Cyber Threat Forecasts in 2016

Various IT Security players like Intel and Mc Afree have begun making predictions about the cyber threats and risks in the upcoming year 2016. Predictions for next year run the gamut from ransom ware to critical infrastructure attacks, warehousing and sale of stolen data.

Cyber Threat Forecasts In 2016

The other things include:

  • Integrity attacks – a subtle yet equally impact form of attack that will become more prominent in 2016.
  • Better security in the enterprises would lead to more attacks on workforce as they work from home.
  • Changes in the way people pay for things and their effects.
  • Wearable integrated with smartphones to be an attractive attack vector.
  • Highlight positive modifications in the sharing of threat intelligence within the private sector and between the private sector and governments.

The report illustrated by the Mc Afree Security company emphasizes on an ever-evolving risky landscape wherein applications and noticeable operating systems are hardened to attacks. However attackers shift their focus to less prominent but critical attack surfaces, new device types and innovative attack styles. Researchers show enterprises building out their complex security defenses and comprehensive policies, while invaders target the weak security of employees working remotely.

Experts continue to drive development of the most sophisticated attacks through firmware, espionage malware, and detection evasion.

The cybercrime-as-a-service ecosystem discovers, changes, and sells these advanced capabilities and support infrastructure to all comers that includes the least sophisticated malicious actors, on the burgeoning dark web. Moreover, while legislatures continue to move slowly to protect individuals and organizations, there are the positive prospects of threat intelligence collaboration that provides organizations real advantages versus their adversaries.


This view reveals short- and long-term implications for organizations and an IT security industry working to keep pace with business opportunities and technology challenges, along with fighting off the threats attackers launch to take advantage of them.