Security Software & Equipment Store

Friday, January 22, 2016

The Most Critical Cyber Threats in 2016

Security Researchers have identified four cyber threats which may pose the greatest risk to businesses and indivuals. First, the Rise of the IoT Zombie Botnet: There are many who say that 2015 was the year of the Internet of Things; but it was also the year the Internet of Things got hacked. 
Connected cars, medical devices, Barbie dolls and skateboards were just a few items shown to be vulnerable to hackers this year. If 2015 was the year of proof-of-concept attacks against IoT devices, 2016 will be the year we see many of these concept attacks move to reality. One trend we’ve already spotted is the commandeering of IoT devices for botnets. Instead of hackers hijacking your laptop for their zombie army, they will commandeer large networks of IoT devices—like CCTV surveillance cameras, smart TVs, and home automation systems. Second, Chip-and-PIN Innovations: Any time the security community closes one avenue of attack, hackers adapt and find another. When retailers stopped storing customer credit card numbers and transactions in databases, hackers sniffed their networks to grab the unencrypted data live as it was sent to banks for authentication. When retailers encrypted that live data in transit to prevent sniffing, attackers installed malware on point-of-sale readers to grab data as the card got swiped and before the system encrypted the numbers.
Thirdly, attacks That Change or Manipulate Data: In testimony this year, James Clapper, the director of national intelligence, told Congress that cyber operations that change or manipulate data in order to compromise its integrity—instead of deleting or releasing stolen data—is our next nightmare. Mike Rogers, head of the NSA and US Cyber Command said the same thing. And finally, Extortion Hacks: Following the Sony hack in late 2014, we predicted that hacker shakedowns would increase in 2015. By shakedown, we were referring not to standard ransomware attacks, whereby malware encrypts or otherwise locks access to a victim’s computer until the victim pays a ransom. We meant extortion hacks where attackers threaten to release sensitive company or customer data if the victim doesn’t pay up or meet some other demand. With these attacks, even if you have backed up your data and don’t care that hackers have locked you out of your system, public release of the data could ruin you and your customers. Which cyber threats do you anticipate as the greatest risks for 2016? Share your comments with the Cloud and Cyber Security Center. 

No comments:

Post a Comment