According to Carbon Black information, about 25,000 of such malicious programs are for sale to date. Last year, the total sales of such programs amounted to over $6 million. Thus, it can be concluded about the seriousness of the problem. Such programs are in demand.
If earlier the main purpose of the attackers was the equipment on which Windows is installed, now they have expanded the range of their activities. Viruses attack including equipment with Linux and Mac systems. Cases with smartphones attacks were noted.
There are suggestions that the next goal of such viruses will be the Internet of Things (IoT). On the one hand, there is no critical information in such devices. But on the other, their defense is extremely weak. Experts put forward suggestions that the plot with the threat of disconnecting the electrical network may be involved for blackmail. CSO edition reports about it.
Source of data from redpixie.com
Experts believe that in the coming year the activity of ransomware viruses will be at a high level. Accordingly, cybersecurity experts will need to take steps to counter this phenomenon.
Systems vulnerability with Big Data and cloud services
It's no secret that large companies store their important business data in cloud services. Accordingly, such services are attractive to cybercriminals. If large providers have some tools to fight attacks, then small regional services are quite vulnerable.
There is little doubt that in the coming year situations with large-scale data leaks will be repeated. One of the clearest examples of such cases in the past can be called the collapse of Equifax. This is a credit bureau which hackers hacked into personal information of more than 140 million clients.
The Bitglass agency specializing in information security proved the fact that the stolen information with personal data in “darknet” scatters very quickly. The danger lies in the fact that it can emerge later in any state and at any time. Accordingly, intruders have many options for using such data.
A prime example: only in the first half of last year about 6 million records with personal information were stolen. As for the major hacks, there were more than 2 thousand of them. This is not to mention the multiple cases of petty hacking.
Experts recommend ordinary users to be more careful with downloadable applications. According to their calculations 80 percent of the most serious data leaks in the past year occurred due to the vulnerability that personal data of users have in applications.
Malicious spam links
Many company leaders are very simplistic about the process of hacking system. As usual, it is attacker or a group of hackers who hunt for important corporate data. However, in practice, things often look completely different.
Studies prove that a lot of hacks occur since employees themselves are inattentive. For example, they open viral spam links using the Internet. As a result, those malicious programs get into the corporate computer network that should not, in principle, be there. The matter is banal inattention and indiscretion; in other words that is the human factor.
In order, to avoid such phenomena, one should be attentive to the issue of employee’s information literacy. It will be appropriate to periodically conduct trainings and lectures on personal and corporate information security. Even if you do not have an IT department and you must invite competent experts, such costs will be justified.
The use of artificial intelligence in the field of cybersecurity
The fight against some information threats does not provide for the important principle of timeliness. That is, many experts are struggling with yesterday’s (if not with the day before yesterday) threats. The result is not as it should be.
If you change the approach and begin to simulate situations, working in advance, hypothetically you can achieve a better result. Experts believe that in the case of machine learning, it will be possible to respond to threats in real time. The principle is based on the fact that any given system has a certain “norm” of behavior. As a result, the system vulnerability is eliminated in real time.