SHARE
Facebook X Pinterest WhatsApp

Mobile, IoT Face More Complex Attacks in 2015

Jan 23, 2015

Mobile, IoT Face More Sophisticated Attacks in 2015

Stealthier StealersStealthier Stealers

Cyber-espionage attacks will continue to increase. Long-term hackers will use stealthier information-gathering techniques. Newcomers will try to outdo adversaries by looking for new ways to steal sensitive information. Small nation-states and terrorist groups will increasingly use cyber-warfare.

More Internet of Things AttacksMore Internet of Things Attacks

The proliferation of IoT devices could give hackers access to personal data, as in the health-care industry, where personal data can be between 10 times and 20 times more valuable than stolen credit card data.

Data Privacy Debates to ContinueData Privacy Debates to Continue

This year will see ongoing discussions about what constitutes “personal information” and the extent to which it may be accessed and shared by state or private entities. Laws may evolve to regulate the use of previously anonymous data sets.

Cloudy RansomwareCloudy Ransomware

More mobile devices are likely to be attacked as ransomware evolves. The technique of ransomware to target data backed up in the cloud will proliferate in mobile.

Ransomware Virtual Currency to RiseRansomware Virtual Currency to Rise

A continued rise in mobile ransomware that uses virtual currency as a payment method is expected.

New Mobile Technologies to Tempt HackersNew Mobile Technologies to Tempt Hackers

Kits that generate malware and source code for mobile devices will make it easier for cybercriminals to attack mobile devices. “Malvertising” will drive traffic to rogue app stores.

POS Attacks to IncreasePOS Attacks to Increase

POS (point of sale) attacks will remain lucrative, as consumers adopt digital payment systems on mobile. Despite chip-and-pin cards and card readers, these breaches will continue to grow, due to the huge numbers of POS devices.

Shellshock Long-LastingShellshock Long-Lasting

Aftershocks from the Shellshock bug, which struck Yahoo in October and exploited a vulnerability in its Linux and UNIX servers, are expected to be felt for many years because there are so many potentially vulnerable devices—from routers to TVs to industrial controllers.

Popular Software Products Are VulnerablePopular Software Products Are Vulnerable

Stack pivoting, return- and jump-oriented programming and a better understanding of 64-bit software will help reveal new vulnerabilities in popular software products.

Escaping the SandboxEscaping the Sandbox

This year will see growth in the number of techniques used to exploit vulnerabilities in critical and popular applications, and cybercriminals will avoid application sandboxing, which limits environments in which code can execute.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.