Android, Antivirus, Apple, Crypto Currency, Enterprise, GDPR, Internet Security, iPhone, Mobile

10 Cyber Security trends to look out for in 2018

It is still too early to predict whether 2018 will be safer than 2017 when it comes to cybersecurity. It…

It is still too early to predict whether 2018 will be safer than 2017 when it comes to cybersecurity. It is fair enough to say that this question has been raised since last year wasn’t the best for many IT companies and global organizations. However, experts have already made a few predictions for 2018 based on the current cyber security trends. Let’s have a look at them one at a time:

 

1) A.I. Cybersecurity

Artificial intelligence has come a long way from where it once started. AI-powered programs today are capable of monitoring events which can help identify incoming cyber attacks. However, according to experts, cybersecurity AI may beat the purpose for what it is designed as it may be able to assist hackers in carrying out even more complex attacks. Some have even called them double-edged swords.

 

2) IoT (Internet of Things) with improved security features

Internet of Things, which is a growing topic of conversation today, is the correlation of computing devices with physical objects via the internet, such that they are able to send and receive data. From Apple Watches to Nest Thermostats, IoT will see a growth like never before with some professionals estimating over 20 billion connected units by the end of this year. If anything can cause an obstacle in this positive transformation, it would certainly be a collapse of security. After the massive amounts of DDoS attacks in 2017, security leaders have gotten a heads up about possible compromises through IoT devices. We certainly can expect a good amount of improved security features associated with IoT devices this year.

 

3) Biometric Authentication

Let’s face the truth! Usernames and Passwords suck! They are impersonal and put a burden on users in remembering them. With the introduction of fingerprint sensors on mobile phones and the huge success of Apple’s FaceID, we should expect more of biometric-enabled devices in the coming months. While it might be a little too early to expect biometric authentication in all our daily accounts, we might see a start of a new identity authentication evolution.

 

4) GDPR – General Data Protection Regulation (GDPR)

General Data Protection Regulation is probably something we haven’t heard till lately. GDPR is a set of regulations, expected to go into effect on May 25, 2018, that is intended to strengthen data protection for all individuals and businesses within the European Union. While its to early to predict anything, the GDPR is expected to have a significant influence on the digital sector of Europe.

 

5) Cyber attacks on global organizations

Mainframes are the backbone of most global organizations. These are the computers responsible for processing bulk data such as statistics, census, bank operations and ATM transactions. While security firms focus more on protecting mobile and computer systems, mainframes are being overlooked.

 

6) Cloud security

With the automotive industry recently joining the cloud family, providing users with state of the art navigation systems, it is predicted that there would be huge investments to secure the cloud environment. The priority would be to generate trust among cloud users to store data without hesitation on servers they don’t own.

 

7) Increase in Ransomware

Ransomware, as the name suggests, is a malicious virus where the victim’s access to information is blocked unless a ransom is paid. Typically, the ransom amount is in hundreds or thousands of dollars although sometimes even higher. Last year itself, there has been an increase of 36 percent of ransomware and the trend doesn’t seem to slow down. The Petya Ransomware that caused mayhem in almost all of Europe and other parts of the world in 2017 is a warning to expect more.

 

8) Cryptocurrencies and Blockchains

Cryptocurrencies have been an evolution. However, they do have certain drawbacks, especially when it comes to bitcoins. Since Bitcoin transactions do not require identity verification and can be done anonymously, they have fueled events of ransom threats like never before.

This is predicted to continue growing as we progress into 2018. Cryptocurrencies have been built around the concept of blockchains and this technology is just limited to them. While it is tough to predict what other implications blockchains might have on cybersecurity, some educated predictions say they could be used in decentralizing access control and improving identity management.

 

9) Threats to serverless apps

While serverless apps have some considerable advantages, they are potential threats to cyber-attacks, the reason being – the lack of servers. It might seem counter-intuitive at first as for the most part, the security of the serverless application is controlled by the customer itself. However, that isn’t always the best idea, as a users device might not always be the safest location to store important information.

 

10) Safer for everyone

2017 was a year when we experienced cyber attacks we have never seen before. Such events have pushed security experts to carry out careful investigations to make sure certain cybercrimes do not repeat. Governments and tech-firms have invested an immense amount of money to tackle a problem that caused more than $3 trillion of damages worldwide just last year. The increased amount of general awareness and the proper preparedness from various authorities should make the internet a much safer place for everyone.

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto Currency

Elon Musk’s Dad Blames Social Media Meltdown on Adult Son Being Tired, Cranky

He also added that Musk f–ked up by taking on the president…

He also added that Musk f–ked up by taking on the president…
Read More

Continue Reading
Crypto Currency

Bitwise Brings Bitcoin & Ethereum ETPs on LSE

It has officially expanded its European footprint. Bitwise listed four of its institutional-grade crypto ETPs on the London Stock Exchange (LSE). With this move, Bitwise is opening the doors for UK professional investors. They can now access their trusted Bitcoin and Ethereum ETPs on one of Europe’s premier trading platforms…

It has officially expanded its European footprint. Bitwise listed four of its institutional-grade crypto ETPs on the London Stock Exchange (LSE). With this move, Bitwise is opening the doors for UK professional investors. They can now access their trusted Bitcoin and Ethereum ETPs on one of Europe’s premier trading platforms…
Read More

Continue Reading
Crypto Currency

John Oliver Likens Trump-Musk Feud To ‘Real Housewives’: “If Either Of Them Isn’t The Center Of Attention For A Single Second, They’ll Die”

John Oliver has weighed in on the Donald Trump and Elon Musk feud that simmered on the latter’s social media platform X, which reached a head prior to the weekend as the two engaged in barbs the Last Week Tonight host said gave “Real Housewives energy.” Trouble began brewing Thursday when bitter comments and vitriolic

John Oliver has weighed in on the Donald Trump and Elon Musk feud that simmered on the latter’s social media platform X, which reached a head prior to the weekend as the two engaged in barbs the Last Week Tonight host said gave “Real Housewives energy.” Trouble began brewing Thursday when bitter comments and vitriolic [……
Read More

Continue Reading
Antivirus

Hackers are using Google.com to deliver malware by bypassing antivirus software. Here’s how to stay safe

Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected This malware only activates during checkout, making it a silent threat to online payments The script opens a WebSocket connection for live control, completely invisible to the average user A new browser-based malware campaign has surfaced, demonstrating how attackers are


  • Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected
  • This malware only activates during checkout, making it a silent threat to online payments
  • The script opens a WebSocket connection for live control, completely invisible to the average user

A new browser-based malware campaign has surfaced, demonstrating how attackers are now exploiting trusted domains like Google.com to bypass traditional antivirus defenses.

A report from security researchers at c/side, this method is subtle, conditionally triggered, and difficult for both users and conventional security software to detect.

It appears to originate from a legitimate OAuth-related URL, but covertly executes a malicious payload with full access to the user’s browser session.

You may like

  • Google Apps Script abused to launch dangerous phishing attacks
  • Criminals hijacking subdomains of popular websites such as Bose or Panasonic to infect victims with malware: here’s how to stay safe
  • Cybercriminals have found a sneaky way of stealing tax accounts and even encrypted messages: here’s what you need to know

Malware hidden in plain sight

The attack begins with a script embedded in a compromised Magento-based ecommerce site which references a seemingly harmless Google OAuth logout URL: https://accounts.google.com/o/oauth2/revoke.

However, this URL includes a manipulated callback parameter, which decodes and runs an obfuscated JavaScript payload using eval(atob(…)).

The use of Google’s domain is central to the deception – because the script loads from a trusted source, most content security policies (CSPs) and DNS filters allow it through without question.

This script only activates under specific conditions. If the browser appears automated or the URL includes the word “checkout,” it silently opens a WebSocket connection to a malicious server. This means it can tailor malicious behavior to user actions.

Read More

Continue Reading