Are You Having A Technology Emergency?

Stradiant Blog

5 Expert Cybersecurity Predictions for 2016


The past year brought a staggering number of high-profile data breaches and other cyberattacks. As usual, most hackers waged attacks for financial gain. But 2015 also saw a handful of others beginning to take action for moral reasons, targeting companies they believed were doing wrong.

In the coming year, security experts expect there to be other new types of hacks that diverge from the standard blueprint. Below, find out the surprising (and scary) developments they're betting on.

  1. Destructive attacks worsen

    Not only will cybercriminals have a greater variety of motives, they will also increase their range of targets, Patrick Peterson, founder and CEO of security firm Agari, tells Inc. "Businesses and government entities that have never seen themselves in the crosshairs will move into the scope for these diversifying attackers," Peterson warns. Nontraditional targets such as power plants and consumer sites and applications are among those that could become victims.

  2. Social engineering gets personal

    Social engineering, the act of tricking someone to reveal desired information either in person or through electronic communication, is not new. But criminals will continue to use it in creative and effective ways, taking advantage of the fact that humans are the weakest link in any company's security. "They will pick one company, then one unsuspecting individual within that company to prey on," Peterson says. "Using information on that person, gleaned through the sites they've visited or data the hacker has purchased, the bad actors will convince the good ones to unknowingly betray themselves, and ultimately the organizations for which they work."

  3. Attacks through apps

    If you've ever read privacy policies for mobile apps, you know that some apps access your email, contacts, and text messages. Hackers have already targeted massively popular apps like Snapchat, but these new attacks will go further--the personal information will serve as the basis for a larger scheme. "An attack entry point via an app on a mobile device may well be able to access a whole company network," Margee Abrams, director of IT security services for Neustar, tells Inc. "In 2016, we will see many more companies recognizing this threat and applying for a professional vulnerability assessment that identifies potential security holes in networks, wireless networks, and applications."

Read more Source

IoT Reality: Smart Devices, Dumb Defaults
If you return a tech gift this Christmas, make sur...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 29 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to