Reset Password



New user? Register here

Law enforcement Technology,Law enforcement Agency,Policing Technology,Smart Policing India,Homeland Security India,Border Security India,Border Management India,Cyber Crime news,Cyber Security news,Safety App,Public Safety App,Security App,Women Safety App,Police Initiative,Surveillance news,National Security news,isc event 2016,isc event 2017,scada event 2016,scada event 2017,Critical infrastructure security event 2016,Critical infrastructure security event 2017,iot summit 2016,iot summit 2017,Internet of things seminar 2016,Internet of things seminar 2017,iot seminar delhi 2016,iot seminar delhi 2017,iot conference delhi 2016,iot conference delhi 2017,top security event,security event,security event 2016,security event 2017,security conference 2016,security conference 2017,cso summit 2016,cso summit 2017,Corporate security event,Corporate security conference,security research india,homeland security research india,security think tank india

Law enforcement Technology,Law enforcement Agency,Policing Technology,Smart Policing India,Homeland Security India,Border Security India,Border Management India,Cyber Crime news,Cyber Security news,Safety App,Public Safety App,Security App,Women Safety App,Police Initiative,Surveillance news,National Security news,isc event 2016,isc event 2017,scada event 2016,scada event 2017,Critical infrastructure security event 2016,Critical infrastructure security event 2017,iot summit 2016,iot summit 2017,Internet of things seminar 2016,Internet of things seminar 2017,iot seminar delhi 2016,iot seminar delhi 2017,iot conference delhi 2016,iot conference delhi 2017,top security event,security event,security event 2016,security event 2017,security conference 2016,security conference 2017,cso summit 2016,cso summit 2017,Corporate security event,Corporate security conference,security research india,homeland security research india,security think tank india

Top 4 Cyber Attack Vectors of 2016

news
It is evident that 2016, has been a year filled with all types of cybercrime. Ranging from DDoS attacks to malware, hacking to ransomware, and social engineering to skimming, a lot of havoc has been caused by select groups of individuals. But what were some of the top attack vectors exploited by criminals in 2016?

#4 DDOS ATTACKS ARE GROWING IN NUMBER

The recent attacks against DynDNS go to show how a major denial-of-service attack wave can cripple the Internet as we know it today. But DDoS attacks are becoming more common in general, although not all of them are on the same level as the October 21st attack. Overload or even crashing web servers with a multitude of requests is an effective way to gain glory in the hacker world.

It is rather easy to fight most DDoS attacks in most cases, such as filtering specific traffic types and regions. Moreover, DDoS mitigation is an absolute must for all of the great companies in the world right now. Unfortunately, even the best protection does not mean that hackers won’t find a way to disrupt services.

#3 MALWARE AND RANSOMWARE

Even though the media headlines have been filled with stories about malware and ransomware all year, they are not the big culprit in cyber attacks yet. Granted, the number of malware attacks is growing exponentially, and that trend will continue for some time. Protecting against these intrusions is a top priority, although human error is often to blame for a malware infection.


#2 APPLICATION-SPECIFIC ATTACKS

Albeit his term may sound foreign to a lot of people, application-specific attacks are a prime threat to Internet users. Hackers targeting specific applications is a cause for concern, as it allows them to capture all data packets flowing through that application. For example, a major attack against Skype would put all users’ communications at risk of being leaked. Close to one in five cyber attacks throughout 2016, relied on using application-specific attacks, which is quite a troublesome number.

#1 WEB APPLICATIONS ATTACKS

As most people may have noticed, web applications are becoming a very lucrative target for hackers. In fact, web application attacks have been around for quite some time now. SQL injections, cross-site scripting, and other types of attack are very common. One such attack recently allowed a white hat hacker to obtain sensitive information from UberCENTRAL.

Preventing web applications attacks has been a challenge for security researchers throughout the years. It is up to individual app developers to secure and maintain their code base at all times. Criminals and hackers are always one step ahead in this game, and it is of the utmost importance to even the playing field whenever possible.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

SOURCE: The Merkle

Newsletter

Sign Up for Monthly Newsletter



Recent Tweets

CONTACT US

Crux Center for Security
Research and Events (CCSRE)
3rd Floor, Tower-B, Unitech Cyber Park Sector 39, Gurugram,122022

0124- 4207903, 05, 06