">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Wednesday, January 27, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

Cyber criminals are exploiting malicious Android apps as attack avenues

Milcah Lukhanyu by Milcah Lukhanyu
1 year ago
in Tech
7 min read
0
Computer privacy attack. Mixed media

Computer privacy attack. Mixed media

Cyber criminals are exploiting malicious Android apps as attack avenues. according to a Sophos 2020 Threat Report.

The report shows how cyberattackers are raising the stakes in ransomware, increasing stealth in malicious Android apps, exploiting misconfiguration in the cloud, and abusing machine learning.

The report, produced by SophosLabs researchers, explores changes in the threat landscape over the past 12 months, uncovering trends likely to impact cybersecurity in 2020. 

“The threat landscape continues to evolve – and the speed and extent of that evolution is both accelerating and unpredictable. The only certainty we have is what is happening right now, so in our 2020 Threat Report we look at how current trends might impact the world over the coming year.  We highlight how adversaries are becoming ever stealthier, better at exploiting mistakes, hiding their activities and evading detection technologies, and more, in the cloud, through mobile apps and inside networks. The 2020 Threat Report is not so much a map as a series of signposts to help defenders better understand what they could face in the months ahead, and how to prepare,” said John Shier, senior security advisor, Sophos.

The SophosLabs 2020 Threat Report, which is also summarized in a SophosLabs Uncut article, focuses on six areas where researchers noted particular developments during this past year. Among those expected to have significant impact on the cyberthreat landscape into 2020 and beyond are the following:

Ransomware attackers continue to raise the stakes with automated active attacks that turn organizations’ trusted management tools against them, evade security controls and disable back ups in order to cause maximum impact in the shortest possible time. 

READ  Taxify is starting operations in Mombasa, Kenya

Unwanted apps are edging closer to malware. In a year that brought the subscription-abusing Android Fleeceware apps, and ever more stealthy and aggressive adware, the Threat Report highlights how these and other potentially unwanted apps (PUA), like browser plug-ins, are becoming brokers for delivering and executing malware and fileless attacks.  

Related posts

Safaricom’s M-PESA Bill Manager brings digital receitps, bills and invoices to businesses & landlords

January 26, 2021
0

Stranded in Lockdown? Here Are 3 Ways You Can Make Money Via Cryptocurrencies Online

January 26, 2021
0
aimbot -8

UNDP Gifts Kenya With Robots That Will Aid In Fighting COVID-19

January 26, 2021
0

Signal Adds WhatsApp Like Features That Have Made The App More Interactive

January 26, 2021
0

The greatest vulnerability for cloud computing is misconfiguration by operators. As cloud systems become more complex and more flexible, operator error is a growing risk. Combined with a general lack of visibility, this makes cloud computing environments a ready made target for cyberattackers.

Machine learning designed to defeat malware finds itself under attack. 2019 was the year when the potential of attacks against machine learning security systems were highlighted. Research showed how machine learning detection models could possibly be tricked, and how machine learning could be applied to offensive activity to generate highly convincing fake content for social engineering. At the same time, defenders are applying machine learning to language as a way to detect malicious emails and URLs. This advanced game of cat and mouse is expected to become more prevalent in the future. 

Other areas covered in the 2020 Threat Report include the danger of failing to spot cybercriminal reconnaissance hidden in the wider noise of internet scanning, the continuing attack surface of the Remote Desktop Protocol (RDP), and the further advancement of automated active attacks (AAA).

READ  Venture Capital For Africa Signs Up 10,000 Members To Spark A Crowdsourcing Startup Movement Across Africa

Readers 1,549

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

Tech

Safaricom’s M-PESA Bill Manager brings digital receitps, bills and invoices to businesses & landlords

January 26, 2021
0
Tech

Stranded in Lockdown? Here Are 3 Ways You Can Make Money Via Cryptocurrencies Online

January 26, 2021
0
aimbot -8
Tech

UNDP Gifts Kenya With Robots That Will Aid In Fighting COVID-19

January 26, 2021
0
Tech

Signal Adds WhatsApp Like Features That Have Made The App More Interactive

January 26, 2021
0
Toshiba
Tech

Chrome Now Helps You Change Weak Passwords

January 23, 2021
0
Tech

Top 5 Skills That Modern Software Developers Need to Have

January 22, 2021
0
Tech

What Software Developers Need to Know About Burnout

January 22, 2021
0
Tech

Which is Better, Leasing or Purchasing Farm Equipment?

January 22, 2021
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

Samsung, Safaricom partner to push Samsung Galaxy S21 pre-orders

January 26, 2021

Safaricom’s M-PESA Bill Manager brings digital receitps, bills and invoices to businesses & landlords

January 26, 2021

8 Facts People Don’t Know About Bitcoin

January 26, 2021

Stranded in Lockdown? Here Are 3 Ways You Can Make Money Via Cryptocurrencies Online

January 26, 2021

3 Tips On Avoiding Cryptocurrency Scams

January 26, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: