Mobile, IoT Face More Complex Attacks in 2015

Mobile, IoT Face More Sophisticated Attacks in 2015

Stealthier StealersStealthier Stealers

Cyber-espionage attacks will continue to increase. Long-term hackers will use stealthier information-gathering techniques. Newcomers will try to outdo adversaries by looking for new ways to steal sensitive information. Small nation-states and terrorist groups will increasingly use cyber-warfare.

More Internet of Things AttacksMore Internet of Things Attacks

The proliferation of IoT devices could give hackers access to personal data, as in the health-care industry, where personal data can be between 10 times and 20 times more valuable than stolen credit card data.

Data Privacy Debates to ContinueData Privacy Debates to Continue

This year will see ongoing discussions about what constitutes “personal information” and the extent to which it may be accessed and shared by state or private entities. Laws may evolve to regulate the use of previously anonymous data sets.

Cloudy RansomwareCloudy Ransomware

More mobile devices are likely to be attacked as ransomware evolves. The technique of ransomware to target data backed up in the cloud will proliferate in mobile.

Ransomware Virtual Currency to RiseRansomware Virtual Currency to Rise

A continued rise in mobile ransomware that uses virtual currency as a payment method is expected.

New Mobile Technologies to Tempt HackersNew Mobile Technologies to Tempt Hackers

Kits that generate malware and source code for mobile devices will make it easier for cybercriminals to attack mobile devices. “Malvertising” will drive traffic to rogue app stores.

POS Attacks to IncreasePOS Attacks to Increase

POS (point of sale) attacks will remain lucrative, as consumers adopt digital payment systems on mobile. Despite chip-and-pin cards and card readers, these breaches will continue to grow, due to the huge numbers of POS devices.

Shellshock Long-LastingShellshock Long-Lasting

Aftershocks from the Shellshock bug, which struck Yahoo in October and exploited a vulnerability in its Linux and UNIX servers, are expected to be felt for many years because there are so many potentially vulnerable devices—from routers to TVs to industrial controllers.

Popular Software Products Are VulnerablePopular Software Products Are Vulnerable

Stack pivoting, return- and jump-oriented programming and a better understanding of 64-bit software will help reveal new vulnerabilities in popular software products.

Escaping the SandboxEscaping the Sandbox

This year will see growth in the number of techniques used to exploit vulnerabilities in critical and popular applications, and cybercriminals will avoid application sandboxing, which limits environments in which code can execute.

Karen A. Frenkel
Karen A. Frenkel
Karen A. Frenkel is a contributor to CIO Insight. She covers cybersecurity topics such as digital transformation, vulnerabilities, phishing, malware, and information governance.

Get the Free Newsletter!

Subscribe to Daily Tech Insider for top news, trends, and analysis.

Latest Articles