{"id":6848,"date":"2016-02-15T07:12:32","date_gmt":"2016-02-15T07:12:32","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=6848"},"modified":"2020-01-08T07:35:04","modified_gmt":"2020-01-08T07:35:04","slug":"2016-brings-new-security-threats-along-with-it","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/2016-brings-new-security-threats-along-with-it\/","title":{"rendered":"2016 brings new security threats along with it..!!!"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6850 size-full\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2016\/02\/security-threats.png\" alt=\"security threats\" width=\"674\" height=\"400\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2016\/02\/security-threats.png 674w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2016\/02\/security-threats-300x178.png 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2016\/02\/security-threats-660x392.png 660w\" sizes=\"auto, (max-width: 674px) 100vw, 674px\" \/><\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/2016-brings-new-security-threats-along-with-it\/#Security_Threats\" >Security Threats<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/2016-brings-new-security-threats-along-with-it\/#Data_manipulation_cyber_threat\" >Data manipulation cyber threat:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/2016-brings-new-security-threats-along-with-it\/#Cyber_shakedown\" >Cyber shakedown:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/2016-brings-new-security-threats-along-with-it\/#Rise_of_IOT_Internet_of_Things_zombie_botnet\" >Rise of IOT (Internet of Things) zombie botnet:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esds.co.in\/blog\/2016-brings-new-security-threats-along-with-it\/#Chip_Pin\" >Chip &amp; Pin:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esds.co.in\/blog\/2016-brings-new-security-threats-along-with-it\/#Prominent_backdoors\" >Prominent backdoors:<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Security_Threats\"><\/span><strong>Security Threats<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Hackers ARE NOTHING if not persevering. Where others see obstructions and quit, Hackers savage constrain their way through hindrances or discover approaches to diversion or detour them. Also, they&#8217;ll calmly contribute weeks and months contriving new techniques to do as such.<\/strong><\/p>\n<p style=\"text-align: justify;\">Hackers are nothing but criminals. Where others see obstructions and quit, hackers savage their ways through hindrances they contribute weeks and months contriving new techniques to discover loopholes and detours in<a href=\"https:\/\/esds.co.in\/security\/vtmscan\"><strong> web securities<\/strong><\/a>.<\/p>\n<p style=\"text-align: justify;\">There&#8217;s no Moore&#8217;s Law for hacking development, yet any individual who takes after cyber security realizes that procedures get bolder and more complex every year. The most recent twelve months saw a few new patterns and one year from now undoubtedly will bring more.<\/p>\n<p>Here&#8217;s our interpretation of 2016.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Data_manipulation_cyber_threat\"><\/span><strong>Data manipulation cyber threat:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">According to James clapper, director of national intelligence(US), data manipulation of digital data is a new nightmare in cyber threats which can instead of deleting or releasing stolen data can hamper the complete integrity of the data. Initially the concern was theft, but what if someone gets into your system and starts manipulating or changing the data to an extent that it\u2019s unbelievable for the operator himself.<\/p>\n<p style=\"text-align: justify;\">Data alteration can be negligible but can have enormous consequences. <em>For e.g.<\/em> <em>lotus 1-2-3 had a bug<\/em> which caused miscalculation in spreadsheets, it was an unintentional error but due to its vulnerability attackers could breach into financial and stock trading systems and alter the data and force stock prices to rise or fall according to their motives.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Cyber_shakedown\"><\/span><strong>Cyber shakedown:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">Hacker\u2019s shakedown is predicted to increase in 2016. shakedown doesn\u2019t mean standard Ransomware attacks, extortion attacks or shakedown attacks are attacks where hackers malware encrypts or otherwise locks access of the host system and demands a ransom instead of its release or threatens to release sensitive information from the client critical database information. Even if you have the back up of your data but public release of crucial information\/data can ruin you and your clients.<\/p>\n<p style=\"text-align: justify;\">Tracking such attacks is difficult as the public doesn\u2019t get to know even if the victim has caved and the extortion has occurred. Attacks on Malaysian Airline, Facebook and specially Ashley madison hack which cost a CEO and exposed millions of predictable cheaters to public ridicule and worse. There is another <strong><em>e.g.<\/em><\/strong><em> Investment bank in UAE which resulted in the compromise of massive customer account information.<\/em> These attacks are very critical and can have terrible repercussions resulting in customer lawsuits, job losses and such attacks are expected to become more prevalent in 2016.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Rise_of_IOT_Internet_of_Things_zombie_botnet\"><\/span><strong>Rise of IOT (Internet of Things) zombie botnet:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">A botnet (otherwise called a zombie armed force) is various Internet PCs that, in spite of the fact that their proprietors are ignorant of it, have been set up to forward transmissions (counting spam or infections) to different PCs on the Internet. Any such PC is alluded to as a zombie &#8211; essentially, a PC &#8220;robot&#8221; or &#8220;bot&#8221; that serves the wishes of some expert spam or infection originator. Most PCs bargained along these lines are home-based. By report from Russian-based Kaspersky Labs, botnets &#8211; not spam, infections, or worms &#8211; presently represent the greatest risk to the Internet. A report from Symantec reached a comparable conclusion.<\/p>\n<p style=\"text-align: justify;\">In the event that 2015 was the year of verification of-idea assaults against <a href=\"https:\/\/www.esds.co.in\/iot\"><strong>IoT<\/strong> <\/a>devices, 2016 will be the year we see a number of these idea assaults move to reality. One pattern we&#8217;ve effectively spotted is the laying hold of IoT devices for botnets. Rather than programmers capturing your devices for their zombie armed force, they will lay hold of substantial systems of IoT devices\u2014like CCTV observation cameras, smart TVs, and home computerization frameworks. We&#8217;ve as of now seen CCTV cameras transformed into botnet armed forces to dispatch DDoS assaults against banks and different targets. Not at all like a desktop PC or tablet it can be harder to know when your associated toaster has been enrolled in a bot armed force<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Chip_Pin\"><\/span><strong>Chip &amp; Pin:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">The cards contain a chip that confirms it as a real bank card furthermore creates a one-time exchange code with every buy, keeping programmers from embellishing stolen information onto fake cloned cards to use for false buys in stores. Yet, this won&#8217;t stop extortion by and large; it will just move from block and-mortar stores to online retailers. In the UK, where chip-and-PIN cards have been utilized subsequent to 2003, card-present extortion\u2014exchanges done in individual\u2014has dropped. Yet, extortion for card-not-introduce exchanges\u2014those finished via telephone or online\u2014expanded from 30 percent to 69 percent of aggregate card misrepresentation somewhere around 2004 and 2014, as indicated by the UK Payments Administration. Neither a PIN nor a mark is required when clients utilize their cards on the web, so basically taking card numbers is adequate for this sort of misrepresentation. Expect those online misrepresentation numbers to ascend in the<\/p>\n<p style=\"text-align: justify;\">Whenever a security community closes a way of attack, hackers improvise and find another. In e-commerce when retailers stopped maintaining customer transaction details in their database, hackers found an avenue to sniff this crucial database live as it was sent to banks for authentication. security groups securely encrypted the transit information to avoid sniffing, hackers found that and installed a malware at point of offer(POO) to record the transit information which records the information as soon as the card get swiped.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Prominent_backdoors\"><\/span><strong>Prominent backdoors:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\">Nimada gained entry through a backdoor left open by Code Red. Backdoors installed on firewalls gives a hacker ability to decrypt protected traffic running through VPS. A secondary passage is a method for access to a PC program that sidesteps security systems. A developer might here and there introduce a secondary passage so that the project can be accessed for investigating or different purposes. In any case, assailants regularly use secondary passages that they recognize or introduce themselves, as a feature of an endeavor. At times, a worm is intended to exploit an indirect access made by a before assault.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers ARE NOTHING if not persevering. Where others see obstructions and quit, Hackers savage constrain their way through hindrances or discover approaches to diversion or detour them. Also, they&#8217;ll calmly contribute weeks and months contriving new techniques to do as such.<\/p>\n","protected":false},"author":81,"featured_media":6850,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1271],"tags":[169],"class_list":["post-6848","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-2","tag-data-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/6848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=6848"}],"version-history":[{"count":5,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/6848\/revisions"}],"predecessor-version":[{"id":11187,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/6848\/revisions\/11187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/6850"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=6848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=6848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=6848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}