Story image

Top 10 security threats for 2016

03 Dec 2015

The top predicted security threats for 2015 included the rapid growth of unknown malware and the exploit of vulnerabilities in platforms such as Android and iOS.

These were predicted by Check Point, and the issues continue to remain a significant threat. According to the company, cyber criminals are already preparing for more attacks in 2016.

“As we’ve seen from this year’s data breaches at Anthem, Harvard University, Experian, and TalkTalk, hackers are still finding creative ways to attack networks,” Check Point says in a statement.

After looking back on the cyber attacks of this year, Check Point is anticipating the next wave of threats, hoping organisations can use this information to stay ahead of the evolving tactics of cybercriminals.

Check Point has released its top ten predictions for security threats and trends that it expects to see in 2016:

‘Sniper’ and ‘shotgun’ malware

Hackers will not only customise malware, but they will increasingly use sophisticated phishing and social engineering tricks to gain access to sensitive data.

More mobile threats on the way

There have already been multiple high-profile vulnerabilities discovered this year, and Check Point says it expects that number of mobile vulnerabilities will only grow in 2016.

More businesses will turn to advanced threat prevention Traditional sandboxing will no longer protect against the growing malware landscape. CPU-level sandboxing will become more common as it is the only advanced solution that can detect and protect against evasive, unknown malware and zero-day attacks.

Critical infrastructures will be highly targeted

SCADA and ICS networks were not designed for security. Attacks against these systems have increased in recent years, and Check Point expects this trend to only get worse.

IoT and smart devices are still at risk

The Internet of Things will continue to emerge, and businesses will need to think about how to protect their smart devices and prepare for the wider adoption of IoT.

Wearables won’t be safe, either

Wearables like smartwatches will make their way into the enterprise, but this will also introduce new security risks and challenges as wearables can be hacked to capture video or record audio.

Trains, planes, and automobiles

2015 saw the beginning of car hacking. Modern cars are featuring more gadgetry and connected systems, and this will make vehicles just as vulnerable to today’s threats and attacks.

Real security for virtual environments

Organisations are moving to virtualised environments, which are complex and create network layers that can become an attack vector. Virtual environments will require new approaches to network security.

New environments will bring new threats

New operating systems such as Windows 10 and iOS 9 were launched this year. Hackers will take advantage of attacking these new operating systems because updates are more frequent and users are less familiar with the environments.

Organisations will look to security consolidation

To protect against advanced threats, security professionals will increase their reliance on centralised security management solutions. Consolidating security provides an effective way to cut complexity and make for easier management.

Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.