Free Webcast: How To Create Killer Marketing Content – Learn More ›
Popular Today in Tech: All Popular Articles

Will 2013 be the Year of the BYOD Hacker? – We Reveal Eight New Cyber Threats to Avoid in 2013

Tech & Gadgets

Mobile and PC hardware manufacturers at last months’ Consumer Electronics Show (CES) were falling over themselves to show their new cross-over devices (a device that’s not only suitable for home, but also built to be used at work).

The increasing shift towards BYOD (Bring Your Own Device) is allowing businesses to be more flexible and produce better applications. But there’s also a growing number of people who are viewing the BYOD opportunity as a way of attacking the corporate network – McAfee saw the “number of mobile threats go up dramatically” in 2012.

How to keep one step ahead of the hacker

The threats to the BYOD market are just the tip of the iceberg. When it comes to new hacking exploits there are also an ever-increasing number and sophistication of new threats from social networks, malware, rootkits and more that can impact your business in 2013.

So to help you keep ahead of the hackers, we’ve compiled a list of the top eight new threats that you may face in 2013

Related Resources from B2C
» Free Webcast: Strategic Thinking: Social Media + Social Business Strategy

1. Bring Your Own Malware

Allowing employees to access their networks from their smartphones and tablets – alongside BYOD policies – can help improve business efficiency. But it also opens up a potential new gateway for hackers, and many experts have already started to declare 2013 to be the year that mobile device malware makes its presence felt in a big way.
Devices that are likely to be hardest hit are those running the Android Operating System, due to its openness and the relative ease of adding apps to the various Android app stores.

2. Ransomware

This is malware that hijacks a computer, and then holds its content for ransom – this increased three-fold on Windows PCs in 2012, and it’s a trend that’s set to continue into 2013. Experts predict the strategy will expand to mobile devices as well as continuing on the desktop.

3. Diversification of rootkits

To counter the increasing effectiveness of anti-virus and anti-malware software, hackers have moved their concentration to the less-protected BIOS and Master Boot Loader levels. Expect more rootkits to appear before the door is closed, with the combination of the new Unified Extensible Firmware Interface (UEFI) BIOS replacement and greater low-level security in Windows 8.

4. Phishing and other schemes 

Out-of-the-box security features built-in to Windows 8 are making it harder for hackers to gain control of PCs. So they’ve shifted their attention to tried and tested phishing, and other social engineering techniques, which rely on the consumer or business user doing their work for them.

5. Destruction-oriented attacks

While many hackers are motivated by greed, there’s an increasing number who are motivated by politics – and their strategy is not to hold to ransom, but to destroy. Either as an act of “cyber war” or simply for the pleasure of doing something destructive.

6. HTML 5

The latest HTML standard allows users to personalise their browsing experience, and for businesses to be able to build powerful browser-based applications. Unfortunately, in reducing and eliminating the “layers of technology” between the web browser and internal systems, it also opens up some new and seductive opportunities for hackers to exploit.

7. Hacking as a service

Hacking as a service gives any user a suite of sophisticated online tools that allow anyone to hack – even those who don’t know how to program – and could do for hacking what Visual Basic did for programming,

8. Social networking cyber threats

As businesses become more involved with social networking services such as Twitter and Facebook, more and more hackers and activists will begin to exploit the networks. It’s an open gateway to personal and business data, either through phishing and social engineering threats, or via malware in social applications.
How can you protect yourself?

So what now?

While all this sounds ominous, there are remedies. For example, greater password security, restrictions on network access, firewalls and if all else fails, an abundance of redundancies.

However the majority of these remedies are there to simply plug holes and gaps in the software and hardware that are largely created by the businesses themselves, either because of bad initial design, or a lack of a proper security testing.

The best way to prevent hackers from succeeding is to rely on people with comparable or greater expertise, to help in the design of new applications and to help test applications and systems thoroughly, and that’s where the Certified Ethical Hackers comes in.

The Certified Ethical Hacker has all of the skills of an unethical hacker – and more – and applies those skills to creating solid and secure systems that are tried and tested. So the next time a malicious hacker embarks on his illegal, immoral and sociopathic journey, he will face a new adversary, a human one.

Comments on this Article: 1

Add a Comment
  1. I think one of the things that was not mentioned, was the fact that lost or stolen phones are a major part of the cybersecurity thread facing BYOD and IT departments. App like Tigertext which auto deletes text messages, video and files you put in Dropbox is one easy way to deal with the issue, but MDM systems can also address this issue across email and files, but at a much higher cost. IT departments really need to think about lost phones and the loss of data security that is can cause.

Add a Comment:


Thank you for adding to the conversation!

Our comments are moderated. Your comment may not appear immediately.