Microsoft attaches great importance to the operating system of Windows 8, a few days before the burst will likely cause a hardware-level breach of the vulnerability.
The security mechanism in Windows 8 can prevent attacks on the operating system and drive hackers to develop malware that can directly infect hardware. McAfee has mentioned this in its security forecasts for 2012. The advance of Windows 8 boot loader security has led researchers to demonstrate how to hack the system through a traditional BIOS.
At the same time, Intel is developing its unified extended firmware interface, which enforces a secure boot, which will further force hackers to develop malware that can circumvent new defenses. With the use of mobile devices in the payment of funds and the transmission of many kinds of information, the attacks on such devices still receive more attention. To better control mobile devices, attackers will use the root permission tool, which is often used by consumers to add new functionality to the phone.
In addition, virtual currency trading will suffer more attacks next year because the places where the exchanges take place are public and unencrypted, making them ideal for Trojan attacks.