Are you sure?

Comfirm Cancel


Or Login using BecomeGorgeous


Please fill the form below and follow the further instructions.

By registering, you are agreeing to the terms and conditions.
We will not sell, rent or give your email to anyone so don't worry about spam.

Password Recovery

You are about to receive a email from us please make sure to check your spam or junk folder and add our email [email protected] to your contact list.

Thank you!

Judith J. Francis




  • 11534 Rank

  • 0 Points

Published on: 14 Dec 2016 by francisjud

Online fraud detection: Trend Micro Predicts More Sophisticated Cyber-Attacks in 2017

Companies around the world are
under constant cyber-attack. Cyber-criminals in 2016 were able to target
companies on several fronts, hitting them with distributed denial of service
(DDoS) attacks that knocked their web applications offline and cut them off
from their customers for hours at a time. They used phishing attacks to dupe
employees into disclosing network login information so they could break in and
steal data and trade secrets. Unfortunately, security software company Trend
Micro says things won’t change very much in 2017. Rather, Trend Micro’s
cyber-threat predictions for the New Year suggest hackers will increase their
attacks on mobile platforms and the internet of things (IoT). They also will
continue their practice of scamming employees with worthless spam emails and
phishing messages. In addition, Trend Micro believes an emerging threat known
as cyber-propaganda could be used to foment unrest and destabilize national
governments. All the while, hackers are expected to rake in billions of dollars
from their activities. This slide show will cover Trend Micro’s predictions on
the security threats companies will face in 2017 and suggest what people and enterprises
can do to protect themselves from increasingly sophisticated attacks.

The Internet of Things Becomes a Hacker
. Connected devices will be important tools for hackers in 2017. Trend
Micro predicts hackers will use IoT devices as “sleeper agents” that they’ll
pool together for much larger attacks against important infrastructure,
launching “massive DDoS attacks” via the devices. They’ll also try to take down
wide swaths of the internet and “pummel” major organizations.


Add a Comment

* Please Add A Comment


Thank you for submission! Your comment will be displayed after getting approval from our administrators.

Connect With
Or Pick a name