Everything (IoE) and Deep Web, are also highlighted. The report
parallels Trend Micro's long-term projections in the recently released
nine-part online video drama entitled, "2020: The Series," depicting a
technology saturated society and the corresponding cyber threats.

"We see the sophistication of threats expanding at a rapid pace, which will
impact individuals, businesses and governments alike," said Raimund Genes,
CTO, Trend Micro. "From mobile banking vulnerabilities and targeted attacks,
to growing privacy concerns and the potential of a major breach each month,
2014 promises to be a prolific year for cybercrime. We will also see the
evolution of the IoE, which serves as a prelude to the surge in technological
advancements as the decade closes."

Prominent predications for 2014 include:

  oMalicious and high-risk Android apps will reach 3 million
  oBanking via mobile devices will be compromised by an uptick of
    Man-in-the-Middle attacks, making two-step verification inadequate
  oCybercriminals will increasingly use targeted-attack-type methodologies
    like open source research and highly customized spear phishing
  oTargeted attackers will increasingly use advanced threats such as
    clickjacking and watering hole attacks and target mobile devices
  oLack of support for popular software such as Java 6 and Windows XP will
    expose millions of PCs to attack
  oPublic trust, compromised by revelations of state-sponsored monitoring,
    will result in a variety of efforts to restore privacy
  oThe Deep Web will continue to vex law enforcement's ability to address
    widespread cybercrime

The report also focuses on the rise of the IoE, which promises to be the
proverbial game changer in personal technology in the years to come. With
augmented reality delivered through wearable technology including watches and
eyewear, the possibility of large-scale cybercrime from identity theft by 2020
is a very real possibility as the technology continues to proliferate from
2014 and beyond.

This reality is brought to life in Trend Micro's "2020: The Series," which is
based on Project 2020, a white paper developed in collaboration with the
International Cyber Security Protection Alliance (ICSPA). The unique series
presents a future consumed by technology and seeks to inspire stakeholders to
take action now against looming cyber vulnerabilities.

View "Blurring Boundaries: Trend Micro Security Predictions for 2104 and
Beyond" at:

Watch "2020: The Series" in its entirety to learn what the future holds for
technology at:

Supporting assets:
TrendLabs Security Intelligence Blog entry:

Simply Security Blog:

About Trend Micro
Trend Micro Incorporated a global leader in security software, rated number
one in server security (IDC, 2013), strives to make the world safe for
exchanging digital information. Built on 25 years of experience, our solutions
for consumers, businesses and governments provide layered data security to
protect information on mobile devices, endpoints, gateways, servers and the
cloud. Trend Micro enables the smart protection of information, with
innovative security technology that is simple to deploy and manage, and fits
an evolving ecosystem. All of our solutions are powered by cloud-based global
threat intelligence, the Trend Micro™ Smart Protection Network™
infrastructure, and are supported by over 1,200 threat experts around the
globe. For more information, visit

SOURCE Trend Micro Incorporated

Contact: Thomas Moore,, 972-499-6648
Press spacebar to pause and continue. Press esc to stop.