News
2017 Security Predictions
27 Mar 2017

While 2016 was a banner year for cyberattacks, hold onto your boots, 2017 should be a wild ride as well. We’ll see escalations of current threats and brand new attack vectors.

Trojan with the worm talent

Cyber criminals will take ransomware to the next level in 2017 by introducing the kind of auto-propagating characteristics traditionally found in network worms like CodeRed and Conficker. That’s right, imagine a breed of ransomware designed to produce endless duplicates of itself, spreading the infection across an entire network. Whether you want to contemplate this scenario or not, it’s only a matter of time before self-spreading ransomware – or ransomworms – begins to wreak havoc.

Attackers start leveraging machine learning and AI to improve malware and attacks

Cyber security companies will come to a rude awakening when it becomes clear that they don’t have a monopoly on machine learning in 2017. Machine learning has done far more than any human could to help the security industry become more predictive and less reactive in the fight against malware. By analyzing gigantic datasets and huge catalogs of good and bad files, these systems can recognize patterns that assist information security pros in rooting out never before seen threats. Advanced cyber criminals will turn the tables and begin leveraging machine learning themselves to cook up new and improved malware to challenge machine-learning defenses.

In 2017, we will see civilian “casualties” in the Cyber Cold War

With the nation state cyber cold war well underway, expect to see at least one “civilian” casualty as collateral damage in 2017. In the past several years, nation states have allegedly damaged enemy nuclear centrifuges using malware, stolen intellectual property from private companies, and even breached other governments’ confidential systems. For some time now, the U.S., Russia, Israel, and China have been mounting strategic cyber security operations and hording zero-day flaws to use against one another. This government practice of building up arsenals of vulnerabilities – rather than helping vendors fix them – will undoubtedly lead to an unsuspecting private business or citizen falling victim to an undisclosed zero-day exploit.

List of news      >