Data breach statistics from aggregators globally paint a gloomy picture of the cyberspace we inhabit. More data records were leaked or stolen in the first half of 2017 than in all of 2016, and the future is looking just as bleak. Luckily, users have plenty of solutions to choose from to secure their data and privacy.
As 2017 draws to a close, Bitdefender is releasing a fresh set of data looking at the most prevalent cyber-attacks and the malware employed to conduct them. Chief among these e-threats: ransomware.
Taking the lion’s share as the most frequently-encountered threat, different ransomware families grew to 160+ this year alone, with dozens or (in some cases) even hundreds of variations per family. The most prolific ransomware strains this year were Troldesh / Crysis and GlobeImposter.
One in six spam e-mail messages comes bundled with some form of ransomware – either the malware itself is present in the
Read more at: https://www.techadvisor.co.uk/feature/security/bitdefender-2017-global-e-threat-landscape-key-findings-3669122/
Cyber crime is becoming more sophisticated, as are the measures to defend against it. But the most prominent attacks are the most basic and can be prevented by proactively addressing known cyber security vulnerabilities.
Mandatory data breach notification obligations commence on 23 February 2018, which means that businesses may no longer have the option to conceal cyber security breaches that have compromised their networks. Cyber security awareness should thus be a priority to reduce the risk of both legal and reputational damage.
In this respect, the Australian Cyber Security Centre (ACSC) 2017 Threat Report is a useful resource that details current trends in Australia’s cyber landscape and the means to counter these threats. The ACSC’s core observation is that cyber attacks are increasing in sophistication, particularly against government networks, but so are the defence measures against it.
Developments ‒ cyber criminals are becoming increasingly sophisticated
Read more at: https://www.lexology.com/library/detail.aspx?g=344c0164-bb17-466a-a284-527ebf08c888
The global cybersecurity landscape is set to experience rapid change and an increase in major attacks, according to a mid-year report released by Accenture.
The Cyber Threatscape Report 2017 , produced by iDefense, part of Accenture Security, predicts a continuation and escalation of high profile attacks seen in the first half of the year.
It also outlines the changing ways that hackers, both individual and state-sponsored, are looking to disrupt the landscape. It highlights their changing motivations and the different types of devices that can be maliciously exploited.
For instance, the report warns that the rapid adoption of IoT devices has created a significant rise in IoT botnets, which are expected to continue to grow as more diverse devices join the global network.
Ransomware has now displaced banking Trojans as one of the most common forms of malware
The explosion in the use of IoT devices means that the methods for protecting them are struggling to
Read more at: https://thestack.com/security/2017/07/27/changes-to-cybersecurity-landscape-create-global-threat-warns-accenture/
The 2016 top cyber security trends are most likely to spill into next year, vendors say. Distributed denial-of-service (DDOS) attacks, ransomware and misdirection are the biggest techniques cyber criminals will use in 2017.
ITWeb interviewed several IT security vendors to gauge if the 2017 cyber security space will be any different from what we have witnessed this year.
The vendors were in unison that the 2016 top trends were most likely to spill into next year. However, the vendors say the defenders will not be left helpless as cyber threats continue to escalate.
In 2017, Kaspersky Lab expects to see the appearance of memory-resident malware that has no interest in surviving beyond the first reboot that will wipe the infection from the machine memory. Such malware, intended for general reconnaissance and the collection of credentials, is likely to be deployed in highly sensitive environments by stealthy attackers keen to avoid arousing suspicion
Read more at: http://www.toptechnews.com/article/index.php?story_id=012000EWKTB0