• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

The Biggest Cyber Threats to Watch Out for in 2019

November 13, 2018 by Xinteng Chen 3 Comments

The article introduces about the biggest cyber threats to watch out for in 2019. Chertoff Group estimate the biggest risks and make advise for the risks in 2019, which include security risk, technology and policy. The threats include following:

1,Cryptojacking, 2, Software subversion, 3, Rise in attacks to 4, the cryptocurrency ecosystem 5, (Slow) Domestic Movement on Data Privacy and Security Legislation 6, Cyber threats and influence operations 7, Heightened incident disclosure expectations (SEC, etc.) 8, Vulnerability equities process 9, CISA and lingering private sector resistance 10,Ambiguity remains for the Lines of Defense 11, Threat emulation to measure effectiveness (ATT@CK) 12, Identity solutions moving to the cloud 13, Authentication through mobile devices will explode 14, Customers will increasingly focus on effective risk management as a differentiator.

 

https://www.securitymagazine.com/articles/89581-the-biggest-cyber-threats-to-watch-out-for-in-2019

Filed Under: Week 11: SQL Injection Tagged With:

Reader Interactions

Comments

  1. Haitao Huang says

    November 14, 2018 at 10:08 am

    Xinteng,

    Thank you for sharing this useful article. Cryptojacking has become an increasingly popular way for bad actors to extract money from targets in the form of cryptocurrency. Widely publicized hacks such as the WannaCry worm, which affected systems on several continents in May 2017, encrypted victims’ files and demanded cryptocurrency ransoms – bitcoin, in the case of WannaCry – in order to decrypt them. Cryptojacking takes a different approach, harnessing victims’ machines to “mine”: perform the computations necessary to update cryptocurrencies’ blockchains, creating new tokens and generating fees in the process. These new tokens and fees are deposited to wallets owned by the attacker, while the costs of mining – electricity and wear and tear to computers – are borne by the victim.

    Log in to Reply
  2. Yingyan Wang says

    November 14, 2018 at 12:36 pm

    Hi Xinteng,

    It is good to know these cyber threats in the coming year 2019. These information are very helpful. Organizations and cybersecurity professionals should aware these potential risks and be prepared to prevent and mitigate them for the benefit of the company.

    Log in to Reply
  3. Ruby(Qianru) Yang says

    November 28, 2018 at 6:14 am

    Hi Xinteng, great sharing. Good to know that Cyber threats and influence operations .A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in