Ransomware
Ransomware is a type of malware that kidnaps data by encrypting it. The victim’s data is encrypted and then the attacker demands a payment to provide the victim with the decryption key. Ransomware can be spread several ways such as e-mail attachments, compromised websites or infected programs.Ransomware is available as a service hosted on the tor network using virtual currencies as payment. This is worrying fact as inexperienced cybercriminals can gain access to ransomware whilst remaining relatively anonymous.“The number of users attacked with encryption ransomware is soaring, with 718,536 users hit between April 2015 and March 2016: an increase of 5.5 times compared to the same period in 2014-2015.” (source: ITSecurityGuru)
Mega Data Breaches
LinkedIn, MySpace and Tumblr were among the most attacked services. Databases with their user’s credentials went for sale on the dark web, leaving exposed a total of around 500 million accounts.“Based on newly released findings from the Breach Level Index (BLI), there were 974 publicly disclosed data breaches in the first half of 2016, which led to the successful theft or loss of 554 million data records.” (source: Gemalto)
Identity Theft
Identity theft is when a malicious hacker steals your data and starts making financial operations in your name. They open bank accounts, take out loans, ruin your credit card’s ratings, and many others.Besides the financial loss, there may also be additional consequences. You can even realise one day that you are held responsible for criminal actions that you had nothing to do with.“The number of victims of identity theft rose by 57% last year, figures from fraud prevention service Cifas suggest.” (source: BBC)
Internet of Things
With the internet of things, threats are more real than ever. Our privacy is in danger as well as our physical safety. The advance of smart technology in the internet of things has brought along new risks for consumers due to vulnerabilities in these new products.”Mitsubishi urged to recall at least 100,000 cars after hackers remotely turned off the alarm system, controlled the lights and drained the battery.” (source: The Guardian)
Phising and Spear-Phishing
Cybercriminals can often take advantage of a lack of staff security awareness to gain access to sensitive information. Phishing is a widely used technique by cybercriminals with the aim of tricking someone into revealing information by using an email that appears to be from a trusted source.These emails can contain links to malicious websites or install malware on the recipient’s device, which can be used to gain access to confidential data. Spear phishing involves carefully and specifically targeting the user in order to make it appear more genuine to the target.“In the first quarter of 2016, more than three dozen businesses have been victimized by Phishing attacks targeting employee tax records. The scams have impacted organizations both large and small, playing on fear and basic human nature in order to succeed.” (source:CSO)