Sunday, November 22, 2015

Wearable, Cloud, Automotive … cyber threats of 2016 – The Republic

CARS RELATED, wearable devices, cloud containing our data are just some of the goals of the attacks planned by the company Intel Security in its report on cyber threats for 2016. The phenomenon of ransonware, malware that encrypts data on the devices and then ask for a ransom to unlock them, in fact, is booming.

To feed the dangers of ransomware will still be guaranteed anonymity when accessing a network, both when you make payment or its collection. For these reasons, Intel Security is clear: “It will be a growing threat and growing rapidly. Over the next year a larger number of inexperienced criminals will be able to take advantage of the offer ransomware-as-a-service that could further accelerate the growth of this menace “.

Chapter important in safety reports also that the wearable devices . Although most of these gadgets memorize a relatively small amount of personal information, there may still be targeted by cyber criminals in order to compromise smartphones used for device management. “The industry,” predicts Intel Security, “will work to protect the potential attack surfaces as the operating system kernel, networks and Wi-Fi software, user interfaces, memory, local files and storage systems, the virtual machines, web applications, systems for access control and security software. “

The services cloud , in the course of 2016, will be an important target for cybercriminals. The bad guys, the report provides, may try to take advantage of the security policies, weak or ignored, that the companies have established to protect cloud services, now, now, “became the recipients of an increasing amount of confidential business information and that if exploited, could compromise the company’s organizational strategy, sales strategy of the company, the planned innovations, financial data, plans for acquisitions and disposals, the employee data and other valuable information, “it said.

In the focus there is also the field of ‘ automotive . “Researchers” predicts Intel Security, “will continue to focus on scenarios related to potential exploits of automobile systems connected without basic security features or failing to meet the best practices of security.” While companies operating in the security sector and automakers imagine collaborate to develop suggestions, but above standards and technological solutions to protect the many surfaces of attack, as the control unit of the engine to access systems of the vehicle, the control unit for engine and transmission, the enhanced driver assistance systems, remote key, the passive keyless access systems, the receiver V2X, USB ports, access diagnostic OBD, applications of remote connection and access via smartphones.

Not least will be attacks against all types of hardware and firmware . Crimes that are likely to continue in 2016 and, with them, will expand and grow the market further to the tools that make them possible. Virtual machines, provides Intel Security, will be affected with rootkit system firmware.

The report is notable for next year the likely development of a black market in stolen personal information, username and password. A phenomenon even more flourishing that will be structured into real virtual warehouses connected with each other to make available combinations of records. There will also be an increase in attacks by the employee personal systems.

“Companies”, provides Intel Security, “will continue to improve its security by implementing the latest security technology, hiring talented people and experienced, creating effective policy and maintaining a high level of attention. ” As a result, says the report, the attackers will try to shift their attention to attacking businesses through their employees, by targeting, among other things, employee personal systems, relatively insecure, to gain access to corporate networks.

One of the most significant in relation to the attack vectors will be in violation of the integrity of systems and data, selective and furtive. These attacks, he said, include the seizure and modification of transactions or data in favor of the attackers, such as changing settings intentional deposit of the salary of a victim and depositing the money in a different account. In 2016, McAfee Labs predicts that you can attend to threats to the integrity in the financial sector where millions of dollars could be stolen by cyber thieves.

All of these threats, provides Intel Security, will be an important lever in rapid growth of intelligence sharing between firms and threats of security vendors. And not only it will be definitely taken legislative initiatives that will enable businesses and governments to share threat information with governments. “The development of best practice in this area will speed up, and will be identified new methods of measurement to quantify the improvement of the protection, and strengthen cooperation between providers in the industry to share intelligence threats,” concludes the report.

LikeTweet

No comments:

Post a Comment