Hanwha Tanks
Cyber Security

Future-Proofing: Airbus Insights into Cybersecurity Trends for 2018

Alert: Attempt to access property “post_title” on null in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 275

Alert: Attempt to access property “post_parent” on null in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 479

Alert: Attempt to access property “post_name” on null in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 517

Deprecated: rtrim(): Passing null to parameter #1 ($string) of type string is deprecated in /home/defensea/english.defensearabia.com/wp-includes/formatting.php on line 2829

Alert: Attempt to access property “ID” on null in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 534

Alert: Attempt to access property “post_excerpt” on null in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 281


Alert: Attempting to access array offset on value of type bool in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 283

Deprecated: ltrim(): Passing null to parameter #1 ($string) of type string is deprecated in /home/defensea/english.defensearabia.com/wp-includes/formatting.php on line 4486

Alert: Attempt to access property “post_title” on null in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 283

Experts at Airbus’ Cyber Security department have assembled their foremost technology forecasts for 2018, grounded on patterns discerned at its Security Operations Centres located in France, the UK, and Germany during 2017.

Forecast 1: The absence of social media security policies will pose significant threats to organizations

As noted in 2017, social media channels are frequently utilized for disseminating misinformation or manipulating public sentiment. Nonetheless, these platforms can also serve as a conduit for advanced social engineering and reconnaissance activities, laying the groundwork for numerous attacks on enterprises. Criminals and hackers have been observed exploiting these avenues to propagate malware, promote fraudulent antivirus schemes, and conduct phishing operations to ensnare their targets.

Markus Braendle, Head of Airbus CyberSecurity: “Social media provide a platform for connecting individuals worldwide, facilitating the swift exchange of ideas, discussions, and debates in our digital landscape. However, from an attacker’s viewpoint, social media have become prime targets due to the abundance of users lacking cyber security knowledge and the ease and cost-effectiveness with which these platforms can be utilized. To defend themselves against social media-based attacks, organizations need to establish comprehensive social media security policies. This should encompass creating educational programs for staff regarding social media practices, and developing incident response strategies that synchronize the efforts of the legal, HR, marketing, and IT divisions during a security incident.”

Forecast 2: Assaults on Wireless networks will intensify

Incursions targeting Wireless networks are expected to surge as attackers aim to leverage the Key Reinstallation Attack (KRACK) vulnerability, which was first disclosed in October 2017.

This vulnerability can enable a malefactor to capture and analyze Wi-Fi traffic between devices and a WiFi router, and in certain instances, even alter the traffic to inject harmful data into websites. It may also allow adversaries to access confidential information from those devices, including credit card information, passwords, chat messages, and emails.

Braendle elaborates: “We can anticipate an upsurge in attacks over public or unsecured WiFi connections, which will subsequently necessitate enhanced security measures by organizations offering such services to their clientele. Such threats could be especially detrimental for users of outdated devices no longer supported by vendors, rendering them an appealing target for cybercriminals. These dangers may also stimulate an increased adoption of Virtual Private Networks (VPN) among the most security-conscious individuals.”

Forecast 3: Encryption will remain a challenge for law enforcement

Issues concerning data protection, the growing reliance on cloud solutions, an uptick in data breaches, and the implementation of the General Data Protection Regulation (GDPR) will all contribute to the rise of End to End Encryption (E2EE) as the premier method for businesses keen on securing their information. However, E2EE will also pose challenges for law enforcement as criminals continue to employ this approach for espionage and subversion.

Braendle states: “When evaluating the expense of any security solution, it’s vital to contemplate the financial repercussions of experiencing a security event. Following the implementation of the General Data Protection Regulation (GDPR), organizations could face fines reaching 4% of their global revenue in the case of a data breach—therefore, the cost of every solution must be assessed in relation to the associated risks involved.”

Related Articles

Back to top button