Ransomware, mobile payments will be 2016’s most severe security threats

exploit
This has been a banner year for cybercrime, from Ashley Madison to the Office of Personnel Management to the recent VTech hack, and 2016 doesn’t look like things are going to get easier. According to several cybersecurity experts and companies, threats and vulnerabilities will continue to evolve in 2016.

Ransomware really came of age in 2015, and it will likely continue to grow as more and more new versions emerge, claims T.K Keanini, CTO of security company Lancope.

Kaspersky Lab reports that ransomware attacks doubled in 2015 while Symantec this week noted that there has been significant uptick in TeslaCrypt (one of the most prolific incarnations of ransomeware) infections. This comes several months after McAfee Treat Labs stated that ransomware grew some 165 percent in the first quarter of 2015 alone, thanks mainly to a number of new strains of the malware popping up online.

According to Trend Micro’s predictions report, 2016 will be the year of online extortion. Psychology and fear, its report claims, will form the backbone of the threat. “Reputation is everything, and threats that can ruin an individual’s or a business’ reputation will prove to be effective and—more importantly—lucrative,” the authors write.

We’ve already seen cases of this. Typically ransomware locks down a user’s system and demands a ransom to de-crypt the data. Now attacks are becoming more targeted, whether it’s gamers, or users of digital wallets.

The burgeoning market for mobile payments will also attract greater efforts from cybercriminals, according to Steve Lowing, director of product management at Promisec. “It feels like a new attack comes out on Android-based phones every week, since it is the dominant device. Apple Pay is increasing market share, and almost everyone has a mobile phone as opposed to a laptop,” he said.

This growing market share for mobile payments, which now includes another major player in Samsung, will open up new potential attack vectors. Just last month Bluebox Security examined 10 Android and iOS payment apps, concluding that their security is “still very much in its infancy.” It found that many apps put consumer data at risk, or even have flaws that could allow for the re-routing of money. The study, however, doesn’t specify the vulnerabilities present in each app.

The app stores will also have their work cut out for them. This year, the usually safe Apple App Store was compromised with a number of apps infected by the XcodeGhost malware. The Google Play Store, by its open nature, has been riddled with fraudulent apps in the past too.

Finally, access to cybercrime tools is becoming more of a worry. The “democratization” of cheaply available hacking tools for amateurs will grow, said Javier Vargas, research manager fraud prevention firm, Easy Solutions.

“We’ve witnessed the outbreak of malware code and hacking tool leaks, as well as an increased amount of public repositories of tools potentially exploitable for criminal activity – and we expect this to grow substantially throughout 2016 and beyond.”

Mobile

Most Android antivirus apps fail to provide malware protection, study shows

A study by AV-Comparatives analyzed the effectiveness of Android antivirus apps in protecting against the 2,000 most common malware threats. Alarmingly, only 23 of the apps were able to detect 100 percent of the malware samples.
Mobile

Rooting your Android device is risky. Do it right with our handy guide

Wondering whether to root your Android smartphone or stick with stock Android? Perhaps you’ve decided to do it and you just need to know how? Here, you'll find an explanation and a quick guide on how to root Android devices.
Mobile

Saving for a vacation? Here are the best apps to help you manage your wealth

Looking to start managing your money, but don't care for intricate software or spreadsheets? Lucky for you, we made a list of the best budgeting apps designed to help you rein in your expenditures.
Mobile

Free yourself! How to unlock a phone from the icy hands of your wireless carrier

Do you want to know how to unlock a phone through your carrier or a third-party service like DoctorSIM? Regardless of which way you want to go, we've compiled a list of requirements and methods for doing so.
Computing

Intel Command Center lays foundation for next year’s ‘Arctic Sound’ GPU

Intel revealed its new Command Center driver software at GDC 2019. The updated interface will control current Intel integrated graphics and also lays the groundwork for next year's Intel video card.
Web

How much!? British Airways glitch results in $4.2M quote for family vacation

Website errors sometimes cause flight prices to display at way below the correct price. But British Airways recently experienced the opposite issue when it tried to charge a family more than $4 million for a vacation in Mexico.
Product Review

Acer Predator Triton 500 review

Nvidia’s new RTX 2080 Max-Q is the fastest GPU you’ll find in any laptop, but it usually comes at a steep price. Acer’s Predator Triton 500, starting at $2,500, makes it a little more affordable. But what must you sacrifice in the…
Computing

Want to save a webpage as a PDF? Just follow these steps

Need to quickly save and share a webpage? The best way is to learn how to save a webpage as a PDF file, as they're fully featured and can handle images and text with ease. Here's how.
Computing

G-Sync and FreeSync can make your games look better, but which is best?

There are some subtle differences between the two adaptive refresh technology offerings, and they affect cost, performance, and compatibility. Nvidia may have released it's feature first, but in recent years AMD has stepped up to the plate…
Computing

Problems with installing or updating Windows 10? Here's how to fix them

Upgrading to the newest version of Windows 10 is usually a breeze, but sometimes you run into issues. Never fear though. Our guide will help you isolate the issue at hand and solve it in a timely manner.
Computing

Delete tracking cookies from your system by following these quick steps

Cookies are useful when it comes to saving your login credentials and other data, but they can also be used by advertisers to track your browsing habits across multiple sites. Here's how to clear cookies in the major browsers.
Computing

Get the Surface Pro 6, with keyboard included, for $1,000 at Microsoft

Thinking of buying a Surface Pro 6? Microsoft is currently running a deal on its latest Windows 2-in-1, letting you bring one home for $1,000 with the keyboard included in the price.
Computing

T-Mobile goes after big cable companies, pilots wireless home internet service

In a shot at big cable companies, T-Mobile is launching a new pilot program to bring an unlimited wireless LTE home internet service to up to 50,000 homes across the United States by the end of 2019.
Mobile

Type away on the best iPad keyboard cases, from the Mini to the Pro

Whether you're looking to replace your laptop with a tablet or merely want to increase your typing speed, a physical iPad keyboard is the perfect companion to the iPad. Check out our top picks for every available iPad model.