Monday , 22 October 2018
Home » NEWS » OPINIONS & ANALYSIS » Cyber threats and Hacking Trends for 2016
Cyber threats and Hacking Trends for 2016

Cyber threats and Hacking Trends for 2016

Cyber threats and Hacking Trends for 2016

By Mike Hickson, Director, LSA Systems

This year has seen many unprecedented cyber-attacks. Events such as the recent TalkTalk and Ashley Madison data breach have shocked many online companies and data driven companies. We have seen the sophistication and scale of attacks evolving throughout this year with no sign of stopping or slowing down.

Staying ahead of the curve with regards to the latest advancements in ransomware, attacking trends and hacking technology has become not only wise but also necessary in order to increase your data protection.

LSA Systems, specialist in IT Security, has taken a look at what cyber-attack trends we should be on the lookout for in 2016.

Bringing it Closer to Home

In our growing digital world the home is fast becoming a place controlled through the cloud. Smart TV’s, lights and controls allow us to monitor and access our home devices through cloud software and tools. Moreover, all of our data gathered by these software programmes are also stored in the cloud, creating an area of vulnerability for attackers to exploit.

Most infrastructures in the home network are not prepared for cyber-attacks, making it a target that we can expect to see many attacks on throughout 2016 and beyond.

Personal Attacks, Customised for You

With the rapid advancement of personal devices in the work place and home environment, our behavioural patterns are always being monitored. This constant collection of personal data is a vulnerability which we predict will be taken advantage of by attackers during 2016. Next year is set to be the year of customised cyber-attacks.

The surface area in which cyber-attacks can be launched is growing internationally with personal devices that are constantly connected to the cloud on the rise. McAfee’s latest cyber threat report for 2016 predicted that the amount of tablets will increase by 19 million leading into 2019. Wearable devices will increase by 580 million by 2018. Smart devices such as these control almost all aspects of our lives, leaving our personal data and infrastructure vulnerable to cyber-attacks.

During 2016 we are expecting to see a larger emphasise on using the data gathered by smartphones, mobile devices, wearable devices, cloud based software as well as our internet habits to create cyber-attacks streamlined according to your own personalised data and behavioural patterns. By using credentials such as birthdates, the last 4 digits on your credit card, passwords as well as behavioural analytics tools, hackers will be able to break into personal accounts, making transactions that fit in line with your own credit card purchasing habits in order to avoid setting off alerts.

Pre-Packaged Cyber Attacks

Cyber-attacks as packaged goods will continue to expand throughout 2016. This will make personal attacks accessible to those who do not necessarily have the skills or experience to launch attacks themselves.

Due to this increase in accessibility, we can expect to see a rise in personal attacks by neighbours, colleagues, friends and family members that may want to access your personal data. Moving the motives for some cyber-attacks away from the traditional reasoning of financial gains and towards motives such as embarrassment, harassment and vandalism.

Knowing your vulnerabilities and making sure that you protect them will stand you in good stead for 2016. Whilst we will see a more advanced level of attacks throughout 2016, we will also expect IT security leaders and software to advance with it. By staying ahead of the curve you can avoid major attacks on secured data.

 

About Lara Lackie

Lara Lackie is a reporter for The IT Security Guru.