SlideShare uma empresa Scribd logo
1 de 5
One year away from the third decade of the 21st century and technology has finally caught up with science fiction. In
2019, we’re going to hear more news about driverless cars, revolutions in artificial intelligence and commercial
applications for drones. One thing is for sure: it’s an exciting time to be alive.
Unfortunately, advances in technology bring about advances in public threats; 2019 is not an exception. Last year we
saw a startling number of security breaches, ransomware attacks and data leaks from Fortune 500 organizations.
Hackers are getting smarter all the time, and – with increased incentive to profit from booming digital black markets –
they haven’t rested yet.
It’s Getting Political
Things are going to be a little different this year. Hacking culture has always been entangled with a certain political ethos (hence the
connectionbetween Anonymous and the anarchist thriller V for Vendetta), but in recent years money has dominated as the end game in a
majority of highly publicized attacks.
With rising political unrest around the world, cyber attacks are becoming more about nations, countries and governments than ever before.
Take several examples: In March of last year, the FBI and Department of Homeland Security (DHS) filed a joint report disclosing that Russian
hackers had been tied to attacks on U.S infrastructure, including energy, water and aviation. The attackers stole sensitive information for
unknown purposes, spreading widespread alarm. For some time, different departments of the U.S government dealt with information
security, including the FBI, CISA and NSA. In November of 2018, Congress approved the formation of a ‘Cybersecurity Agency,’ signaling a
unified bipartisan emphasis on the threat of cyberattacks against the U.S. Last December, Chinese nationals Zhu Hua and Zhang Shilong were
indicted for stealing vast amounts of sensitive data related to American industries and technologies. The attackers also stole social security
numbers and other personal information from over 100,000 U.S Navy personnel, officially ending a three-year agreement between the U.S
and China not to engage in cyberattacks or espionage.
While the threat of cyberwarfare has existed since cyberattacks became a technological possibility, it was once – for the most part – an
intrigue of science fiction and futurism. Now that key government resources are increasingly digitized, the threat has become a palpable
reality.
As former DHS Under Secretary Suzanne Spaulding observes, “Until recently the US did not publicly attribute various cyber incidents to
specific nations, despite public pressure to do so.” The country’s attitude has finally changed: when it comes to international relationships,
cyberwarfare is no longer a weird exception to the rule.
New Technology, New Threats
In addition to the new temperature that has raised cybersecurity stakes for world powers, 2019 will likely witness the rise of
new threats that experts are only just coming to terms with.
Here are a few that will pose a risk for domestic security:
Attacks Fueled by IoT Botnets
In order to manage incoming traffic from visitors, websites must be hosted on servers with enough bandwidth. One common
way to attack a server is to send a large amount of fake traffic from multiple computers, thus exceeding the server’s
bandwidth and taking it offline.
These Distributed Denial of Service (DDoS) attacks are hardly new, but in recent years, the Internet of Things (IoT) has made
them dramatically more powerful.
Here’s the basic script: a hacker discretely accesses thousands of Internet connected devices – from phones to smart
thermostats – and links them altogether in a “botnet”. Then the hacker instructs the devices to target a server,
overwhelming it with traffic.
Three years ago, this kind of attack took large portions of the Internet offline along the U.S east coast. Now, Symantec
predicts that IoT botnets will be used to conduct much more sophisticated attacks giving attackers unprecedented power.
Critical Infrastructure Attacks
We’ve already mentioned that in 2018, the U.S acknowledged cyber attacks against critical infrastructure. This event
wasn’t a proof-of-concept: in 2015, attackers successfully targeted the Ukrainian power grid, and managed to
leave 230,000 citizens without electricity.
While it’s not a brand-new idea, infrastructure attacks are becoming more common for a simple reason: more of it is
connected to the web. This vulnerability goes to show that IoT isn’t just a tool for attackers to use; it’s a weakness for
them to exploit.
As Brian NeSmith of Forbes Council points out,
“With digital technology wherever we look and the explosion of the internet of things (IoT), the possibilities of cyber-
mayhem are limitless. Think of nuclear reactors, chemical plants and satellites in space — all are potentially
vulnerable targets.”
The possibility that hackers could cripple the U.S power grid was so concerning to U.S Senators that last year,
they proposed a bill that would have banned digital control systems sometimes used by power stations.
Spear Phishing and APT Groups
Most organizations are aware of phishing threats: an attacker can use false login portals, domains and forms to dupe
employees into sharing sensitive information that can be used to further sabotage a business.
Phishing attacks have been common from the beginning of the Internet, but spear phishing is an entirely different
animal. Also known as “targeted phishing,” spear phishers single out an organization or business and tailor the attack
to ensnare a target.
Much like social engineering, spearfishing is effective because it exploits intimate knowledge of an organization or
insider. They are both more dangerous and more convincing than traditional phishing attacks and present an active
threat to government agencies.
The Chinese attackers who targeted NASA last year employed spear phishing to access sensitive information, and
it’s a favorite tactic of organizations deemed Advanced Persistent Threats (APTs) by the U.S government.
In December of last year, the U.S. House of Representatives passed a bill requiring the White House to maintain an
active list of APTs and the individuals who work for them. It is but one step on the long road to America’s national
security in the wake of new cyber threats.

Mais conteúdo relacionado

Mais procurados

Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
Eljay Robertson
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
Desarae Veit
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
Dominic A Ienco
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
James Bollen
 

Mais procurados (20)

Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Communications
CommunicationsCommunications
Communications
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
6026 Cybersecurity China
6026 Cybersecurity China6026 Cybersecurity China
6026 Cybersecurity China
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Cyber war
Cyber warCyber war
Cyber war
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 

Semelhante a Looking Ahead Why 2019 Will Be The year of Cyberwarfare

Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
Kate Neal
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
helen23456789
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
EvonCanales257
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
rtodd599
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
Kate Neal
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
smile790243
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
Fas (Feisal) Mosleh
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
ouldparis
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 

Semelhante a Looking Ahead Why 2019 Will Be The year of Cyberwarfare (20)

Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosures
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 

Último

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Looking Ahead Why 2019 Will Be The year of Cyberwarfare

  • 1. One year away from the third decade of the 21st century and technology has finally caught up with science fiction. In 2019, we’re going to hear more news about driverless cars, revolutions in artificial intelligence and commercial applications for drones. One thing is for sure: it’s an exciting time to be alive. Unfortunately, advances in technology bring about advances in public threats; 2019 is not an exception. Last year we saw a startling number of security breaches, ransomware attacks and data leaks from Fortune 500 organizations. Hackers are getting smarter all the time, and – with increased incentive to profit from booming digital black markets – they haven’t rested yet.
  • 2. It’s Getting Political Things are going to be a little different this year. Hacking culture has always been entangled with a certain political ethos (hence the connectionbetween Anonymous and the anarchist thriller V for Vendetta), but in recent years money has dominated as the end game in a majority of highly publicized attacks. With rising political unrest around the world, cyber attacks are becoming more about nations, countries and governments than ever before. Take several examples: In March of last year, the FBI and Department of Homeland Security (DHS) filed a joint report disclosing that Russian hackers had been tied to attacks on U.S infrastructure, including energy, water and aviation. The attackers stole sensitive information for unknown purposes, spreading widespread alarm. For some time, different departments of the U.S government dealt with information security, including the FBI, CISA and NSA. In November of 2018, Congress approved the formation of a ‘Cybersecurity Agency,’ signaling a unified bipartisan emphasis on the threat of cyberattacks against the U.S. Last December, Chinese nationals Zhu Hua and Zhang Shilong were indicted for stealing vast amounts of sensitive data related to American industries and technologies. The attackers also stole social security numbers and other personal information from over 100,000 U.S Navy personnel, officially ending a three-year agreement between the U.S and China not to engage in cyberattacks or espionage. While the threat of cyberwarfare has existed since cyberattacks became a technological possibility, it was once – for the most part – an intrigue of science fiction and futurism. Now that key government resources are increasingly digitized, the threat has become a palpable reality. As former DHS Under Secretary Suzanne Spaulding observes, “Until recently the US did not publicly attribute various cyber incidents to specific nations, despite public pressure to do so.” The country’s attitude has finally changed: when it comes to international relationships, cyberwarfare is no longer a weird exception to the rule.
  • 3. New Technology, New Threats In addition to the new temperature that has raised cybersecurity stakes for world powers, 2019 will likely witness the rise of new threats that experts are only just coming to terms with. Here are a few that will pose a risk for domestic security: Attacks Fueled by IoT Botnets In order to manage incoming traffic from visitors, websites must be hosted on servers with enough bandwidth. One common way to attack a server is to send a large amount of fake traffic from multiple computers, thus exceeding the server’s bandwidth and taking it offline. These Distributed Denial of Service (DDoS) attacks are hardly new, but in recent years, the Internet of Things (IoT) has made them dramatically more powerful. Here’s the basic script: a hacker discretely accesses thousands of Internet connected devices – from phones to smart thermostats – and links them altogether in a “botnet”. Then the hacker instructs the devices to target a server, overwhelming it with traffic. Three years ago, this kind of attack took large portions of the Internet offline along the U.S east coast. Now, Symantec predicts that IoT botnets will be used to conduct much more sophisticated attacks giving attackers unprecedented power.
  • 4. Critical Infrastructure Attacks We’ve already mentioned that in 2018, the U.S acknowledged cyber attacks against critical infrastructure. This event wasn’t a proof-of-concept: in 2015, attackers successfully targeted the Ukrainian power grid, and managed to leave 230,000 citizens without electricity. While it’s not a brand-new idea, infrastructure attacks are becoming more common for a simple reason: more of it is connected to the web. This vulnerability goes to show that IoT isn’t just a tool for attackers to use; it’s a weakness for them to exploit. As Brian NeSmith of Forbes Council points out, “With digital technology wherever we look and the explosion of the internet of things (IoT), the possibilities of cyber- mayhem are limitless. Think of nuclear reactors, chemical plants and satellites in space — all are potentially vulnerable targets.” The possibility that hackers could cripple the U.S power grid was so concerning to U.S Senators that last year, they proposed a bill that would have banned digital control systems sometimes used by power stations.
  • 5. Spear Phishing and APT Groups Most organizations are aware of phishing threats: an attacker can use false login portals, domains and forms to dupe employees into sharing sensitive information that can be used to further sabotage a business. Phishing attacks have been common from the beginning of the Internet, but spear phishing is an entirely different animal. Also known as “targeted phishing,” spear phishers single out an organization or business and tailor the attack to ensnare a target. Much like social engineering, spearfishing is effective because it exploits intimate knowledge of an organization or insider. They are both more dangerous and more convincing than traditional phishing attacks and present an active threat to government agencies. The Chinese attackers who targeted NASA last year employed spear phishing to access sensitive information, and it’s a favorite tactic of organizations deemed Advanced Persistent Threats (APTs) by the U.S government. In December of last year, the U.S. House of Representatives passed a bill requiring the White House to maintain an active list of APTs and the individuals who work for them. It is but one step on the long road to America’s national security in the wake of new cyber threats.