Ransomware, mobile payments will be 2016’s most severe security threats

exploit
This has been a banner year for cybercrime, from Ashley Madison to the Office of Personnel Management to the recent VTech hack, and 2016 doesn’t look like things are going to get easier. According to several cybersecurity experts and companies, threats and vulnerabilities will continue to evolve in 2016.

Ransomware really came of age in 2015, and it will likely continue to grow as more and more new versions emerge, claims T.K Keanini, CTO of security company Lancope.

Kaspersky Lab reports that ransomware attacks doubled in 2015 while Symantec this week noted that there has been significant uptick in TeslaCrypt (one of the most prolific incarnations of ransomeware) infections. This comes several months after McAfee Treat Labs stated that ransomware grew some 165 percent in the first quarter of 2015 alone, thanks mainly to a number of new strains of the malware popping up online.

According to Trend Micro’s predictions report, 2016 will be the year of online extortion. Psychology and fear, its report claims, will form the backbone of the threat. “Reputation is everything, and threats that can ruin an individual’s or a business’ reputation will prove to be effective and—more importantly—lucrative,” the authors write.

We’ve already seen cases of this. Typically ransomware locks down a user’s system and demands a ransom to de-crypt the data. Now attacks are becoming more targeted, whether it’s gamers, or users of digital wallets.

The burgeoning market for mobile payments will also attract greater efforts from cybercriminals, according to Steve Lowing, director of product management at Promisec. “It feels like a new attack comes out on Android-based phones every week, since it is the dominant device. Apple Pay is increasing market share, and almost everyone has a mobile phone as opposed to a laptop,” he said.

This growing market share for mobile payments, which now includes another major player in Samsung, will open up new potential attack vectors. Just last month Bluebox Security examined 10 Android and iOS payment apps, concluding that their security is “still very much in its infancy.” It found that many apps put consumer data at risk, or even have flaws that could allow for the re-routing of money. The study, however, doesn’t specify the vulnerabilities present in each app.

The app stores will also have their work cut out for them. This year, the usually safe Apple App Store was compromised with a number of apps infected by the XcodeGhost malware. The Google Play Store, by its open nature, has been riddled with fraudulent apps in the past too.

Finally, access to cybercrime tools is becoming more of a worry. The “democratization” of cheaply available hacking tools for amateurs will grow, said Javier Vargas, research manager fraud prevention firm, Easy Solutions.

“We’ve witnessed the outbreak of malware code and hacking tool leaks, as well as an increased amount of public repositories of tools potentially exploitable for criminal activity – and we expect this to grow substantially throughout 2016 and beyond.”

Emerging Tech

New research could allow fast diagnosis of viruses like Ebola and Zika

A new development in molecular biology is a step towards instant diagnosis of viruses like Ebola or Zika. Researchers have found a way to use a mobile device to identify plant viruses and potentially animal and human viruses too.
Mobile

We tried all the latest and greatest smartphones to find the best of 2019

Smartphones are perhaps the most important and personal piece of tech on the planet. That’s why it’s important to pick the best phone for your individual needs. Here are the best smartphones you can buy.
Web

Shutdown makes dozens of .gov websites insecure due to expired TLS certificates

The US government shutdown is causing trouble in internet security. As the shutdown enters day 22, dozens of government websites have been rendered insecure or inaccessible due to expired transport layer security (TLS) certificates.
Mobile

You'll soon be able to pay for goods with the Motiv smart ring

Remember Motiv's activity tracking smart ring? It's back with a raft of new features that adds biometric identification and token authentication, all on a device that fits on your finger.
Computing

This ‘computer mouse’ sets the new size standard for portable computing

The Raspberry Pi is an amazingly capable little computer and it's small enough that it can fit just about anywhere. Even in a computer mouse — if you're willing to build a custom chassis for it.
Computing

Change your mouse cursor in Windows with these quick tips

The standard mouse cursor is boring, so change it! With this guide on how to change your mouse cursor in Windows, you can choose to use one of Microsoft's pre-installed cursors or download something a bit more extravagant.
Computing

Go hands-free in Windows 10 with speech-to-text support

Looking for the dictation, speech-to-text, and voice control options in Windows 10? Here's how to set up Speech Recognition in Windows 10 and use it to go hands-free in a variety of different tasks and applications within Windows.
Computing

Printing to PDF in Windows is easy, no matter which method you use

Microsoft's latest operating system makes it easier than ever to print to PDF in Windows, but there are alternative methods for doing so, even if you want to forgo Adobe Acrobat. Here's how.
Computing

Changing a PDF into an EPUB file is easier than you might think

If you like to read on a tablet or ebook reader, you'll find that ePUB files offer a number of advantages over PDFs. With this guide, we'll show you how to convert a PDF to EPUB in a few quick steps.
Computing

Need to combine a PDF? Here's how to get it done on both Windows and Mac

Sometimes juggling multiple files at once is more of a hassle than a convenience, especially when a single file would do. This quick guide will teach you how to combine PDF files on Windows, MacOS, or with online tools.
Computing

Don’t even bother with the rest. Here are the only laptop brands that matter

If you want to buy your next laptop based around a specific brand, it helps to know which the best brands of laptops are. This list will give you a good grounding in the most reliable, quality laptop manufacturers today.
Computing

Secure your Excel documents with a password by following these quick steps

Excel documents are used by people and businesses all over the world. Given how often they contain sensitive information, it makes sense to keep them from the wrong eyes. Thankfully, it's easy to secure them with a password.
Computing

Style up your MacBook Air with one of these great cases or sleeves

Whether you’re looking for added protection or a stylish flourish, you’re in the right place for the best MacBook Air cases. We have form-hugging cases, luxurious covers and padded sleeves priced from $10 to $130. Happy shopping!
Computing

Getting Windows 10 updated doesn't have to be so painful

Windows update not working? It's a more common problem than you might think. Fortunately, there are a few steps you can take to troubleshoot it and in this guide we'll break them down for you step by step.