Orange Magazine
  • Home
  • Advocacies
  • Arts & Culture
  • Entertainment
    • Books
    • Events
    • Gaming
    • Concerts
    • Movies
    • Music
    • Magazines
    • Theaters
    • TV
    • Tech
  • Lifestyle
    • Beauty & Wellness
    • Fashion & Brands
    • Food & Beverage
    • Home & Living
  • Featured
    • Exclusives
    • Interviews
    • Covers
    • Press Releases
    • Promos
  • About
  • Contact Us
Facebook X (Twitter) Instagram
Orange MagazineOrange Magazine
  • Home
  • Advocacies
  • Arts & Culture
  • Entertainment
    • Books
    • Events
    • Gaming
    • Concerts
    • Movies
    • Music
    • Magazines
    • Theaters
    • TV
    • Tech
  • Lifestyle
    • Beauty & Wellness
    • Fashion & Brands
    • Food & Beverage
    • Home & Living
  • Featured
    • Exclusives
    • Interviews
    • Covers
    • Press Releases
    • Promos
  • About
  • Contact Us
Orange Magazine


Home»Advocacies»Sophos Predicts Top Cyber Security Trends for 2016
Advocacies

Sophos Predicts Top Cyber Security Trends for 2016

Team OrangeBy Team OrangeFebruary 17, 201644 Comments9 Mins Read
Facebook Twitter Pinterest
Share
Facebook Twitter LinkedIn Pinterest Email

In the ever changing and increasingly complex landscape of cyber security, Sophos experts offer their top predictions for 2016.

In 2016, an increase in Android exploits becoming weaponised can be expected (as opposed to bugs like Stagefright which was heavily reported in 2015 but was never fully exploited). There are significant vulnerabilities on the Android platform, which can take months to patch. Although Google claims that nobody has actually exploited these vulnerabilities to date, it will ultimately be an invitation that is too tempting for hackers to ignore.

Sophos Labs has already seen samples that go to extreme lengths to avoid App Store detection and filtering giving Apps a better chance of surviving on App stores. For example, some hackers will design an App that loads harmless games if it thinks it is being tested, but then loads the malicious payload when it detects it is ‘safe’ to do so. And more recently, mobile users using third-party app markets were tricked into granting malicious apps from the adware family Shedun with control over the Android Accessibility Service. Once they have handed over control, the app has the ability to display popups that install highly intrusive adware, even if a user has rejected the invitation to install it. Because the apps root the device and embed themselves into the system partition, they cannot be easily uninstalled.

Android malware can be complicated and consumers cannot necessarily trust the App Store to detect these vulnerabilities in every instance.

The Apple App Store got hit a few times last year, once with the InstaAgent app which snuck through the vetting processes, which both Google and Apple pulled from their respective app stores, and before that, with XcodeGhost, which tricked Apple app developers into incorporating the code into their apps, thereby infecting them but cleverly hidden behind what looked like Apple code.

With more and more apps coming onto the market (both Apple and Google have more than a million apps each in their official marketplaces to date), it is not hard to imagine more criminals trying their hand at getting past the existing vetting processes. Nevertheless, the nature of Android, in particular support for the flexibility of third party markets will continue to contribute towards Android being an easier target than iOS.

Every day, more and more technology is being incorporated into our lives. IoT (Internet of Things) devices are connecting everything around us and interesting new use cases are appearing constantly. IoT will continue to produce endless scary stories based on the fact that these devices are insecure (early 2015 saw many stories focusing on webcams, baby monitors and children’s toys and latterly cars have become a hot topic researchers hacked a jeep in July).

However, widespread examples of attackers getting IoT devices to run arbitrary code are unlikely any time soon. IoT devices are relatively protected, as they are not general purpose computing devices with the same broad suite of interfaces that is available on desktops/mobiles. Moving forward, one can expect more research and Proof of Concepts demonstrating that non-vendor code can be installed on these devices because of insufficient validations (lack of code-signing, susceptibility to Man in the Middle-class exploitations) by the IoT vendors.

An increase in data-harvesting/leakage attacks against IoT devices can also be expected, wherein they are coaxed to disclose information that they have access to, e.g. video/audio feeds, stored files, credential information for logging into cloud services, etc.

And as IoT devices evolve in their utility and ability to interact with their surroundings, i.e. as they become “roboticized” an app-controlled Roomba for example the set of security concerns around IoT will start becoming very similar to the set of security concerns around SCADA/ICS, and the industry should look toward the best guidance that NIST, ICS-CERT and others have formulated.

Throughout 2015, the focus was on the big glamorous hacking stories like Talk Talk and Ashley Madison, but it is not just large organisations that were being targeted. A recent PwC report revealed that 74 percent of Small and Medium Businesses (SMBs) experienced a security issue in 2015, and this number will only increase due to SMBs being perceived as ‘easy targets’.

Ransomware is one area where criminals have been monetizing small businesses in a more visible way last year. Previously, payloads such as sending spam, stealing data, infecting websites to host malware were far less visible so that small businesses often did not even realize they had been infected. Ransomware is highly visible and has the potential to make or break an SMB if they do not pay the ransom. This is why, of course, criminals are targeting SMBs. Expect to see this increase in 2016.

Lacking the security budgets of large enterprises, SMBs often apply a best-effort approach to security investments, including equipment, services, and staffing. This makes them vulnerable as hackers can easily find security gaps and infiltrate the network. On average, a security breach can cost a small business anywhere up to £75,000 (approximately PHP 528,320) a significant loss for any business.

It is important therefore that SMBs take a consolidated approach to security. This requires a thoughtfully planned out IT strategy to prevent attacks before they happen. Installing software that connects the endpoint and the network will mean a comprehensive security system is in place where all components communicate, and ensure there are no gaps for hackers.

In 2016, the pressure on organisations to secure customers’ data will increase, as the EU data protection legislation looms closer. In future, businesses will face severe penalties if data is not robustly secured. This will have a far-reaching impact for how businesses deal with security, including the high-risk area of employee personal devices.

Two major changes will be the EU General Data Protection Regulation (GDPR), and the Investigatory Powers Bill in the UK. The EU Data Protection regulation will come into full force across Europe by the end of 2017, so companies need to start preparing in 2016. It has numerous components, but one key takeaway is that European businesses will now be held responsible for the protection of the data they process, including cloud providers and other third parties.

In the UK, the Investigatory Powers Bill will modernise laws surrounding communications data. This will give the police and other intelligence bodies the ability to access all aspects of one’s communications on ICTs, whether these users are suspected of a criminal offence or not. As this is due to go ahead in 2016, it will be interesting to see how this bill is shaped and shifted, and if people will start prioritising data security.

In the US, data protection is complicated by the fact there is no single overarching law. This has the effect that data protection tends to be less strict than in Europe, which has led to issues around the Safe Harbor agreement. Over time, US and Europe will hammer out their differences, but it seems unlikely that a new agreement will be implemented any time soon.

Growth in the use of VIP spoof wire transfers can be expected in 2016. Hackers are becoming increasingly talented at infiltrating business networks to gain visibility of personnel and their responsibilities, followed by using this information to trick staff for financial gain. For example, sending an email to the finance team that appears to be from the CFO requesting the transfer of significant funds. This is just one of the ways criminals will continue to target businesses.

Ransomware will continue to dominate in 2016 and it is only a question of time before ransomware goes beyond data. It is perhaps some time away before a sufficient mass of internet-enabled cars or homes are common, but one should ask the question: how long before the first car or house is held for ransom? Attackers will increasingly threaten to go public with data, rather than just taking it hostage, and recently, there have been some websites being held ransom to DDoS. Many Ransomware families were using Darknets for either command or control, or for payment page gateways, with the likes of CryptoWall, TorrentLocker, TeslaCrypt, Chimera, and others in 2015.

As cyber security comes to the fore and social engineering continues to evolve, businesses will invest more in protecting themselves from such psychological attacks. They will achieve this by investing in staff training, and ensuring there are strict consequences for repeat offenders. Employees need to be trained on how to be security savvy when using the company network.

It is recommended for staff training to incorporate the following teaching the implications of a phishing email and how to identify one; ensuring staff don’t click on malicious links that might be found in unsolicited emails; encouraging staff to be wary that mis-spelt emails could be a sign of a scam; and to watch out for sites that ask for sensitive information, such as card PIN and national insurance number. Another golden rule is never to share a password. It is also important for custodians of valuable data such as the bank, health insurance company, payroll management service to provide strong security. If they are unable to provide the option to use multi-factor authentication, ask them why not? Or better still, just switch to a provider who does.

Finally, remind users of something they have probably all forgotten not to open Office documents or pdfs unless it is from a known sender. It is also important to never click “yes” to warnings about macros or active content unless the message is clear. Recently, there has been a surge in downloaders of malicious code hiding in macros in office documents that seem legitimate. This is also expected to be on the rise in 2016.

The bad guys will continue to use coordinated attacks but the cyber security industry will make significant strides forward with information sharing. For some time, the bad guys have been coordinating and collaborating, re-using tactics and tools, and generally being one step ahead of the cyber security industry. But the industry is now evolving and information sharing and workflow automation continue to be promising, and expected to deliver significant differences in 2016 and onward.

Commercial malware authors will continue to reinvest at greater rates, bringing them towards the ‘spending power’ of nation-state activity. This includes purchasing zero days. These bad guys have lots of cash and they are spending it wisely.

Exploit kits, like Angler (by far the most prevalent today) and Nuclear, are arguably the biggest problem on the web today in relation to malware and this looks set to continue due to various poorly secured websites on the internet. Cyber criminals will exploit these websites to make money easily and exploit kits have simply become stock tools of the trade, used by criminals to attempt to infect users with their chosen malware.

sophos lab top cyber security trends for 2016
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Team Orange
Team Orange

TEAM ORANGE is Orange Magazine TV's select contributors. It also contains Press Releases. Please follow @OrangeMagTV on Twitter for other updates.

Related Posts

Biyaheng South Summer Tour 2025: A Three-Day Road Trip into the Heart of the South

June 12, 2025

A Shy Guy, an Artist’s Tribute, and an Iconic Brand: SLIMSULIT’s “Dunkin’ Yasha” drops at TOYCON 2025

June 12, 2025

Hilton Manila introduces Celestial Moonbeam Mooncake

June 12, 2025

44 Comments

  1. light fixing on March 17, 2022 5:50 pm

    Enjoyed every bit of your post.Really looking forward to read more. Much obliged.

    Reply
  2. turmeric benefits for men on March 17, 2022 9:27 am

    A round of applause for your blog post. Cool.

    Reply
  3. Habitat binh duong on March 17, 2022 2:00 am

    I love it when folks come together and share opinions. Great blog, continue the good work!

    Reply
  4. download lagu hati hati di jalan tulus on March 16, 2022 11:32 pm

    Very informative article. Fantastic.

    Reply
  5. download lagu love maybe mp3 on March 16, 2022 7:04 pm

    Thanks a lot for the blog post.Thanks Again. Fantastic.

    Reply
  6. best online prescription glasses on March 16, 2022 4:08 pm

    Thanks-a-mundo for the blog.Much thanks again. Cool.

    Reply
  7. coin operated arcade game on March 16, 2022 5:58 am

    Thank you ever so for you article post.Thanks Again. Much obliged.

    Reply
  8. cash register pos on March 16, 2022 2:09 am

    Looking forward to reading more. Great post. Really Great.

    Reply
  9. Ticket Isfahan istanbul on March 15, 2022 11:18 pm

    Say, you got a nice article.Really looking forward to read more. Cool.

    Reply
  10. testing new sex toys on March 15, 2022 7:53 am

    I think this is a real great blog post. Really Cool.

    Reply
  11. Taw-Jeeh on March 15, 2022 2:48 am

    Hey, thanks for the blog article.Much thanks again.

    Reply
  12. download mp3 on March 15, 2022 12:06 am

    I loved your blog. Really Cool.

    Reply
  13. roofing on March 14, 2022 5:39 pm

    Very neat blog article.Really thank you! Cool.

    Reply
  14. Tawjeeh Al Maktoum on March 14, 2022 6:36 am

    I value the article.Thanks Again. Will read on…

    Reply
  15. Tent Rentals Manhattan on March 12, 2022 7:09 pm

    It additionally brings good well being by improving HDL and lowering non-HDL ranges.

    Reply
  16. car detailing lawrence, ks on March 12, 2022 4:23 pm

    I truly appreciate this blog article.Really thank you! Really Cool.

    Reply
  17. Linen rentals Fontana on March 12, 2022 4:04 pm

    Game of Thrones: esta comedia que no respaldó el suicidio de su personaje

    Reply
  18. restoration company on March 12, 2022 8:05 am

    Looking forward to reading more. Great blog post.Much thanks again. Much obliged.

    Reply
  19. slotxogame88 on March 10, 2022 8:01 pm

    Im grateful for the blog article.Really thank you! Really Cool.

    Reply
  20. ซุปเปอร์สล็อต on March 10, 2022 7:53 am

    Thanks for the blog post.Really thank you! Really Cool.

    Reply
  21. browse around here on March 10, 2022 5:19 am

    I am curious to find out what blog system you happen to be utilizing? I’m having some small security problems with my latest blog and I would like to find something more risk-free. Do you have any suggestions?

    Reply
  22. ซุปเปอร์สล็อต on March 9, 2022 9:00 pm

    Thanks again for the blog post. Awesome.

    Reply
  23. Private Label Clothing Manufacturers Bangladesh on March 9, 2022 12:58 pm

    It’s difficult to find educated individuals for this topic, nonetheless, you appear to be you really know what you’re speaking about! Many thanks

    Reply
  24. ????? on March 9, 2022 11:12 am

    Hey! I’m at work browsing your blog from mynew iphone! Just wanted to say I love reading through your blog and lookforward to all your posts! Keep up the great work!

    Reply
  25. mat ong on March 9, 2022 4:35 am

    LOUIS VUITTON PURSES LOUIS VUITTON PURSES

    Reply
  26. Ytmp3 on March 8, 2022 12:53 am

    Really nice pattern and great content, very little else we want :D.

    Reply
  27. thue leu on March 7, 2022 6:54 am

    things, play on a more enough free PSN card to giveaway.

    Reply
  28. clases de Protools on March 7, 2022 12:32 am

    Hi there! I simply want to give you a huge thumbs up for your excellent info you have got here on this post. I will be coming back to your blog for more soon.

    Reply
  29. for more information on March 6, 2022 5:11 pm

    I need to to thank you for this very good read!! I definitely loved every little bit of it. I’ve got you saved as a favorite to look at new stuff you post?

    Reply
  30. Fun Bounces Rental on March 6, 2022 2:30 pm

    Good day! This post could not be written any better! Reading this post reminds me of my good old room mate! He always kept talking about this. I will forward this write-up to him. Pretty sure he will have a good read. Many thanks for sharing!

    Reply
  31. superslot on March 6, 2022 7:55 am

    Enjoyed every bit of your blog.Really looking forward to read more. Much obliged.

    Reply
  32. click here on March 6, 2022 3:10 am

    muse for ed legitimate online pharmacies india – male enhancement products

    Reply
  33. click here on March 6, 2022 1:30 am

    Hello! I could have sworn Iíve been to your blog before but after going through some of the posts I realized itís new to me. Nonetheless, Iím certainly pleased I stumbled upon it and Iíll be bookmarking it and checking back often!

    Reply
  34. luat su vinh tien on March 5, 2022 11:12 pm

    This is a very good tip especially to those fresh to the blogosphere.Short but very precise information… Many thanks for sharing this one.A must read post!

    Reply
  35. best house painters on March 5, 2022 5:57 pm

    Fantastic blog post.

    Reply
  36. C_THR89_2111 tutorial on March 3, 2022 6:49 am

    This blog was… how do you say it? Relevant!! Finally I have found something which helped me.Many thanks!

    Reply
  37. เว็บ888 สล็อต on March 1, 2022 8:23 pm

    Awesome blog article.Really looking forward to read more. Great.

    Reply
  38. for more info on March 1, 2022 4:36 am

    [email protected]

    Reply
  39. Party Rentals Chicago on February 28, 2022 9:36 pm

    [email protected]

    Reply
  40. bondage sex kit on February 28, 2022 6:18 am

    Very good blog. Cool.

    Reply
  41. ?????? on February 28, 2022 4:20 am

    There is visibly a bundle to identify about this. I suppose you made some good points in features also.

    Reply
  42. Pet insurance on February 26, 2022 3:32 pm

    Really informative post.Really thank you! Awesome.

    Reply
  43. the-insurance-surgery on February 26, 2022 4:39 am

    I do accept as true with all of the ideas you have introduced for your post.They’re very convincing and can certainly work. Nonetheless, the postsare very quick for beginners. May you please extend thema little from next time? Thanks for the post.

    Reply
  44. invention stories InventHelp on February 25, 2022 8:15 pm

    A round of applause for your article.Really thank you! Great.

    Reply

Leave A Reply Cancel Reply

Facebook X (Twitter) Instagram
© 2025 OrangeMagazine.ph.

Type above and press Enter to search. Press Esc to cancel.