Just when you thought you had all of your defenses in place when fighting Malware, Cyber Attacks, and Ransomware… think again! Cybercriminals are busy crafting new methods of attacks that are ready to take your data for prey and pounce on your personal information. Here are 10 new sneaky attacks to be on the look-out for in the new year!
- Rivaling governments and geopolitical cyber-warfare funding the efforts of cybercriminal gangs to create chaos, steal intellectual property, and profit from fraud and extortion by breaching personal data.
- New variants of ransomware (including doxware, which threatens to publish sensitive data like browsing histories unless a ransom is paid)
- Much more widespread use of cryptojacking (stealing computing resources to mine cryptocurrency without sharing the profits)
- More distributed denial-of-service (DDoS) attacks on critical servers and networks, abetted by the conscription of armies of Internet-of-Things (IoT) devices
- Increasing use of fileless malware (which never becomes disk-resident, only loads directly into memory, and thus evades many signature-based endpoint anti-malware measures)
- More synergistic attacks (in which multiple malware attacks are injected onto a system and the poorest-defended one activated using AI and ML to improve attack techniques
- Continued reliance on phishing as the most effective attack vector for malware, with more sophisticated attacks targeted at higher-value individuals.
- Increasingly target cloud services and edge computing environments with malware attacks
- Enslave legions of IoT devices for use in DDoS and cryptojacking attacks
- Exploit the new attack surfaces and rich data targets presented by 5G networks and applications.
Why did Easy IT Support partner with Symantec? Because Symantec is a enterprise grade security for the masses. Cyber safety for consumers!
A patchwork of stand-alone security products from multiple vendors is simply too expensive, too complex, and, even worse, it’s proven to be ineffective.
As the world’s leading cyber security company, we deliver a better way forward:
it’s called Integrated Cyber Defense.
An open platform that seamlessly combines security solutions from Symantec and our technology partners into a single framework across devices, networks, cloud, and datacenter infrastructure.
- Threat Prevention
- Incident Response
- Managed Security Services
Integrated to reduce complexity for ease of use and lower costs.
Reports out of Iran indicate that a massive attack on Iranian infrastructure and strategic networks took place in the last few days by a computer virus even more powerful than the Stuxnet worm that wrought tremendous damage on Iran's nuclear program.
Israeli officials are refusing to discuss any role they had in unleashing the virus, which has been described as “more violent, more advanced and more sophisticated" than Stuxnet.
What the repeal of net neutrality regulations means for cyber security?
COMMENTARY: Security issues aside, the FCC’s repeal of net neutrality pisses me off.
I know – that’s an unusual introduction to an article, but it’s important you know an author’s bias before taking their word on a subject. Security aside, I believe the repeal of net neutrality is a travesty for all citizens. The Internet has become so important to society that everyone should have affordable, unfettered access to it. Therefore, it makes sense that the government treat it like a utility or telecommunication service, and limit commercial organizations’ ability to constrain or control it. I’m not alone in feeling this way, as the vast majority of voters agree. Nonetheless, the FCC decided to repeal it late last year. Yes, this repeal introduces potential consumer ramifications, but it also presents new cyber security implications you need to consider as well.