Just In
- 7 hrs ago Realme GT Neo 6 SE with 1.5K OLED Display, Snapdragon 7+ Gen 3 SoC Launching in April
- 7 hrs ago iQOO Pad 2 Launch on Cards; 66W Fast Charging, 144Hz Display Tipped
- 8 hrs ago Apple Pencil with iPad and Vision Pro Support in the Works: Report
- 8 hrs ago Flipkart Tablet Premier League Sale: Craziest Deals on iPad 10th Gen, Xiaomi Pad 6, and More
Don't Miss
- Movies Khatron Ke Khiladi 14 EXCLUSIVE!: Did Manisha Rani SIGN Contract For KKK 14? Here's The TRUTH-
- Sports CSK vs GT, IPL 2024 Match 7: Award Winners, Player of the Match, Captains Comments, Stats
- News Government Extends Onion Export Ban In Run-Up To Lok Sabha Polls
- Lifestyle Skinny Jeans Trend Of 2024: 7 Tips To Wear And Style The Wardrobe Essential
- Finance 1:2 Split Soon: Tata Group's Mega Auto Stock Recommended To Buy For Rs 1,133 TP Ahead Of Splitting
- Education SPMCIL Technician Recruitment 2024; Application process, Salary details and more
- Automobiles Hero MotoCorp Unveils Pleasure Plus Xtec Sports Variant With Unique Design
- Travel Learn About the Types of US Visas Available for Indian Immigrants and the Visa Process
Cyber Attacks to Decline In 2015: Websense
The volume of cyber attacks are expected to decline in 2015, but will become more sophisticated with such intrusions targeting specific sectors like healthcare, says the cyber security solutions firm Websense.
Recommended: Top 10 Smartphones with Best 4G Connectivity Support to Buy in India
According to Websense's cybersecurity predictions for 2015, as mobile apps are using auto-login capability these devices will face more attacks from cyber criminals for more credential-stealing or authentication attacks that can be used at a later date. "The nature of cyber attacks is changing with criminals going for personally identifiable information (PII), which can be used at a later date. Such attacks are expected to escalate as we go ahead," Websense Manager Sales Ajay Dubey told PTI. PII is an information that can be used to uniquely identify, contact or locate a single person.
Cybercriminals are using PII to get answers to security questions that are used to verify a user's identity. Also they keep this information with them and use it at a later date or also try to use the victim's profile to get personal information of their contacts, family or friends, he added. The report states that healthcare sector will see a rise in data stealing attack campaigns as the records hold a treasure trove of PII that can be used in a multitude of attacks and various types of fraud. "In an environment still transitioning millions of patient records from paper to digital form, many organisations are playing catch-up when it comes to the security challenge of protecting personal data. As a result, cyber-attacks against this industry will increase." it added.
The report further said with auto-login capability of mobile apps, mobile devices will increasingly be targeted for broader credential-stealing or authentication attacks to be used at a later date. These attacks will use the phone as an access point to the increasing Cloud-based enterprise applications and data resources that the devices can freely access, it added. Another serious development is that there will be new (or newly revealed) players on the global cyber espionage/cyber war battlefield, which will also include countries with higher projected economic growth, the report said.
Techniques and tactics of nation-state cyberespionage and cyberwarfare activities have primarily been successful. As a result, additional countries will look to develop their own cyber-espionage programmes, particularly in countries with a high rate of forecasted economic growth, it added. "In addition, because the barrier of entry for cyber activities is minimal compared to traditional espionage and war costs, we believe we will see an increase in loosely affiliated cells that conduct cyber-terrorist or cyber warfare initiatives independent from, but in support of, nation-state causes," the report said.
According to Websense's predictions for 2015, credit card thieves will morph into information dealers and will begin to seek a broader range of data about victims. These fuller, richer, personal identity dossiers of individual users, consisting of multiple credit cards, regional and geographic data, personal information and behaviour, will be increasingly traded in the same manner that stolen credit cards are today, it added. The pace of software development demands that new applications are built on open source or legacy proprietary source code. As new features and integrations build on top of that base code, vulnerabilities continue to be overlooked, the report said.
Next year, attackers will successfully exploit seemingly divergent application software through vulnerabilities in the old source code that these applications share, it added. "Though the web remains the largest channel for attacks against businesses, new highly-sophisticated email evasion techniques will be introduced and designed to circumvent the latest enterprise-grade defences," it said. Traditionally used as a lure in past attack scenarios, email will become a more pervasive element of other stages of an attack, including the reconnaissance stage," it added.
Besides, cyber criminals will increasingly use social and collaborative tools to host their command and control infrastructure. "Those charged with protecting business from attack will have a difficult time discerning malicious traffic from legitimate traffic when communications to Twitter and Google Docs are not only allowed, but also encouraged," the report added.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
1,39,900
-
1,29,900
-
79,900
-
65,900
-
12,999
-
96,949
-
16,499
-
38,999
-
49,999
-
30,700
-
36,999
-
38,999
-
1,17,840
-
35,000
-
23,960
-
82,510
-
16,258
-
25,999
-
26,999
-
31,999