2014 Cybersecurity Threats to Money & Data


“Cybercriminal gangs of the 21st century will target cloud-based applications and data repositories because that’s where the data is” as predicted in McAfee® Labs’ 2014 Threat Predictions. Cloud cyber vulnerability was stressed by McAfee:

  • This could be through business applications that have not been assessed by IT against corporate security policies.
  • According to a recent report, more than 80% of business users use cloud applications without the knowledge or support of corporate IT.

The 2014 Threat Predictions were presented in 7 categories:

1: Mobile malware will be the driver of growth in both technical innovation and the volume of attacks in the overall malware “market” in 2014.

2: Virtual currencies will fuel increasingly malicious ransomware attacks around the world.

3: In the spy vs. spy world of cybercrime and cyberwarfare, criminal gangs and state actors will deploy new stealth attacks that will be harder than ever to identify and stop.

4: “Social attacks” will be ubiquitous by the end of 2014.

5: New PC and server attacks will target vulnerabilities above and below the operating system.

6: The evolving threat landscape will dictate adoption of big data security analytics to meet detection and performance requirements.

7: Deployment of cloud-based corporate applications will create new attack surfaces that will be exploited by cybercriminals.

Willie Sutton robbed banks because “that’s where the money is,” so McAfee made the point that cybercriminals go where the money and cloud data are using the quote “credited to Willie Sutton, who is said to have robbed 100 banks in the early 20th century.”

In the #3 spy v. spy world of cybercrime McAfee predicted:

Politically motivated attacks will continue to increase, especially around the 2014 Sochi Winter Olympics (in February) and the FIFA World Cup in Brazil (June-July). Hacktivists will also take advantage of these events to promote their ideas.

So stay tuned to see cyber warfare in 2014.

The publications contained in this site do not constitute legal advice. Legal advice can only be given with knowledge of the client's specific facts. By putting these publications on our website we do not intend to create a lawyer-client relationship with the user. Materials may not reflect the most current legal developments, verdicts or settlements. This information should in no way be taken as an indication of future results.

Search Tips:

You may use the wildcard symbol (*) as a root expander.  A search for "anti*" will find not only "anti", but also "anti-trust", "antique", etc.

Entering two terms together in a search field will behave as though an "OR" is being used.  For example, entering "Antique Motorcars" as a Client Name search will find results with either word in the Client Name.


AND and OR may be used in a search.  Note: they must be capitalized, e.g., "Project AND Finance." 

The + and - sign operators may be used.  The + sign indicates that the term immediately following is required, while the - sign indicates to omit results that contain that term. E.g., "+real -estate" says results must have "real" but not "estate".

To perform an exact phrase search, surround your search phrase with quotation marks.  For example, "Project Finance".

Searches are not case sensitive.

back to top