Stonesoft: Top security threats in 2013

2012-12-13 12:02:16 -

Stonesoft predicts in 2013 the world will experience
more unseen and unknown targeted cyber attacks, espionage and hacktivism

Helsinki, Finland 2012 - December 13, 2012 - With 2013 just around the corner,
it is time for IT security experts to reflect on what has been, gaze into their
crystal ball and predict what is yet to come. Below are network security vendor
Stonesoft's top six predictions around the threats that we will be seeing in

"I believe in 2013 the security of the digital world will become even more
dominant. It is the security trend which is growing most rapidly at the moment
and its importance will just continue to grow in the future. This means there is
also an increasing need and pressure to think about international norms, rules
and regulations", says Jarno Limnéll, director of cyber security at Stonesoft.

"As nation-states continue to invest heavily in cyber capabilities (defense and
offense), it is also likely that they will be more inclined to use these
capabilities and the use of "cyber force" in the world will increase. This may
have severe consequences - in particular with regard to unpredictable side-
effects. A single attack can spread rapidly around the world, even by a mistake.
There is a myriad of players who are investing immense resources to change the
cyber reality", Limnéll continues.

With over 20 years of experience in network security, Stonesoft's predicts:

1.   The world will experience more targeted cyber attacks. The development of
highly sophisticated malware by state-sponsored organizations has the potential
to radically affect the speed at which the wider threat landscape evolves. Cyber
threats will become more unpredictable than ever before.

2.   Espionage by nation-states will continue to rise. In 2012 we saw botnets
and malware silently send the whole contents of the user's hard drive to a
control machine. This will continue to be a problem in 2013. The protection of
critical national infrastructure will continue to be an extremely important
aspect of cyber security.

3.   Hacktivism will grow and become increasingly relevant and dreaded - in
particular, it will become more aggressive and its means and impact will become
more powerful. At the same time, the role of non-nation players will become more
important, in particular with respect to expertise, not just resources.

4.   We will see even more advanced evasions techniques (AETs) being used
against organizations and governments. As security technologies and the overall
capability to catch cyber criminals and hackers improve, they will invest their
"R&D" resources in developing increasingly sophisticated and stealthy attack
delivery technologies to improve their ROI.  The most worrying part of this is
that current security technologies are not capable of stopping AETs and the
targets will remain unaware that they have been attacked.

5.   In 2012 we heard about a lot of vulnerabilities in closed source enterprise
applications such as Oracle, SAP and SCADA. These applications contain business
critical data and are highly valuable targets for intruders. This will continue
to be a problem in 2013.

6.   Android will continue to be targeted by hackers. The platform provides an
attractive environment for malware and hackers will take advantage of this.
It is likely we will see the first global consumer brand go bankrupt as a
consequence of a cyber- attack that ruins its reputation and customer

"As the cyber capabilities of various players around the world increase and we
will see more and increasingly sophisticated targeted attacks, traditional
security systems are no longer able to provide sufficient protection", says
Ville Hämäläinen, Director, R&D at Stonesoft.

"To defend themselves against today's cyber threats, organizations need to make
the leap from traditional, reactive security against known threats to proactive
cyber defense and offense capabilities and readiness against "unknown unknowns"
in order to increase operational resilience, Hämäläinen continues.

For more details, please contact:

Jarno Limnéll
Director, Cyber Security
Stonesoft Corporation
Tel. +358 40 527 6173
E-mail: jarno.limnell(AT)
Twitter: @JarnoLim

Ville Hämäläinen
Director, R&D
Stonesoft Corporation
Tel. +358 40 700 6855

About Stonesoft

Stonesoft Corporation (NASDAQ OMX: SFT1V) delivers software based, dynamic and
customer driven network security solutions that secure the information flow and
simplify security management. The company's product portfolio consists of the
industry's first transformable Security Engine, standalone next generation
firewalls and intrusion prevention systems, and SSL VPN solutions. At the core
lies Stonesoft's Management Center which unifies the management of entire

Stonesoft serves private and public sector organizations requiring high
availability, ease of management, compliance, dynamic security and protection of
their critical digital assets and business continuity against today's rapidly
evolving cyber threats. Stonesoft is a recognized researcher of advanced evasion
techniques used in targeted cyber attacks to bypass security.

Stonesoft has the highest customer retention rate in the industry due to low
TCO, ease of management, and overall customer excellence. Stonesoft's customer
base covers more than 6,500 mid- or large-sized organizations across various
industries and geographical markets.

Founded in 1990, the company's track record is well recognized by certifiers,
industry analysts and demanding customers. The company's corporate headquarters
are based in Helsinki, Finland and North American headquarters in Atlanta,
Georgia. For more information, visit

This announcement is distributed by Thomson Reuters on behalf of
Thomson Reuters clients. The owner of this announcement warrants that:
(i) the releases contained herein are protected by copyright and
other applicable laws; and
(ii) they are solely responsible for the content, accuracy and
originality of the information contained therein.

Source: Stonesoft Oyj via Thomson Reuters ONE

Press Information:

Contact Person:

email: e-mail

Disclaimer: © 2014 Thomson Reuters. The press releases or report contained herein is protected by copyright and other applicable laws, treaties and conventions. Information contained in the releases is furnished by Thomson Reuters's, who warrant that they are solely responsible for the content, accuracy and originality of the information contained therein. All reproduction, other than for an individual user's personal reference, is prohibited without prior written permission.