Five security disasters to shake the world
In the world of cyber security, disasters are no longer science fiction but a terrifying reality. We look at five of the most serious threats facing the world today.


IT security as a topic for serious discussion has stepped up a notch this year.
Two major forces have been behind this: compliance and the emergence of Stuxnet. The former, although undoubtedly more of a pressing concern for businesses, is considerably less exciting than the latter.
However, Stuxnet has had more of an impact on the general consciousness of not just the security sphere, but in the wider world too. It made people understand that cataclysmic events caused by cyber actions are now a serious possibility, and not just the imaginings of Hollywood scriptwriters.
IT PRO asked members of the security industry what disasters could strike and what their impact might be. We whittled it down to five plausible, in some cases fairly likely, eventualities.
The critical infrastructure collapse
The security of critical infrastructure providers has been on the lips of everyone from security researchers to GCHQ directors since Stuxnet broke out.
It is almost certain other pieces of malware with similar levels of sophistication and financial backing to Stuxnet are out there now. In fact, they are likely to be even more intelligent pieces of malicious kit, given they have hidden themselves from detection.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Consider this: any nuclear centres using Windows software are at risk from such threats, which could help hackers gain access to systems and initiate a major disaster. The potential for chaos is clear. No longer are cyber attackers limited to the digital world. They can take lives from the comfort of their own desk chair.
Outside of nuclear sites, hackers could compromise power grids, utility supplies and manufacturing equipment and cause utter devastation.
With the latter, if a hacker managed to modify the parameters of manufacturing systems, there could be an increase or decrease in production rates, thereby effecting businesses of all kinds. In turn, the economy would also take a hit.
Changes could also be made to the products or parts in production, tricking companies into sending out faulty parts, such as car brakes for instance. The turmoil that followed the Toyota brakes fiasco is reason enough for firms to worry.
It is clear that protecting these kinds of services is now vital to both businesses and national security at large. Panda Security summed it up nicely, telling IT PRO "this is not Sci-Fi, but reality right now."
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
CISA issues warning in wake of Oracle cloud credentials leak
News The security agency has published guidance for enterprises at risk
By Ross Kelly
-
Reports: White House mulling DeepSeek ban amid investigation
News Nvidia is caught up in US-China AI battle, but Huang still visits DeepSeek in Beijing
By Nicole Kobie
-
Put AI to work for IT operations
whitepaper Reduce the cost and complexity of managing hybrid applications
By ITPro
-
AI in the retail industry is spreading beyond the IT department
News AI has become a strategic imperative for retailers, delivering marked productivity gains
By Emma Woollacott
-
Maximizing contact center operations with generative AI assistants backed by responsible AI principles
whitepaper Reduce the cost and complexity of managing hybrid applications
By ITPro
-
IBM just launched powerful new open source AI models – here’s what you need to know
News Available under the Apache 2.0 license, IBM's Granite 3.0 models are trained on enterprise data and can out-perform the competition
By Emma Woollacott
-
Achieving business outcomes with generative AI
Webinar Take your hybrid cloud journey to the next level with generative AI
By ITPro
-
Wimbledon’s new Catch Me Up AI feature promises to keep fans up to date at the tournament – after it irons out some of the wrinkles
News The latest feature to come out of IBM’s partnership with Wimbledon will keep fans engaged from the early stages right through to the final with dynamic player insights
By Solomon Klappholz
-
AI demands new ways of data management
whitepaper The data leader’s guide for how to leverage the right databases for applications, analytics and generative AI
By ITPro
-
AI governance for responsible transparent and explainable AI workflows
whitepaper Build greater trust in your AI
By ITPro