9 Cyber Security Threats to Watch Out for in 2013

hacker100921831Malware has been around for a while and is something IT security personnel already know to watch out for. But this software that is used by attackers to disturb operations, gather information, or gain access to systems will expand its threat in 2013 to include cloud computing, BYOD, and mobile devices. As online criminals become cleverer, here are just a few ways they will attempt to threaten your systems in 2013:

  • Distributed Denial of Service (DDoS): A flood of incoming messages to a target system forces it to shut down and denies service to the system to legitimate users
  • Mobile Botnets: Your mobile device can be set up (without you knowing) to forward spam and viruses to other devices
  • Spear-Phishing Attacks: Messages that appear to be from a trusted business are actually from a cyber criminal posing as that business to seek unauthorized access to confidential data
  • Hacktivism: Hacking a computer system for political or socially motivated reasons
  • Ransomware: Your computer freezes because you have “browsed” illicit/illegal materials, the screen will look like a branch of local law enforcement and demand money to restore your access
  • Madware: “Mobile Adware” can be added to your mobile device when you download an app and sends pop-up alerts to the notification bar, adds icons, changes browser settings, and gathers personal/location information
  • Rootkits: Collection of tools allowing administrator-level access to a computer or network
  • Rogue Programs: Malware that uses deceptive advertising and false positives to scare you into purchasing a registered license of software to remove the malware but actually just adds more malware once you pay
  • Search History Poisoning: Cyber criminals manipulate search engine algorithms and other automated mechanisms

Related Posts
Stopping Hackers Requires Training
Hinder the Hacker: 5 Password Protection Tips
What is the #1 Security Threat Not Addressed By a Firewall?

Related Courses
Certified Ethical Hacker v7
Cybersecurity Foundations

In this article

Join the Conversation