Follow on Google News News By Tag Industry News News By Place Country(s) Industry News
Follow on Google News | Targeted Attacks and Malware Set to be Biggest Cyber Threats of 2015Leading IT Security vendor ESET finds that the rate of cyber attacks is increasing and expects financially motivated attacks to grow in popularity through 2015
By: ESET Middle East Targeted attacks If there is one lesson IT security researchers have learned in recent years, it is that targeted attacks are an increasing trend. And 2015 won’t be an exception. Most commonly known as Advanced Persistent Threats (APTs), their main differences with traditional cyber-attacks are target selection, duration of attack and stealth. In most of these attacks, there is a specific target, as opposed to traditional attacks that use any available corporate targets for their purposes. Secondly, these kinds of attacks try to stay unnoticed for longer periods of time. In this context, it is important to notice that the attack vectors are predominantly Social Engineering Attacks or zero-day exploits. According to APTnotes (https://github.com/ Ransomware and malware Ransomware will be a key point for malware developers and it will be a more relevant threat in the following years. During 2014, we saw big companies like Yahoo, Match or AOL (http://www.welivesecurity.com/ Payment systems in the spotlight In parallel with the growing use of online payment systems, the cybercrime interest on attacking them grows too. At this point, it is already obvious that cybercriminals will continue putting efforts into payment systems the more money circulates on the web. On the other hand, point of sale systems are still a current technology and malware authors are well aware of that. In mid-2014 ESET published a blog post on We Live Security about the worm Win32/BrutPOS that tries to brute-force its way into PoS machines (http://www.welivesecurity.com/ There are other malware families for POS like JacksPos or Dexter, which could be the responsible ones for big attacks on Target wherein 40 million cards' data was stolen or Home Depot where 56 million cards were leaked after more than 5 months of the attack that started in April and was not discovered until almost September, when the company announces the leak. It is interesting to note that since the BlackPOS source code was leaked in 2012, it will probably facilitate the creation of new variants of this threat that will increase over the next few years. Internet of Things: Attacks on Things There is no reason to think that new devices that are going to be connected to the Internet, storing more data on them and being useful for users, are not going to be a target for cybercrime. The Internet of Things trend will surely create an interest for cyber criminals. During this year we have seen some evidence of this emerging trend, like attacks on cars shown at Defcon (https://media.defcon.org/ It should be noted though that the internet of things is an emerging space for cyber crime so it will take a few more years until it is in common use. Nevertheless, this will be a trend not for its quantity but for its uniqueness and innovation. These are only the most important things that ESET has identified as big trends for 2015 regarding malware and cyber-attacks. Of course there are other current trends like mobile attacks that will remain on the rise and much more information to be shared. Knowing what to expect can help organizations and users be more aware and thus better protected. About ESET Since 1987, ESET® (http://www.eset.com/) The Company has global headquarters in Bratislava (Slovakia), with regional distribution centers in San Diego (U.S.), Buenos Aires (Argentina), and Singapore. ESET has malware research centers in Bratislava, San Diego, Buenos Aires, Singapore, Prague, Košice (Slovakia), Krakow (Poland), Montreal (Canada), Moscow (Russia). ESET Middle East has its regional office in Dubai Internet City and manages an extensive partner network in 11 countries: United Arab Emirates, Saudi Arabia, Kuwait, Qatar, Oman, Bahrain, Yemen, Lebanon, Jordan Egypt and Libya. More information is available via www.eset.com/ End
Account Email Address Account Phone Number Disclaimer Report Abuse
|
|