The Current State of Platform, Software and Device Security

The year 2012 and the better part of 2013 have witnessed the birth of new computing platforms, social network platforms and general computing trends that not only make the gadget and internet a better place, but also a more dangerous one. These innovations and developed habits expose us to a variety of threats that we must be aware of in order to survive in the modern digitally connected world.


The release of new platforms gives both legitimate technology users and hackers something to look forward to. Users have to test new features and functionalities as hackers seek to exploit loopholes in the innovations’ firewalls. Since the adoption of new technology improves our efficiency, we will always be vulnerable to the accompanied hacker attacks and hope that the platform, gadget or software developer will release security patches as soon as security related bugs show up.

Are Security Risks Increasing or Decreasing?

As genuine developers come up with new software pieces, malicious developers are also at work trying to come up with re-engineered pieces that are better at breaching current and yet-to-come systems. This trend, confirmed by the attempts to improve on Skywiper/flamer to Stuxnet, gives system administrators something new to think about since they will be facing better-equipped criminals in the near future.

Even though the security trends of the future might strongly lean on the weaknesses of the new platforms and operating systems, we cannot overlook the birth of mobile devices. Since most people do not believe that, there are systems that can intrude the innate security of their mobile devices, cyber criminals might have an easier time in gaining access into the information people share through their devices.

With the number of possible additions to this list almost endless, the number of risks grows exponentially. The diversification of platforms and computing behaviors might give the average person an information overload that might force them to overlook some important security features or give cyber criminals more options to explore.

Do We Have a Choice?

Apart from the security issue, the manner in which we interact with other people is bound to change. The adoption of online solutions will greatly reduce personal level interactions while reducing the control we have over some of the information we might refer to as “personal.”

Nonetheless, the productivity per unit time is bound to increase since we no longer have to do all the hard work. The new systems and hardware products will take care of most of our needs despite the security and privacy risks, making them almost as important as the basic human needs. We will have no option but to live with the emergent vices and make the best out of the available virtues.