{"id":15641,"date":"2014-01-21T00:00:00","date_gmt":"2014-01-20T23:00:00","guid":{"rendered":"https:\/\/www.soundpr.it\/post_news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/"},"modified":"2014-01-21T00:00:00","modified_gmt":"2014-01-20T23:00:00","slug":"cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale","status":"publish","type":"news","link":"https:\/\/www.soundpr.it\/en\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/","title":{"rendered":"Smarter, shadier and stealthier cyber crime forces industry  to dramatic change"},"content":{"rendered":"<p><\/p>\n<p style=\"text-align: justify;\" align=\"center\"><em>Security report highlights shifting crime tactics and what to expect in 2014 <\/em><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.sophos.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos<\/a> today released its latest <a href=\"http:\/\/www.sophos.com\/threatreport\" target=\"_blank\" rel=\"noopener noreferrer\">Security Threat Report<\/a>. The report outlines the significant changes in cyber criminal behavior over the course of last year and a forecast for their preferred methods of attack in 2014. This year cyber criminals continued the theme of professionalization of their \u2018industry\u2019, offering easy to buy and use services that amplified the scale of cyber crime to never before seen levels.<\/p>\n<p style=\"text-align: justify;\">\u201cWhile many security experts are aware of the high level trends, few have recognized their significance\u201d said James Lyne, global head of security research at Sophos. \u201cIf 2013 has taught us anything, it is that traditional security controls are struggling. These new behaviors are forcing the industry to adapt and change, and widely held best practices must be reconsidered.\u201d<\/p>\n<p style=\"text-align: justify;\">The threat report highlights new security concerns ranging from stealthy malware tools that offer dynamic camouflage and provide attackers with long-term persistent access to users\u2019 data, to the proliferation of connected devices that represent new and often ill-protected targets. Many new \u201cInternet of things\u201d devices are becoming commonplace in our homes and everyday infrastructure, offering shadier cyber criminals the potential to impact our daily lives, rather than just the traditional theft of financial information.<\/p>\n<p style=\"text-align: justify;\">\u201cThese trends are set to continue in 2014 as threats become even smarter, shadier and stealthier,\u201d said Lyne.<\/p>\n<p style=\"text-align: justify;\">In 2014 Sophos predicts greater focus from cyber criminals on high quality and convincing phishing and social engineering to compensate for harder to exploit operating systems like Windows 8.1; embedded devices (such as POS systems, medical systems and new \u2018smart\u2019 infrastructure) will open old wounds as security mistakes eliminated in the modern PC environment are carelessly re-implemented; attacks on corporate and personal data in the cloud will continue to grow as providers struggle to refine the security strategy in this new computing platform; and malware for mobile is set to become as sophisticated as its PC relatives.<\/p>\n<p style=\"text-align: justify;\">\u201cIt is clear in 2014 we need to be watching not just the evolution of existing attacks, but be prepared for dangerous new threats emerging that we haven\u2019t previously dealt with,\u201d said Gerhard Eschelbeck, CTO at Sophos. \u201cAs the industry adapts and enhances protection mechanisms to cover new devices and threats, this is increasingly becoming an issue for every member of society, not just for government and business.\u201d<\/p>\n<p style=\"text-align: justify;\">A full copy of the <a href=\"http:\/\/sophos.com\/threatreport\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Threat Report 2014: Smarter, Shadier, Stealthier Malware<\/em><\/a> containing more information and statistics on cybercrime in 2013, as well as top tips and predictions on emerging trends, can be <a href=\"http:\/\/sophos.com\/threatreport\" target=\"_blank\" rel=\"noopener noreferrer\">downloaded here<\/a>. A <a href=\"http:\/\/blogs.sophos.com\/2013\/12\/10\/sophos-security-threat-report-2014\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a> discussing the Threat Report 2014 is also available.<\/p>\n<p><\/p>","protected":false},"featured_media":15642,"template":"","news_categories":[147],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber criminali sempre pi\u00f9 astuti costringono il mercato ad un cambiamento radicaleSmarter, shadier and stealthier cyber crime forces industry to dramatic change - soundPR<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber criminali sempre pi\u00f9 astuti costringono il mercato ad un cambiamento radicaleSmarter, shadier and stealthier cyber crime forces industry to dramatic change - soundPR\" \/>\n<meta property=\"og:description\" content=\"Security report highlights shifting crime tactics and what to expect in 2014 Sophos today released its latest Security Threat Report. The report outlines the significant changes in cyber criminal behavior over the course of last year and a forecast for their preferred methods of attack in 2014. This year cyber criminals continued the theme of [...]Read More...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/\" \/>\n<meta property=\"og:site_name\" content=\"soundPR\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/csthreat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"295\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/\",\"url\":\"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/\",\"name\":\"Cyber criminali sempre pi\u00f9 astuti costringono il mercato ad un cambiamento radicaleSmarter, shadier and stealthier cyber crime forces industry to dramatic change - soundPR\",\"isPartOf\":{\"@id\":\"https:\/\/www.soundpr.it\/#website\"},\"datePublished\":\"2014-01-20T23:00:00+00:00\",\"dateModified\":\"2014-01-20T23:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.soundpr.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber criminali sempre pi\u00f9 astuti costringono il mercato ad un cambiamento radicale\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.soundpr.it\/#website\",\"url\":\"https:\/\/www.soundpr.it\/\",\"name\":\"soundPR\",\"description\":\"Sound Public Relations\",\"publisher\":{\"@id\":\"https:\/\/www.soundpr.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.soundpr.it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.soundpr.it\/#organization\",\"name\":\"soundPR\",\"url\":\"https:\/\/www.soundpr.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.soundpr.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/Logo-hd-wht.png\",\"contentUrl\":\"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/Logo-hd-wht.png\",\"width\":168,\"height\":69,\"caption\":\"soundPR\"},\"image\":{\"@id\":\"https:\/\/www.soundpr.it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber criminali sempre pi\u00f9 astuti costringono il mercato ad un cambiamento radicaleSmarter, shadier and stealthier cyber crime forces industry to dramatic change - soundPR","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/","og_locale":"en_US","og_type":"article","og_title":"Cyber criminali sempre pi\u00f9 astuti costringono il mercato ad un cambiamento radicaleSmarter, shadier and stealthier cyber crime forces industry to dramatic change - soundPR","og_description":"Security report highlights shifting crime tactics and what to expect in 2014 Sophos today released its latest Security Threat Report. The report outlines the significant changes in cyber criminal behavior over the course of last year and a forecast for their preferred methods of attack in 2014. This year cyber criminals continued the theme of [...]Read More...","og_url":"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/","og_site_name":"soundPR","og_image":[{"width":625,"height":295,"url":"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/csthreat.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/","url":"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/","name":"Cyber criminali sempre pi\u00f9 astuti costringono il mercato ad un cambiamento radicaleSmarter, shadier and stealthier cyber crime forces industry to dramatic change - soundPR","isPartOf":{"@id":"https:\/\/www.soundpr.it\/#website"},"datePublished":"2014-01-20T23:00:00+00:00","dateModified":"2014-01-20T23:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.soundpr.it\/news\/cyber-criminali-sempre-piu-astuti-costringono-il-mercato-ad-un-cambiamento-radicale\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.soundpr.it\/"},{"@type":"ListItem","position":2,"name":"Cyber criminali sempre pi\u00f9 astuti costringono il mercato ad un cambiamento radicale"}]},{"@type":"WebSite","@id":"https:\/\/www.soundpr.it\/#website","url":"https:\/\/www.soundpr.it\/","name":"soundPR","description":"Sound Public Relations","publisher":{"@id":"https:\/\/www.soundpr.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.soundpr.it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.soundpr.it\/#organization","name":"soundPR","url":"https:\/\/www.soundpr.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.soundpr.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/Logo-hd-wht.png","contentUrl":"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/Logo-hd-wht.png","width":168,"height":69,"caption":"soundPR"},"image":{"@id":"https:\/\/www.soundpr.it\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/news\/15641"}],"collection":[{"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/types\/news"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/media\/15642"}],"wp:attachment":[{"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/media?parent=15641"}],"wp:term":[{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/news_categories?post=15641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}