2015 Predictions Report: Hostage-Ware, OS X, Power Grids and More

Based on our predictive execution inspection technology, which monitors every process on machines it protects, we have unique visibility into advanced attacks. For example, earlier this year our researchers discovered and reported on government grade attack code being used to make ransomware invisible. As a result, we are regularly called upon by law enforcement and intelligence agencies to help with cyber-attack investigations. With 2015 just around the corner, we decided to take stock of the threat landscape over the past 12 months and predict what we believe will pose the biggest risks to businesses, consumers and nations next year. Below is our list of cyber security predictions for 2015.

  • OS X, Linux in the Cross Hairs
  • Enterprise Hostage-Ware
  • Critical Infrastructure Shut Downs
  • New Nation State Threats
  • Attacks as a Service