(IS-2016-57) 2016 Threats Predictions

This paper explores likely connected device vulnerabilities including attacks on integrity, working from home, payments, and wearables. More protection of hardware and firmware is needed as these become targets. Security challenges will be posed by network function virtualization and software-defined networks. Smart phones that control homes will become vectors for attacks. Some thieves will correlate database searches for value.

Download Research Paper