Six threats against cybersecurity in 2016 that you should know about

Hackers and cybercriminals are constantly changing their modus operandi, keeping them one step ahead of their victims. That is why it is paramount that you stay up to date with the latest ‘trends’ in the hacker industry.

Here are some of the treats that you should prepare for in 2016:

  1. Headless Worms
    Headless Worms are a new type of malicious code used against headless devices such as smartphones and smartwatches. What is new is the fact that this malware can spread from one connected device to another thus potentially infecting millions of devices in a relatively short amount of time.
  2. Data sabotage
    It used to be that hackers would primarily delete or steal information, but lately, the trend of changing or manipulating the data. Instead, seems to be on the rise. Data sabotage is notoriously difficult to detect, seeing as the data does not disappear and because the changes made can be minor, while still having a major impact.
  3. Ghostware
    Hackers will most likely increase their use of Ghostware, which can penetrate a network, steal or erase data, and leave the network again covering its own tracks, thus making it very difficult for a company to determine exactly how much damage the malware has caused.
  4. Blastware
    Like Ghostware, we will probably see an increase in attacks using Blastware, which destroys or deactivates the infected system or network when detected.
  5. Two-faced malware
    This malware looks like harmless code, but as soon as it is no longer under surveillance, it turns into a malicious code, hence the name. For obvious reasons, this kind of malware is difficult to detect before it is already too late.

Extortion hacks
There are different ways for cybercriminals to pressure companies into paying them large amounts of money, the use of Ransomware being the most common. Ransomware attacks a company’s it-system blocking or freezing data. If the company does not have a backup and wants its data back, it will have to pay the hackers a ransom. Another method of extortion, which seems to be gaining popularity among the cybercriminal crowd, is the kind of attack that Sony experienced in 2014. In these types of cases, the hackers do not block the information; they steal it and then threaten to make it public if their demands are not met. To have sensitive insider information made public can have devastating consequences for a company, making the incentive to pay up that much bigger.

Want to read more?

Then we recommend WIRED’s take on the biggest cybersecurity threats in 2016.