Monday 30 May 2016

POE Q7

2015's top 5 cyber security risks in South Africa
As 2015 approaches Fortinet and its threat research division FortiGuard Labs, have taken a look ahead to determine the most significant cyber security threats of the upcoming New Year – both from the perspective of a Black Hat hacker.
Significant Trends and Cyber Security Threats from the Perspective of a Black Hat Hacker in 2015 Include:
1. Blastware to Destroy Systems, Erase Data and Cover Hacker Tracks
This destructive new trend of malware, following Scareware and Ransomware could lead to the ability for hackers to infiltrate systems, gather data and then wipe out the information to on systems and hard drives to cover tracks and thwart forensics. FortiGuard Labs observed the first indications of Blastware in 2014, Dorkbot/NGRbot, where the hackers had code routines built in, that if altered, would self-destruct and wipe out all information on the hard drive. well as a Threat Intelligence solutions
2. Hackers Look to Evade Law Enforcement, Frame the InnocentAs cyber crime increases, law enforcement practices to catch and penalize perpetrators increase with it. Thus, hackers must be more careful and calculated to evade arrest. In 2015, advanced evasion techniques will evolve in order for attackers to cover their tracks. To date, evasion has been currently focused on counter antivirus and intrusion prevention.
3. Internet of Things Becomes Internet of Threats (IoT)
In 2014, we saw an interesting shift – namely Heartbleed and Shellshock – focused on server side vulnerability and exploitation. Looking forward to 2015, we fully expect this trend to continue in an alarming way as black hat hackers pry open the Internet of Things. Hackers will continue to follow the path of least resistance as more and more devices are connected to the network. Vulnerabilities that Black Hat hackers will look to exploit will include Consumer home automation and security systems, as well as webcams, which
 4. Denial of Revenue/Data Breaches Continue and Expand2014 is becoming known as the “year of the data breach,” with significant thefts from stores like Target, Michaels, P.F. Changs and Home Depot. FortiGuard predicts this trend will continue in 2015 as hackers become more sophisticated and find new loopholes for infiltrating retail and financial systems. In the New Year, damages will also extend to denial of service on assembly line, factory, ERP/SAP systems, as well as healthcare and building management, creating even more challenges in the way of critical consumer data compromises, revenue losses and reputation damages for organizations globally.we are already beginning to see.
5. Rise in Counter Threat IntelligenceCrime services and solutions have already supported QA for malware, including sample scanning. Fortinet predicts this to extend to support QA for threat intelligence and undetected coverage for indicator of compromise (IOC) in 2015. As crime services extend their research and coverage, hackers will utilize the same type of processes for determining the best ways to bypass security systems. For example, current crime services scan malware against vendors’ capabilities to stop it, and give them a score result. As vendors expand from malware detection to threat intelligence correlation, criminals will work to counter this movement with the same type of approaches to find out if their botnet infrastructure is flagged in other intelligence systems as well, and work to hide their tracks.(IT News Africa-Africa technological newsletter).
 What can be done to avoid it
1. Protect your data, not just the perimeter.
2. Know your data
3. Wake up to the insider threat
4. Increase vigilance
5. Get to grips with mobile
6. Spend more money and time on cybersecurity.(BBC News).

No comments:

Post a Comment