Cybercrime Increases As Crooks Get AI Smarter

Symantec's 2016 Internet Security Threat Report (ISTR) reveals that the year 2015 saw an increase in hacking numbers and smarter attacks.

The report concludes that, each week, a new zero-day vulnerability was discovered; stolen or lost records were estimated to be around half a billion; about three-quarters of websites were found to have vulnerabilities; employees targeted by spear-phishing campaigns saw a 55 percent increase in occurrence; ransomware attacks increased to 35 percent; and the number of fake technical support scams prevented reached about 100 million instances.

And these are just the recorded facts.

Hackers are getting so much craftier and smarter that victims don't even realize that they're under attack. Attacks have become more, subtle and even stealthier. Users are lucky if they catch the attack, but those unaware of threats often suffer major damages in properties.

In 2015, a new zero-day vulnerability was discovered each week, totaling 54 vulnerabilities, more than double the number back in 2014. These attacks are possible because of vulnerabilities found in programs that hackers exploit even before developers can come up with a patch.

The Case of Adobe

Four out of the five most exploited apps were on Flash Player. Adobe comments in an interview that, to avoid such attacks, users should always update their system to the latest patch.

The company believes that, since Flash Player is installed in every system, it's the target of most zero-day vulnerability attacks. Adobe assures users that, once an attack is detected, the company is quick to respond and rolls out a patch in a matter of days. It's now up to the user to make sure that they protect themselves.

Symantec found that breached companies would sometimes withhold information and not release the full report of attacks on their system. As such, not only were there 429 million records hackers mined from vulnerable companies, but more than half a billion could have been compromised, as estimated in the ISTR.

Staying Alert Against Recurring Attacks

Three-quarters of websites were found to be vulnerable to attacks as well. To this day, 75 percent of legitimate web companies have vulnerabilities in their system, putting online users at risk. Hackers can infect a trusted website which, when logged into, would spread the infection to unsuspecting users.

Symantec's ISTR detailed how "web administrators struggle to stay current on patches," allowing millions of attacks against Netizens every day. Experts warn that, if a first attack is prevented, companies should still stay alert for recurring attacks in the future. The ISTR found that most hackers who are fixated on hacking a particular system will not easily give up and will retry at a later date.

Forms of Cyber Attack

Particular strands of these attacks used ransomware to extort money from companies. Ransomware is a malware infection that encrypts a system's date then demands ransom from affected parties to supposedly "decrypt" the files.

Hackers would also reportedly disguise themselves as tech support specialists who help clean out a system for malware infection. In reality, however, these supposed experts would be disabling virus protection, updates, and notifications, thereby increasing vulnerabilities in a system. Symantec blocked 100 million of these attacks in 2015.

Symantec predict that, in the year 2020, the risk of attacks could grow to 20.8 billion against "internet-connected" things.

TechTimes: http://bit.ly/1pp9Ko1

« On the Brink of Cyber War…
How To Deal With The Rising Tide Of Ransomware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions (ATS)

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

Vantage Point Security

Vantage Point Security

Vantage Point are specialists in penetration testing and application security with a focus on the industries undergoing rapid digital transformation.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

ABPGroup

ABPGroup

ABPGroup is Asia’s leading cybersecurity technology provider focusing on providing best-of-breed solutions that address today’s pressing challenges.