• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

The 6 Biggest Cybersecurity Concerns for 2018

Dan Matthews / 5 min read.
December 19, 2017
Datafloq AI Score
×

Datafloq AI Score: 86

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/NoDA9

If there’s anything you can say about the field of cybersecurity, it’s that it’s growing. By 2019, there will be 6 million new cybersecurity jobs on the market worldwide. This increase is commensurate with the increase in big data, which goes directly with advancements in both the cloud and the IoT. As the world moves closer to 180 zettabytes of data in 2025 (a conservative estimate), Forbes’ Gil Press reports that 2018 will see 5 times higher growth in spending on cloud versus on-premises analytics solutions. The amount of data we’re generating is calling for increased spending on analytics and storage.

There’s no question the cloud will continue to grow (where else will all the data go?), but the amount of IoT advancement is less certain. Victor Vilas, Business Development Manager Europe for AndSoft, says that IP traffic will reach 2 zettabytes per year by 2019. More devices creating more data will create more cybersecurity concerns. But what will the biggest threats be in the burgeoning cybersecurity industry? The cybersecurity analyst who knows how to deal with these is well prepared for 2018.

Unfilled Cybersecurity Jobs

First and foremost, cybersecurity and IT can’t deal with threats properly if there aren’t enough qualified individuals working on detection and prevention. By 2021, 3.5 million positions in cybersecurity will remain unfilled. Steve Morgan, founder and CEO at Cybersecurity Ventures, says we aren’t taking the skills gap seriously enough, and young people aren’t setting off on cybersecurity career paths, which is reflected by the fact that students can graduate from any one of the top 10 US computer science programs without taking a single course on cybersecurity. Furthermore, organizations aren’t cross-training individuals on cybersecurity, and there’s a perception from IT heads that AI will be able to solve the labor shortage.

A New Level of Identity Theft and W-2 Phishing After Equifax

Earlier this year, tax season saw a 400 percent increase in phishing attacks ‘and that was before the Equifax breach. Because of the Equifax breach, hackers now have all the information they need to file fake tax returns for 143 million Americans, including social security numbers, names, addresses, credit card numbers, and income. Before, scammers had to send emails in which they phished for people’s W-2 info. Expect that to continue, but if they have access to the Equifax data, phishing emails will only need to seek out specific info that was not revealed in the Equifax breach. This will make phishing schemes that much more tempting for scammers to carry out.

Cryptojacking

The new kid on the block, cryptojacking uses Javascript on compromised sites to turn your device into cryptocurrency mining machine. Basically, if you’re running pages infected with the script, a hacker uses the site and your computer to mine cryptocurrency, which they then convert into cash. Appearing late in 2017, the scheme has already affected nearly one billion internet users of only four sites, including Openload, a streaming video player. Openload’s player is embedded on various webpages, and when a user accesses the player, the cryptojacking begins. Initially, The Pirate Bay leveraged this technique with the cryptocurrency Monero and was transparent about it as a way of making money from users without running ads. Since then, malicious miners have followed suit, unbeknownst to website owners and users.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

Other Bitcoin and Cryptocurrency Attacks, Including DDoS

Whatever happened to NiceHash recently, it was effective and resulted in a serious Bitcoin loss of $60 million. The Slovenian Bitcoin mining company is scrambling to revamp security and reimburse users who found their purses empty just before Bitcoin was set to start trading on the US stock exchange at value of $15,000 per bitcoin. There’s no word yet on how NiceHash ‘a company that mines cryptocurrency for nearly 750,000 members ‘was hacked. If the culprits aren’t caught, others will continue to use the same tactic in 2018 because it exploits a vulnerability.

And, after the success of Dyn DDoS attack last year, hackers are using the same tactic to hit the Bitcoin exchange service Bitfinex, which recently experienced its third such attack in 2 months. Clearly, hackers are taking aim at cryptocurrency services and will continue to do so in 2018. Computer Weekly reports that Bitcoin is among the top ten industries targeted by DDoS attacks in the third quarter of 2017.

Worm Malware and Ransomware

The difference between worms and regular old viruses is worms are standalone software. A worm can replicate like a virus, but it doesn’t require a human to send it along. Rather, once a worm infects a system through a vulnerability, it replicates itself throughout the network. This is what we saw with the WannaCry attack, a worm that infected businesses worldwide with ransomware, resulting in a loss of up to $4 billion. Trickbot is also a recent example. Its developers added a worm module, probably due to the success of WannaCry. Because worms only need to exploit a single vulnerability to infect an entire network, hackers will continue to turn to them as part of their arsenal in 2018.

Powershell Attacks

This is a tricky one. Powershell runs on all computers with Windows 7 on up, allowing the OS to execute commands. If hackers can gain access to the OS, they can run malicious Powershell code in the computer’s memory where antivirus software can’t detect it. Carbon Black says Powershell is involved in more than a third of cyberattacks. It’s an easy way for attackers to fly under the radar. There’s no sign of this abating in 2018.

Categories: Big Data, Cybersecurity
Tags: Big Data, big data jobs, cryptocurrency, cyber, IoT

About Dan Matthews

Dan Matthews is a writer and content consultant from Boise, ID with a passion for tech, innovation, and thinking differently about the world. You can find him on Twitter and LinkedIn.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

Empowering Cyber Defenders: The Role of AI in Securing Our Digital Future

March 13, 2023 By Jessica Wade

The Business Case for Investing in Application Security Testing

March 13, 2023 By Hemanth Kumar

3 Best Ways to Protect Your Business from Cyber Threats

March 12, 2023 By thomas.lee0002

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application applications Artificial Intelligence benefits BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future government Group health information learning machine learning mobile news public research security services share skills social social media software solutions strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Webinar – How to harness financial data to help drive improved analytics and insights with Envestnet & AWS
  • CIO/CISO Benelux Summit
  • Digital Transformation EXPO (DTX) Manchester
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • How data and modern machine learning can help TSA keep us safe
  • Exploring the Legal Implications of Generative AI: Is it Fair Use?
  • How Data Analytics is Revolutionizing Talent Acquisition Leadership
  • Storing the World in a Sugar Cube: The DNA Data Revolution Unfolds
  • Optimizing Traditional Agricultural Practices with AI

Search

Tags

AI Amazon analysis analytics application applications Artificial Intelligence benefits BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future government Group health information learning machine learning mobile news public research security services share skills social social media software solutions strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!