SlideShare a Scribd company logo
1 of 15
Possible Cyber Security Threats of 2016:
Computing is becoming one of the important aspect of life these days. It's used in all area of life, from
personal pleasure to serious business dealings and contracts. It has opened the gates to so many
opportunitieswhichwere hardto imagine inthose early days. As the technologyiscomingforward that
much the development is happening to make life easier. Almost all the objects are smarter nowadays.
Name it and you will find it, mostly all the modern devices are enabledwith internet connectivity,from
smart phone, smart television to smart car. Many enhancement has been done which makes it very
differenttointeract,whetherit'ssight,soundor touch, everywhere technologyisinvolved inone or the
other way. No doubt, itโ€™s creating a real meaningful connection with everyone like suppliers, partners,
customers or government.
As the technologyismovingforward withan ease,the major issue of securityis alsogettingintense day
by day. Here are some of the major thingswhichwe had alreadyseentill this 2015, whichcreateda big
issues that cannot be ignored at all.
Cyberattacks:
The growthof smart devicesisgoingto be more in comingyears,so as the usersof these smartdevices.
The major concern is that though it comes with security featuresbut still threatsare happening, so the
growth of cyberattacks is there.
Hard to Detect Attacks:
We had alreadyseenlotof hardto detectattacksandone of themwhichisstill the biggestisMalware.In
thispast 2015, we alsosaw some newtypesof attackswhichwere evenhardertodetectforexample file
less attacks, exploits on remote shell, theft of personal credentials and many more.
New type of Devices:
In the past year Internet of Things (IoT) has made the tremendous growth. Nowadays, so many new
deviceshave become the partof ourlife. We have alreadyseenseveralsmartdeviceswhichare usefulfor
home security, high-tech smartphones or tablets which even gave growth to wearable devices such as
smart watch.
Absolutely, more companies will come forward to launch these type of new devices, but as these
companies compete which each other in providing devices as early as possible, they fail to provide the
security which makes it a big concern to look at.
Apart fromthis,these newdevicesare now acceptedwithinthe organizationaswell,so the possibilityof
carrying the confidential information which should not be leaked is there. It will be hard to accept but
these gadgets like smart watch donโ€™t even provide the basic security, which makes all the confidential
data vulnerableforattacks whichare fedintothese devices.Anotherimportantconcerntotake care of is
that these attacks whichare done on organizationcan create a big havoc for the company as well as for
their related clients also.
By looking at the above image you can clearly see that how many devices are available in the market.
Whether its tablets, wearable devices, loT devices and still more to see in coming years.
Growth in Cybercrime:
Aslongas these technologybased devicesare available,criminalswill alwaysbe there todoharm.So,itโ€™s
obvious thatcybercrime isgoingto make its stayfor longtimesto come.As businessistomake profitso
as these cybercriminals,theylookoutformonetary gainsinoneorthe otherwayaseasyaspossible. One
of the reasoncan be of the growthincloudcomputingwhichcancreate lotof vulnerabilitiesandpossible
threats as mostly cybercriminals go for the data.
Apart from that, cloud computing can also become one of the biggest platform for cybercriminals, as it
providesthe abilitytostore huge amountof dataanditโ€™snotevenpossibletoshutdownthe whole cloud
computing services.
By looking at the image below you can know that there are about 70% of people who thinks that
cybersecurityisthe growingconcernfortheirorganizationwhereasabout48% thinksitcanbe dangerous
that can lead to loss of life as well.
Is Organization Prepared?
It's not new that every country has faced cyber-attacks. Even though if we try to find out how many
country are prepared for the cyber-attacks if any happen in future, the answer will shock you. Though
mostcountriesthinksliketheyare preparedif anyof the cyber-attackhappens,whichisquite goodnews
but still efforts to make it better should be there.
Cybersecurity Policies of the Organization:
Preparation comes into action when the organization have the proper plans for that. By looking at the
above graph it can be said that only52% of the organizationhave a plan for cyber-attacksand only37%
of the company have adopted the industrial security standards. By this survey you can say there are
chances of devices getting compromised.
Budget of Organization:
Several organizations of different countries still say that their budget for cybersecurity is same, or they
are not sure and very few countries are there which has definitely increased their budget for
cybersecurity. Due tolackof thisstepit makesthe possibility forsome of the seriousattacks tocountries
which are not having up to the mark security measures, as most of the cyberattack techniques are hard
to detect by those old methods.
Based on all these, here I would like to share some possible cyber security related threats which can
happen in this year of 2016.
Attacks Related to Hardware:
In past year we saw some of the hardware relatedattacks like malware were able toreprogramthe disk
on sucha level whichmakesitmandatorytoreinstall the operatingsystemorreformatthe harddrives. It
is one of the example whichshowshowstrong the knowledge of attackersare and how aggressive they
have become, and this trend will definitely be seen in 2016 with some other major possible attacks.
Ransomware - One of the Growing Attack:
Ransomware hasgrownrapidlyfrom2014 onwards,we saw manyattacks of it inthe past year 2015 and
itโ€™spredictable thatitwillbe continuedin2016 as well.Recentlyin2015,Ransomware wassoldasone of
the service through Tor network whichanyone can get it with the help of virtual currencies like Bitcoin.
We evensawsome of the differenttypesof Ransomware like CryptoWall3,CyptoLockerandCTB-Locker,
its sure to say that 2016 will bring some other threats of Ransomware as well.
The main motive of Ransomware is to get income by the help of spam campaigns, and the wealthy
countries are the main targets. Till now Microsoft Office, Adobe PDF files or Graphic files has been the
target but in 2016 we can see that, other file extensions will also be used. Mac OSX is also one of the
popular OS, so itโ€™s most likely that it will become the next Ransomware target.
COUNTRIES AFFECTED BY RANSOMWARE
In the above images we can clearly determine,how the growth of Ransomware has taken place in past
three years and which countries are mostly affected by ransomware.
Vulnerable Applications:
It wasandtoday'sdate alsovulnerabilityof applicationsandsoftware are one of the majorconcernwhich
haven'tbeensolvedcompletely. Oneof the example isof AdobeFlashwhichhappenedrecently,some of
the vulnerabilitieslike CVE-2015-0311& CVE-2015-0313 were foundin AdobeFlashplayer.So,it'spossible
these typesof attackswill make more hype inthisyearaswell. Aswe can see above, severalapplications
were foundvulnerable. These vulnerabilitiesare still notthat dangerous,butthe concernedissue isthat
inthiscomingyearitispossiblethatthe vulnerabilityinapplicationsof Internetof Things(IoT)canbecome
much threatening.
Change in Payment Methods:
Earlierwasthe time whenshoppingjustneededcash.Intoday'sdate thoughcashpaymentdoesexistbut
othermethodshave alsocame intoplay.Thereare several methodsavailableformakingpayments.Some
of them are like paying through Bitcoins, ApplePay, Debit Cards and Credit Cards.
Definitely, the change has made an advancement but with this the threat of security has also been
extended.Bythe growthof otherpayingmethods,the chancesof attackshasalsoincreased. Asmuchthe
technology is making an advancement that much the attackers are also improving their techniquesin
attacking the target people.
Several change has been seen in methods of attack, but still some of the basic informationremainsthe
same such as usernames, passwords and other credentials. So, they have also found several ways to
lookout for these information. Due to this, we can surely say that it will continue in this 2016 as well.
Vulnerability in Employees Personal Systems:
Throughseveral yearswe have seensome of the high profileattacksanddefinitelythisyearcouldalsobe
the same. Though inthe past year2015, we got some bad newsfor large corporate companies, agencies
relatedtogovernments andevendatingwebsitessuchasAshleyMadison. The pointtonote inthesetype
of attacksisthat,there wasnotanyvisiblechange onwebsites.The targetwasconfidentialdatalikecredit
card details,social securitynumbers,residential addressandotherimportantdetailswhichwere stolen.
Thoughthese recentattackshasmade the securitya majorconcernand evencompanieshasalsostarted
takingprecautions. Youcansee thatsome of the companiesare eveninvestingontrainingemployees for
taking proper precautions, but these wonโ€™t be able to stop attackers completely. Attackers will opt for
other ways to get their work done. Though company make a smart choice of upgrading their security
systems, but still there are chances as organization is not aware about the security level of employees
personal computersystemsorwhere theyare usingthem, sothereโ€™sawhole lotof chance forthese type
of attacks in this year also.
Services of Cloud Computing:
From pastfewyearswe have seenthe growthof cloudcomputingservices.Fromsmall tobigcompanies,
most of them opt for cloud computing, as it offers data storage at minimum cost and accessibility to
connect anyone whenever you want.
The main concern is that, the data which is shared among these platforms and services are mostly
confidentialandanyleakcouldleadtobigproblems. Mostof the companiesuse cloudcomputingservices
for trading and other important things, which makes it quite reasonable why attackers would opt to do
theirnotoriousactoncloudservices. Apartfromthis,customersare alsohavingriskastheyare notaware
aboutwhatsecuritymeasuresare takenbythe companywhentheyare dealingwithsensitive data. Some
of the recentattacksof past yearare like databreach whichincludedexposingof informationlikeemails,
salarydetails,confidential informationof employeesandmuchmore. Majorityof the organizationsgofor
low-costor evenfree cloudserviceswhichmakesthe shareddata vulnerable assecuritydetailsof these
type of servicesare mostlynotrevealed. So,itโ€™squite sure tosaythat chancesof attacks are still there in
this year as well.
Wearable Devices:
In previous year we saw the huge growthof IoT (Internet of Things).At the time of beginning of loT the
mainmotive wasto make the normal devices"smart,"byaddingthe computingandwirelesstechnology
intoit.Some of the exampleslikesmartTVsandthe connectedhome devicesgave lotof promise forthe
same. In the past we saw the huge growth of it through wearable devices for example smart watches,
fitness trackers and other devices as well. In today's market some of the popular brands includes Apple
Watch and to name some other like Fitbit and Pebble.
In coming time definitely thereโ€™s going to be a boost in sales for these types of devices. Though these
types of devices collect simple type of data, which are further stored on smartphones, tablets or
computersbut,the sad part is that for hackers itโ€™snot that hard to break intothese devicesasit usesLE
(Low Energy) technology like Bluetooth for the process of data transfer applications, as Bluetooth
technology is one of the weak technology which should not be ignored.
The applications used for wearable devices does not come with solid security measures which literally
showsthat inthiscomingyearswe can see some of the major attacksthrough itlike oursmartphone get
completely hacked due to these type of devices.
Attacks on Automobiles:
Inpastyearwe sawhowmuchadvancementhasbeenmade andeventhe automobilesare alsoconnected
with the wireless technology. Though technology getting connected with automobiles is quite exciting,
but itshouldalsohave some properprotection methods whenitcomestosecurity,whichisnotquite up
to the mark as it has to be. Apart fromautomobiles,evenroads will alsogetconnectedwithtechnology
in the coming years.
As per the survey it has been said that there will be about 220 million cars on roads which will be
connected with internet and wireless technology, and from this about 12% of the cars will be internet
enabledinthis2016itself. More toadd,consumersare evenlookingforwardforthecarswhichgive access
to internet connectionthrough monitor installed in car, auto-detectionof traffic signals,alarm warning,
capable of night vision, access to social media and much more. As per the securityreport of Intel, it has
beenrevealedthatvehiclesshouldofferprivacyof data,encryptednetwork,monitoringof behavior which
is currently not available.
Recently one of the research has been done, where it has been showed that it is possible with certain
selected cars to be hacked through entertainment system and to send commands to its dashboards
functions andtotake controlovercertaincritical functionsof thecarlikesteering,brakesandtransmission
that also fromthe remotely locatedlaptop.So,itโ€™snotnew that it will openthe doors forhackers which
can lead to some serious life threatening issues.
Easily Available Stolen Data:
The security tools and products such as firewalls,gateways and other end point products works well in
protecting the users from common possible attacks. So, attackers look for some other ways to do their
mischievousbehavior.Theymightlookforsomeothervulnerabilityinthe securitysystemorelsetheywill
even opt for some other options such as to purchase the stolen credentials from the dark web.
Purchasingthe credentialsgive easyaccesstothe companiesdata,asitlookscompletelylegitdue tovalid
user-namesandpasswords.Inthiswaytheywillbe abletobypassall thesecuritysystem. Ithasbeenseen
frompastfewyears thatlotof datawasstolen fromorganizations,government,healthcare agencies,and
these type of attacks are still happening. To overcome this problem the security system of behavioral
detectionisinprocesswhichwill be availableincomingfew years,buttill thatthese attackscan be seen
in this 2016 and some coming years as well, as some of the trusted cybercriminals will easilybe able to
purchase stolen data, compromised details from the big warehouse of the dark market.
Different Approach:
Technology is advancing constantly, so itโ€™s nothing new that the improvement in online security is also
happeningpersistently.Nodoubt,the industryoranyorganizationwill alwayslookoutforthe bestwhen
it comes to securing their confidential data and other personal details.
One thingto note isthat as the technologyisimproving,thatmuch the plansand tactics of attackers are
improving.Attackers donotgowitholdtechniquesanymore,theyalsoconstantlykeeponimprovingtheir
skills and approach towards the attack they plan to do.
By looking at the past, anyone can say that these are some of the obvious attacks which happened and
thereโ€™s possibility of the same in present as well as near future, such as data breach, compromised
accounts, and many others. But the attackers are nowadays getting more skilled due to which they are
out to do some more dangerous attacks like changing the integrity of the system.
Attacks like makingchange in the integrityof the securitysystemismore dangerouscomparedto other
commonattacks whichhappens. Asby these type of attacks,attackers are able to make small change in
the security system, which can damage the system in a very serious manner. These type of attacks are
possible by someone who have the knowledge of the security system of organization, any employee or
any skilledcybercriminal.Mainmotive isnotto damage the system, butitโ€™sto make some change inthe
current security system to gain profit without making it known to anyone.
Recently these type of attacks has happened which are the perfect example of integrity attacks. For
example,researchers showing the car can be hacked. The motive behind this was not to shut down the
car but to show,howsome of the functionscanbe manipulatedwhichcanbe quite dangerous.Infuture
thereโ€™s lot of possibility to target financial sectors as well.
Online Snooping:
Online snoopingorCyberEspionageisonetypeof attack,whereattackerstrytogetthe secretinformation
of the organization, without getting permission of the owner. Itโ€™s one type of attack which has been
noticed in past years. It's mostly done for getting the advantage from rival, individuals, groups or any
government agency by using some of the methods on internet.
Here in below are some of the attacks whichhappenedinpast years,whichshows how it has increased
fromtime totime.Lookingatthe belowdata,itโ€™spossiblethatwe cansee inthisyearaswell asincoming
time.
Nowadays,attackersare alsogettingskilledwiththe techniquesandtheyare usingstrongermethodthen
before.Some of the attacksthatcouldpossiblytakeplace inthisorcomingyears are likethroughservices
of cloud computing like Dropbox, to take control over servers. Use of Tor network can rise, as it offer
undetectablesecretconnectionstoservers. Inlastfewyearswe saw thatthese typesof attacktookplace
by using some Microsoft documents. So, other file extensions such as .ppt, .doc or .xls, can be used in
future attacks.
Hacktivism โ€“ On its Rise:
Hacking isnot new,it has beendone throughmany years,and itโ€™s still goingto continue inthisyear and
infuture as well. Hacktivismisakindof hackinginwhicha purpose issociallyorpoliticallymotivatedand
the people who do these are known as hacktivist. There had been several cyberattacks which includes
popular ones like attacks on websites of Canadian police, government institutions, and many more. It's
mostly possible that in 2016 as well, we can see these type of attacks.
Cyber Attacks towards Critical Infrastructure:
CI (Critical Infrastructure) is the term government use for describing infrastructures, assets or systems
whichare importantfor the economyand society. These critical infrastructure isveryimportantandany
destructionorattacks on it can create a bigimpact onsecurity,safety,national publichealthoranything
combined with these type of matters. The point to notice is that these critical infrastructure are quite
dependableoneachother.So,if one getaffectedbyany attack, other will alsosufferinone orthe other
way. The types of critical infrastructure are like public health service, emergency services, bankingand
finance sectors, transportation services, important services provided by government.
The cyber-attacks on Critical Infrastructure is not new, though the attacks don't happen frequentlylike
othercommonattacks butwhenithappens,itdoeslotof impact.Some of the famousexamplesincludes
like Stuxnet Malware which happened during 2010. By looking at these attacks, it is possible that 2016
might see some cyber-attacks on Critical Infrastructures.
These are some of the possible threatswhichcanhappenor may not happenanditโ€™s evenpossible that
something could happen which is not listed here. I would like to know what your views are.

More Related Content

What's hot

Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
ย 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
ย 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
ย 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs
ย 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexAndreanne Clarke
ย 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
ย 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
ย 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec
ย 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
ย 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
ย 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecastSuresh Kesavan
ย 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
ย 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
ย 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
ย 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
ย 

What's hot (20)

BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
ย 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
ย 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
ย 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
ย 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
ย 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
ย 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence Index
ย 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
ย 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
ย 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
ย 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
ย 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
ย 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
ย 
Cyber Warfare
Cyber WarfareCyber Warfare
Cyber Warfare
ย 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
ย 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
ย 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
ย 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
ย 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
ย 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
ย 

Similar to Possible cyber security threats of 2016

What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
ย 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
ย 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetTechugo
ย 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
ย 
2014 Technology Predictions
2014 Technology Predictions2014 Technology Predictions
2014 Technology PredictionsChris Powell
ย 
2014 Tech Predictions by Daily Deal Builder
2014 Tech Predictions by Daily Deal Builder2014 Tech Predictions by Daily Deal Builder
2014 Tech Predictions by Daily Deal BuilderMarc Horne
ย 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
ย 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
ย 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022Bernard Marr
ย 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
ย 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfYamuna5
ย 
Using Cyber Security As a Contingency Measure To Combat Cyber Threats.pdf
Using Cyber Security As a Contingency Measure To Combat Cyber Threats.pdfUsing Cyber Security As a Contingency Measure To Combat Cyber Threats.pdf
Using Cyber Security As a Contingency Measure To Combat Cyber Threats.pdfVRS Technologies
ย 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeprcircle
ย 
Security Threats Predictions in 2015 โ€“ Netmagic
Security Threats Predictions in 2015 โ€“ NetmagicSecurity Threats Predictions in 2015 โ€“ Netmagic
Security Threats Predictions in 2015 โ€“ NetmagicNetmagic Solutions Pvt. Ltd.
ย 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success media and technology pvt ltd
ย 

Similar to Possible cyber security threats of 2016 (20)

What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
ย 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
ย 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
ย 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
ย 
2014 Technology Predictions
2014 Technology Predictions2014 Technology Predictions
2014 Technology Predictions
ย 
2014 Tech Predictions by Daily Deal Builder
2014 Tech Predictions by Daily Deal Builder2014 Tech Predictions by Daily Deal Builder
2014 Tech Predictions by Daily Deal Builder
ย 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
ย 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
ย 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
ย 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
ย 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
ย 
Using Cyber Security As a Contingency Measure To Combat Cyber Threats.pdf
Using Cyber Security As a Contingency Measure To Combat Cyber Threats.pdfUsing Cyber Security As a Contingency Measure To Combat Cyber Threats.pdf
Using Cyber Security As a Contingency Measure To Combat Cyber Threats.pdf
ย 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
ย 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
ย 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
ย 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
ย 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
ย 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
ย 
Security Threats Predictions in 2015 โ€“ Netmagic
Security Threats Predictions in 2015 โ€“ NetmagicSecurity Threats Predictions in 2015 โ€“ Netmagic
Security Threats Predictions in 2015 โ€“ Netmagic
ย 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
ย 

Recently uploaded

Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
ย 
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
ย 
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...nilamkumrai
ย 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...SUHANI PANDEY
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
ย 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
ย 

Recently uploaded (20)

Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
ย 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
ย 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 

Possible cyber security threats of 2016

  • 1. Possible Cyber Security Threats of 2016: Computing is becoming one of the important aspect of life these days. It's used in all area of life, from personal pleasure to serious business dealings and contracts. It has opened the gates to so many opportunitieswhichwere hardto imagine inthose early days. As the technologyiscomingforward that much the development is happening to make life easier. Almost all the objects are smarter nowadays. Name it and you will find it, mostly all the modern devices are enabledwith internet connectivity,from smart phone, smart television to smart car. Many enhancement has been done which makes it very differenttointeract,whetherit'ssight,soundor touch, everywhere technologyisinvolved inone or the other way. No doubt, itโ€™s creating a real meaningful connection with everyone like suppliers, partners, customers or government. As the technologyismovingforward withan ease,the major issue of securityis alsogettingintense day by day. Here are some of the major thingswhichwe had alreadyseentill this 2015, whichcreateda big issues that cannot be ignored at all. Cyberattacks: The growthof smart devicesisgoingto be more in comingyears,so as the usersof these smartdevices. The major concern is that though it comes with security featuresbut still threatsare happening, so the growth of cyberattacks is there.
  • 2. Hard to Detect Attacks: We had alreadyseenlotof hardto detectattacksandone of themwhichisstill the biggestisMalware.In thispast 2015, we alsosaw some newtypesof attackswhichwere evenhardertodetectforexample file less attacks, exploits on remote shell, theft of personal credentials and many more. New type of Devices: In the past year Internet of Things (IoT) has made the tremendous growth. Nowadays, so many new deviceshave become the partof ourlife. We have alreadyseenseveralsmartdeviceswhichare usefulfor home security, high-tech smartphones or tablets which even gave growth to wearable devices such as smart watch. Absolutely, more companies will come forward to launch these type of new devices, but as these companies compete which each other in providing devices as early as possible, they fail to provide the security which makes it a big concern to look at. Apart fromthis,these newdevicesare now acceptedwithinthe organizationaswell,so the possibilityof carrying the confidential information which should not be leaked is there. It will be hard to accept but these gadgets like smart watch donโ€™t even provide the basic security, which makes all the confidential data vulnerableforattacks whichare fedintothese devices.Anotherimportantconcerntotake care of is that these attacks whichare done on organizationcan create a big havoc for the company as well as for their related clients also.
  • 3. By looking at the above image you can clearly see that how many devices are available in the market. Whether its tablets, wearable devices, loT devices and still more to see in coming years. Growth in Cybercrime: Aslongas these technologybased devicesare available,criminalswill alwaysbe there todoharm.So,itโ€™s obvious thatcybercrime isgoingto make its stayfor longtimesto come.As businessistomake profitso as these cybercriminals,theylookoutformonetary gainsinoneorthe otherwayaseasyaspossible. One of the reasoncan be of the growthincloudcomputingwhichcancreate lotof vulnerabilitiesandpossible threats as mostly cybercriminals go for the data. Apart from that, cloud computing can also become one of the biggest platform for cybercriminals, as it providesthe abilitytostore huge amountof dataanditโ€™snotevenpossibletoshutdownthe whole cloud computing services. By looking at the image below you can know that there are about 70% of people who thinks that cybersecurityisthe growingconcernfortheirorganizationwhereasabout48% thinksitcanbe dangerous that can lead to loss of life as well.
  • 5. It's not new that every country has faced cyber-attacks. Even though if we try to find out how many country are prepared for the cyber-attacks if any happen in future, the answer will shock you. Though mostcountriesthinksliketheyare preparedif anyof the cyber-attackhappens,whichisquite goodnews but still efforts to make it better should be there. Cybersecurity Policies of the Organization: Preparation comes into action when the organization have the proper plans for that. By looking at the above graph it can be said that only52% of the organizationhave a plan for cyber-attacksand only37% of the company have adopted the industrial security standards. By this survey you can say there are chances of devices getting compromised. Budget of Organization: Several organizations of different countries still say that their budget for cybersecurity is same, or they are not sure and very few countries are there which has definitely increased their budget for cybersecurity. Due tolackof thisstepit makesthe possibility forsome of the seriousattacks tocountries which are not having up to the mark security measures, as most of the cyberattack techniques are hard to detect by those old methods.
  • 6. Based on all these, here I would like to share some possible cyber security related threats which can happen in this year of 2016. Attacks Related to Hardware: In past year we saw some of the hardware relatedattacks like malware were able toreprogramthe disk on sucha level whichmakesitmandatorytoreinstall the operatingsystemorreformatthe harddrives. It is one of the example whichshowshowstrong the knowledge of attackersare and how aggressive they have become, and this trend will definitely be seen in 2016 with some other major possible attacks. Ransomware - One of the Growing Attack: Ransomware hasgrownrapidlyfrom2014 onwards,we saw manyattacks of it inthe past year 2015 and itโ€™spredictable thatitwillbe continuedin2016 as well.Recentlyin2015,Ransomware wassoldasone of the service through Tor network whichanyone can get it with the help of virtual currencies like Bitcoin. We evensawsome of the differenttypesof Ransomware like CryptoWall3,CyptoLockerandCTB-Locker, its sure to say that 2016 will bring some other threats of Ransomware as well. The main motive of Ransomware is to get income by the help of spam campaigns, and the wealthy countries are the main targets. Till now Microsoft Office, Adobe PDF files or Graphic files has been the
  • 7. target but in 2016 we can see that, other file extensions will also be used. Mac OSX is also one of the popular OS, so itโ€™s most likely that it will become the next Ransomware target. COUNTRIES AFFECTED BY RANSOMWARE In the above images we can clearly determine,how the growth of Ransomware has taken place in past three years and which countries are mostly affected by ransomware.
  • 8. Vulnerable Applications: It wasandtoday'sdate alsovulnerabilityof applicationsandsoftware are one of the majorconcernwhich haven'tbeensolvedcompletely. Oneof the example isof AdobeFlashwhichhappenedrecently,some of the vulnerabilitieslike CVE-2015-0311& CVE-2015-0313 were foundin AdobeFlashplayer.So,it'spossible these typesof attackswill make more hype inthisyearaswell. Aswe can see above, severalapplications were foundvulnerable. These vulnerabilitiesare still notthat dangerous,butthe concernedissue isthat inthiscomingyearitispossiblethatthe vulnerabilityinapplicationsof Internetof Things(IoT)canbecome much threatening. Change in Payment Methods: Earlierwasthe time whenshoppingjustneededcash.Intoday'sdate thoughcashpaymentdoesexistbut othermethodshave alsocame intoplay.Thereare several methodsavailableformakingpayments.Some of them are like paying through Bitcoins, ApplePay, Debit Cards and Credit Cards. Definitely, the change has made an advancement but with this the threat of security has also been extended.Bythe growthof otherpayingmethods,the chancesof attackshasalsoincreased. Asmuchthe technology is making an advancement that much the attackers are also improving their techniquesin attacking the target people. Several change has been seen in methods of attack, but still some of the basic informationremainsthe same such as usernames, passwords and other credentials. So, they have also found several ways to lookout for these information. Due to this, we can surely say that it will continue in this 2016 as well.
  • 9. Vulnerability in Employees Personal Systems: Throughseveral yearswe have seensome of the high profileattacksanddefinitelythisyearcouldalsobe the same. Though inthe past year2015, we got some bad newsfor large corporate companies, agencies relatedtogovernments andevendatingwebsitessuchasAshleyMadison. The pointtonote inthesetype of attacksisthat,there wasnotanyvisiblechange onwebsites.The targetwasconfidentialdatalikecredit card details,social securitynumbers,residential addressandotherimportantdetailswhichwere stolen. Thoughthese recentattackshasmade the securitya majorconcernand evencompanieshasalsostarted takingprecautions. Youcansee thatsome of the companiesare eveninvestingontrainingemployees for taking proper precautions, but these wonโ€™t be able to stop attackers completely. Attackers will opt for other ways to get their work done. Though company make a smart choice of upgrading their security systems, but still there are chances as organization is not aware about the security level of employees personal computersystemsorwhere theyare usingthem, sothereโ€™sawhole lotof chance forthese type of attacks in this year also. Services of Cloud Computing: From pastfewyearswe have seenthe growthof cloudcomputingservices.Fromsmall tobigcompanies, most of them opt for cloud computing, as it offers data storage at minimum cost and accessibility to connect anyone whenever you want. The main concern is that, the data which is shared among these platforms and services are mostly confidentialandanyleakcouldleadtobigproblems. Mostof the companiesuse cloudcomputingservices for trading and other important things, which makes it quite reasonable why attackers would opt to do theirnotoriousactoncloudservices. Apartfromthis,customersare alsohavingriskastheyare notaware aboutwhatsecuritymeasuresare takenbythe companywhentheyare dealingwithsensitive data. Some of the recentattacksof past yearare like databreach whichincludedexposingof informationlikeemails, salarydetails,confidential informationof employeesandmuchmore. Majorityof the organizationsgofor low-costor evenfree cloudserviceswhichmakesthe shareddata vulnerable assecuritydetailsof these type of servicesare mostlynotrevealed. So,itโ€™squite sure tosaythat chancesof attacks are still there in this year as well. Wearable Devices: In previous year we saw the huge growthof IoT (Internet of Things).At the time of beginning of loT the mainmotive wasto make the normal devices"smart,"byaddingthe computingandwirelesstechnology intoit.Some of the exampleslikesmartTVsandthe connectedhome devicesgave lotof promise forthe same. In the past we saw the huge growth of it through wearable devices for example smart watches, fitness trackers and other devices as well. In today's market some of the popular brands includes Apple Watch and to name some other like Fitbit and Pebble.
  • 10. In coming time definitely thereโ€™s going to be a boost in sales for these types of devices. Though these types of devices collect simple type of data, which are further stored on smartphones, tablets or computersbut,the sad part is that for hackers itโ€™snot that hard to break intothese devicesasit usesLE (Low Energy) technology like Bluetooth for the process of data transfer applications, as Bluetooth technology is one of the weak technology which should not be ignored. The applications used for wearable devices does not come with solid security measures which literally showsthat inthiscomingyearswe can see some of the major attacksthrough itlike oursmartphone get completely hacked due to these type of devices. Attacks on Automobiles: Inpastyearwe sawhowmuchadvancementhasbeenmade andeventhe automobilesare alsoconnected with the wireless technology. Though technology getting connected with automobiles is quite exciting, but itshouldalsohave some properprotection methods whenitcomestosecurity,whichisnotquite up to the mark as it has to be. Apart fromautomobiles,evenroads will alsogetconnectedwithtechnology in the coming years.
  • 11. As per the survey it has been said that there will be about 220 million cars on roads which will be connected with internet and wireless technology, and from this about 12% of the cars will be internet enabledinthis2016itself. More toadd,consumersare evenlookingforwardforthecarswhichgive access to internet connectionthrough monitor installed in car, auto-detectionof traffic signals,alarm warning, capable of night vision, access to social media and much more. As per the securityreport of Intel, it has beenrevealedthatvehiclesshouldofferprivacyof data,encryptednetwork,monitoringof behavior which is currently not available. Recently one of the research has been done, where it has been showed that it is possible with certain selected cars to be hacked through entertainment system and to send commands to its dashboards functions andtotake controlovercertaincritical functionsof thecarlikesteering,brakesandtransmission that also fromthe remotely locatedlaptop.So,itโ€™snotnew that it will openthe doors forhackers which can lead to some serious life threatening issues. Easily Available Stolen Data: The security tools and products such as firewalls,gateways and other end point products works well in protecting the users from common possible attacks. So, attackers look for some other ways to do their mischievousbehavior.Theymightlookforsomeothervulnerabilityinthe securitysystemorelsetheywill even opt for some other options such as to purchase the stolen credentials from the dark web.
  • 12. Purchasingthe credentialsgive easyaccesstothe companiesdata,asitlookscompletelylegitdue tovalid user-namesandpasswords.Inthiswaytheywillbe abletobypassall thesecuritysystem. Ithasbeenseen frompastfewyears thatlotof datawasstolen fromorganizations,government,healthcare agencies,and these type of attacks are still happening. To overcome this problem the security system of behavioral detectionisinprocesswhichwill be availableincomingfew years,buttill thatthese attackscan be seen in this 2016 and some coming years as well, as some of the trusted cybercriminals will easilybe able to purchase stolen data, compromised details from the big warehouse of the dark market. Different Approach: Technology is advancing constantly, so itโ€™s nothing new that the improvement in online security is also happeningpersistently.Nodoubt,the industryoranyorganizationwill alwayslookoutforthe bestwhen it comes to securing their confidential data and other personal details. One thingto note isthat as the technologyisimproving,thatmuch the plansand tactics of attackers are improving.Attackers donotgowitholdtechniquesanymore,theyalsoconstantlykeeponimprovingtheir skills and approach towards the attack they plan to do.
  • 13. By looking at the past, anyone can say that these are some of the obvious attacks which happened and thereโ€™s possibility of the same in present as well as near future, such as data breach, compromised accounts, and many others. But the attackers are nowadays getting more skilled due to which they are out to do some more dangerous attacks like changing the integrity of the system. Attacks like makingchange in the integrityof the securitysystemismore dangerouscomparedto other commonattacks whichhappens. Asby these type of attacks,attackers are able to make small change in the security system, which can damage the system in a very serious manner. These type of attacks are possible by someone who have the knowledge of the security system of organization, any employee or any skilledcybercriminal.Mainmotive isnotto damage the system, butitโ€™sto make some change inthe current security system to gain profit without making it known to anyone. Recently these type of attacks has happened which are the perfect example of integrity attacks. For example,researchers showing the car can be hacked. The motive behind this was not to shut down the car but to show,howsome of the functionscanbe manipulatedwhichcanbe quite dangerous.Infuture thereโ€™s lot of possibility to target financial sectors as well. Online Snooping: Online snoopingorCyberEspionageisonetypeof attack,whereattackerstrytogetthe secretinformation of the organization, without getting permission of the owner. Itโ€™s one type of attack which has been noticed in past years. It's mostly done for getting the advantage from rival, individuals, groups or any government agency by using some of the methods on internet. Here in below are some of the attacks whichhappenedinpast years,whichshows how it has increased fromtime totime.Lookingatthe belowdata,itโ€™spossiblethatwe cansee inthisyearaswell asincoming time.
  • 14. Nowadays,attackersare alsogettingskilledwiththe techniquesandtheyare usingstrongermethodthen before.Some of the attacksthatcouldpossiblytakeplace inthisorcomingyears are likethroughservices of cloud computing like Dropbox, to take control over servers. Use of Tor network can rise, as it offer undetectablesecretconnectionstoservers. Inlastfewyearswe saw thatthese typesof attacktookplace by using some Microsoft documents. So, other file extensions such as .ppt, .doc or .xls, can be used in future attacks. Hacktivism โ€“ On its Rise: Hacking isnot new,it has beendone throughmany years,and itโ€™s still goingto continue inthisyear and infuture as well. Hacktivismisakindof hackinginwhicha purpose issociallyorpoliticallymotivatedand the people who do these are known as hacktivist. There had been several cyberattacks which includes popular ones like attacks on websites of Canadian police, government institutions, and many more. It's mostly possible that in 2016 as well, we can see these type of attacks. Cyber Attacks towards Critical Infrastructure: CI (Critical Infrastructure) is the term government use for describing infrastructures, assets or systems whichare importantfor the economyand society. These critical infrastructure isveryimportantandany destructionorattacks on it can create a bigimpact onsecurity,safety,national publichealthoranything combined with these type of matters. The point to notice is that these critical infrastructure are quite dependableoneachother.So,if one getaffectedbyany attack, other will alsosufferinone orthe other way. The types of critical infrastructure are like public health service, emergency services, bankingand finance sectors, transportation services, important services provided by government.
  • 15. The cyber-attacks on Critical Infrastructure is not new, though the attacks don't happen frequentlylike othercommonattacks butwhenithappens,itdoeslotof impact.Some of the famousexamplesincludes like Stuxnet Malware which happened during 2010. By looking at these attacks, it is possible that 2016 might see some cyber-attacks on Critical Infrastructures. These are some of the possible threatswhichcanhappenor may not happenanditโ€™s evenpossible that something could happen which is not listed here. I would like to know what your views are.