{"id":385,"date":"2017-01-04T18:53:49","date_gmt":"2017-01-04T18:53:49","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/the-year-in-security-trends-2017\/"},"modified":"2019-05-29T12:14:32","modified_gmt":"2019-05-29T12:14:32","slug":"the-year-in-security-trends-2017","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/","title":{"rendered":"The year in security: Trends 2017"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p class=\"wls-paragraph\">In its latest Trends paper, titled <a href=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2016\/12\/ESET-Trends-2017-security-held-ransom.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Security Held Ransom<\/a>, ESET has identified nine key areas in information security that are likely to have a notable impact in 2017. If there is one overarching theme, it is the challenge posed by the presence of more devices and technologies, many of which are coming together courtesy of the Internet of Things.<\/p>\n<p class=\"wls-paragraph\">Below we capture some of the key ideas discussed in the paper. For more detail and insight, we recommend you get yourself comfortable and read the report in full. It\u2019ll certainly put you in a more informed position when it comes to information security for the year ahead.<\/p>\n<p class=\"wls-paragraph\"><b>Ransomware of Things (RoT)<\/b><\/p>\n<p class=\"wls-paragraph\">In 2017, we\u2019re likely to see more instances of ransomware, an upswing in DDoS attacks and more attacks against Internet of Things (IoT) devices \u2026 on a bigger scale. Troublingly, notes Stephen Cobb, \u201cthere is potential for cross-pollination as<br \/>\nthey evolve\u201d.<\/p>\n<p class=\"wls-paragraph\">Particularly worrying is the future growth of the Ransomware of Things, whereby cybercriminals hijack a connected device and demand payment for access to be restored to the user.<\/p>\n<p><span class=\"block_quote_right\">\u201cTo stop the IoT become home to the RoT, a number of things need to happen, in two different spheres of human activity.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">\u201cTo stop the IoT become home to the RoT, a number of things need to happen, in two different spheres of human activity,\u201d Cobb explains.<\/p>\n<p class=\"wls-paragraph\">\u201cFirst is the technical sphere, where the challenge of implementing security on a vehicular platform is considerable \u2026 the second sphere \u2026 is policy and politics. The outlook here is not good because so far the world has failed abysmally when it comes to cybercrime deterrence.\u201d<\/p>\n<p class=\"wls-paragraph\"><b>Security education and social responsibility<\/b><\/p>\n<p class=\"wls-paragraph\">Needless to say, cybercrime isn\u2019t going anywhere, with 2017 likely to be characterized by a ruthless streak that began to take shape last year. As Camilo Guti\u00e9rrez notes, it is more critical than ever for everyone, personally and professionally, to develop a better understanding of the risks.<\/p>\n<p class=\"wls-paragraph\">What is especially important, is for all stakeholders \u2013 security experts, companies and educators, to name but a few \u2013 to tackle the weakest link in the security chain, the end user.<\/p>\n<p class=\"wls-paragraph\">\u201cEducating users regarding current threats and how they spread can make all the difference in reducing the impact of cybercrime in the future,\u201d states Guti\u00e9rrez.<\/p>\n<p class=\"wls-paragraph\">\u201cWe should not forget that security is the responsibility of everyone and not exclusive to those of us working in IT. These days, information is equally critical whether handled by a reporter or by an executive.\u201d<\/p>\n<p class=\"wls-paragraph\"><b>Mobile security<\/b><\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87614\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_450704737_Georgejmclittle.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_450704737_Georgejmclittle.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_450704737_Georgejmclittle-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_450704737_Georgejmclittle-65x42.jpg 65w\" alt=\"shutterstock_450704737_georgejmclittle\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">The evolution of mobile devices was expected to follow a similar pattern to that of desktops. However, as we\u2019ve seen with smartphones and tablets, the experience, the potential and the technology of these devices is taking us down another altogether exciting road.<\/p>\n<p class=\"wls-paragraph\">Unfortunately, it\u2019s a road littered with obstacles and threats, and it\u2019s set to be another tough year for mobile security, says Denise Giusto Bili\u0107. Malware targeting these devices, in all sorts of sophisticated ways, will be evident in even greater numbers, meaning more effort is required in delivering proactive and reactive security.<\/p>\n<p class=\"wls-paragraph\">\u201cThe growth of mobile malware is an undeniable reality, one that we have been predicting since 2013 and which is gaining strength as we speak,\u201d Bili\u0107 notes.<\/p>\n<p class=\"wls-paragraph\">\u201cDuring 2015, new variants of malicious code created for Android averaged 200 a month; during 2016, this number rose to 300 new monthly variants (in iOS the number is 2 per month). We would not be surprised to see this increase continue over the next year, averaging 400 new mobile malware variants per month for Android by the end of 2017.\u201d<\/p>\n<p class=\"wls-paragraph\"><b>Vulnerabilities<\/b><\/p>\n<p class=\"wls-paragraph\">As we know, vulnerabilities are one of the ways in which cybercriminals exploit security barriers. The good news is that the number of instances of this kind of compromise is decreasing, after hitting a historic high in 2014.<\/p>\n<p class=\"wls-paragraph\">However, as Lucas Paus explains, this does not tell the full picture, as when it comes to \u201ccritical\u201d vulnerabilities, these are in the ascendancy. For example, at the end of October, \u201cthe number of critical reported vulnerabilities corresponded to 40% of total vulnerabilities\u201d.<\/p>\n<p class=\"wls-paragraph\">\u201cBoth security solutions and the management of both updates and vulnerabilities will continue to play a leading role in the mitigation of [threats],\u201d Paus states.<\/p>\n<p class=\"wls-paragraph\">\u201cThese have the objective either of minimizing or eliminating both gaps in defensive measures and information leaks in the coming years.\u201d<\/p>\n<p class=\"wls-paragraph\"><b>Next-gen security software<\/b><\/p>\n<p class=\"wls-paragraph\">Working towards a future where there is improved understanding about the perceived differences between so-called first-generation malware detection and next-generation signature-less detection technology, is needed. There is far too much myth-making surrounding the latter, which is not helpful.<\/p>\n<p><span class=\"block_quote_right\">\u201cIt\u2019s clear that the distinctions between \u2018fossilized\u2019 and \u2018next-gen\u2019 products are often terminological rather than technological.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">Consider, as David Harley does, the purported distinctions between the two are \u201cterminological rather than technological\u201d. If you cut out all the marketing spin and get to the root of it, you can see that next-gen products approach malware in much the same way as the first-gen products \u2013 the wording that describes it, however, creates a sense of newness. He adds:<\/p>\n<p class=\"wls-paragraph\">\u201cSimilarly, when next-gen vendors talk about behavioral analysis as their exclusive discovery, they\u2019re at best misinformed: the term behavioral analysis and the technologies taking that approach have both been used in mainstream anti-malware for decades.<\/p>\n<p class=\"wls-paragraph\">\u201cIn fact, almost any detection method that goes beyond static signatures can be defined as behavior analysis.\u201d<\/p>\n<p class=\"wls-paragraph\"><b>Healthcare challenges<\/b><\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87612\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_248574760_Scanrail1.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_248574760_Scanrail1.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_248574760_Scanrail1-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_248574760_Scanrail1-65x42.jpg 65w\" alt=\"security\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">While there were fewer major and successful cyberattacks aimed directly at organizations operating within healthcare in 2016, make no mistake, the threat remains very real. Cybercriminals are keener than ever to launch ransomware attacks within this space, while new technology \u2013 think the Internet of Things \u2013 is opening up new avenues for malicious activity.<\/p>\n<p class=\"wls-paragraph\">Lysa Myers draws attention to the reality of improper implementation of security, which is inconsistent, flawed and insecure. Detailed assessment of risks is required, backups need to be regularly carried out and a better understanding of the vulnerabilities in equipment is paramount. Professionals also need to be cyber-aware.<\/p>\n<p class=\"wls-paragraph\">\u201cThe security of the healthcare industry is likely to be in the spotlight for the foreseeable future,\u201d Myers goes on to say.<\/p>\n<p class=\"wls-paragraph\">\u201cDespite the current troubles, the opportunity exists to make a significant transformation that could serve as a model of positive change for other industries, as the Internet of Things makes its way into our homes and workplaces.\u201d<\/p>\n<p class=\"wls-paragraph\"><b>Threats to critical infrastructure<\/b><\/p>\n<p class=\"wls-paragraph\">Cyberattacks on critical infrastructure made the headlines in 2016. It\u2019s a clear trend, and one that has devastating potential (critical infrastructure, as its name suggests, encompass vital assets that allow a country to function effectively \u2013 any serious incapacitation\/destruction can have severe implications).<\/p>\n<p class=\"wls-paragraph\">Cameron Camp and Cobb are of the opinion that in 2017, some cybercriminals will be looking to focus their attention on these kinds of attacks, especially via the internet infrastructure. Likewise, bolstering security is also on the top of the agenda, with inroads already being made (in the US, for example, there are now 24 ISACs).<\/p>\n<p class=\"wls-paragraph\">\u201cWe sincerely hope that efforts like this, and others around the world, get the backing and resources they need to succeed; however, for this to happen it will take more than good intentions,\u201d they both commented.<\/p>\n<p class=\"wls-paragraph\">\u201cIt might even require political pressure from the folks most likely to suffer from cyberattacks on critical infrastructure, the electorate.\u201d<\/p>\n<p class=\"wls-paragraph\"><b>Challenges and implications of cybersecurity legislation<\/b><\/p>\n<p class=\"wls-paragraph\">As we\u2019ve become accustomed to a world increasingly defined and shaped by technology, we\u2019ve started to see the wider world begin to tackle the legal challenges and complexities surrounding cybersecurity.<\/p>\n<p class=\"wls-paragraph\">From any perspective, let alone a global one, the task at hand is far from easy, discusses Miguel \u00c1ngel Mendoza, as \u201cthere are various tensions, positions&nbsp;and counterpoints\u201d that decision makers have to contend with. As the highly publicized stand-off between Apple and the FBI has shown, people have very different ideas about what is right or wrong.<\/p>\n<p class=\"wls-paragraph\">\u201cIn the light of these challenges and tensions, we can see the need to define clear rules for all stakeholders, perhaps based on international, regional or local agreements, which consider all parties,\u201d Mendoza suggests.<\/p>\n<p class=\"wls-paragraph\">\u201cThe objective [is to make] legislation truly effective, capable of being applied and executed.\u201d<\/p>\n<p class=\"wls-paragraph\"><b>Gaming platforms<\/b><\/p>\n<p class=\"wls-paragraph\">When it came to security, computers games did not really enter into the equation. However, with gaming moving online and onto mobile devices, cybercriminals have gravitated towards this immersive and popular environment.<\/p>\n<p class=\"wls-paragraph\">Money laundering, as a case in point, has migrated to the virtual world, explains Puodzius, while big gaming companies are attacked, malware is deployed and gaming networks knocked offline.<\/p>\n<p><span class=\"block_quote_right\">\u201cThe ever-increasing number of players, in conjunction with in-game monetary transactions, poses major security challenges for the future.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">\u201cThe ever-increasing number of players, in conjunction with in-game monetary transactions, poses major security challenges for the future,\u201d Puodzius states.<\/p>\n<p class=\"wls-paragraph\">\u201cOn top of that, integrated networking of gaming consoles with computers and mobiles is growing fast, this can have a significant impact on gaming\u2019s information security in the coming years.\u201d<\/p>\n<p class=\"wls-paragraph\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"http:\/\/www.welivesecurity.com\/2017\/01\/04\/year-security-trends-2017\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; In its latest Trends paper, titled Security Held Ransom, ESET has identified nine key areas in information security that are likely to have a notable impact in 2017. If there is one overarching theme, it is the challenge posed by the presence of more devices and technologies, many of which are coming together courtesy<\/p>\n","protected":false},"author":5,"featured_media":1734,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-385","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The year in security: Trends 2017 - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The year in security: Trends 2017\" \/>\n<meta property=\"og:description\" content=\"&nbsp; In its latest Trends paper, titled Security Held Ransom, ESET has identified nine key areas in information security that are likely to have a notable impact in 2017. If there is one overarching theme, it is the challenge posed by the presence of more devices and technologies, many of which are coming together courtesy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-04T18:53:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:14:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_489570172_Tashatuvango-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"The year in security: Trends 2017\",\"datePublished\":\"2017-01-04T18:53:49+00:00\",\"dateModified\":\"2019-05-29T12:14:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/\"},\"wordCount\":1496,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_489570172_Tashatuvango-623x410.jpg\",\"articleSection\":[\"uncategorized\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/\",\"name\":\"The year in security: Trends 2017 - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_489570172_Tashatuvango-623x410.jpg\",\"datePublished\":\"2017-01-04T18:53:49+00:00\",\"dateModified\":\"2019-05-29T12:14:32+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_489570172_Tashatuvango-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_489570172_Tashatuvango-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The year in security: Trends 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/the-year-in-security-trends-2017\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The year in security: Trends 2017 - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/","og_locale":"en_US","og_type":"article","og_title":"The year in security: Trends 2017","og_description":"&nbsp; In its latest Trends paper, titled Security Held Ransom, ESET has identified nine key areas in information security that are likely to have a notable impact in 2017. If there is one overarching theme, it is the challenge posed by the presence of more devices and technologies, many of which are coming together courtesy","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-01-04T18:53:49+00:00","article_modified_time":"2019-05-29T12:14:32+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_489570172_Tashatuvango-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"The year in security: Trends 2017","datePublished":"2017-01-04T18:53:49+00:00","dateModified":"2019-05-29T12:14:32+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/"},"wordCount":1496,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_489570172_Tashatuvango-623x410.jpg","articleSection":["uncategorized"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/","name":"The year in security: Trends 2017 - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_489570172_Tashatuvango-623x410.jpg","datePublished":"2017-01-04T18:53:49+00:00","dateModified":"2019-05-29T12:14:32+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_489570172_Tashatuvango-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_489570172_Tashatuvango-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"The year in security: Trends 2017"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/the-year-in-security-trends-2017\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=385"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/385\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1734"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}