With the end of the year approaching rapidly and 2016 right around the corner, it’s important to understand what cyber threats are upon us.

DataVisor is set to release its’ Top 5 online fraud predictions for 2016 report Monday, November 23, but have given the public a sneak peek at what to expect in the full report.

Escalating Threats from Social Sites

DataVisor believes that as the lines between social and e-commerce blur, social sites like Pinterest, Facebook & Twitter will become bigger targets for thieves. With these sites implementing additions like the ‘Buy’ button, they’ll become more attractive targets for fraudsters looking to conduct fraudulent transactions.

EMV Cards & Digital Wallet Fraud

With the newly adopted EMV cards & digital wallet solutions like Google Wallet and Apple Pay, increased fraud is expected to be on the rise online, also known as, credit-not-present fraud.

Global Online-to-Offline Services User Acquisition Fraud

 Global online-to-offline service providers are expected to see a spike in user-acquisition promotion fraud. For example, in an effort to gain market share, Users invested more than $2 billion for expansion in China & India. Now while this money is generally allocated for promotional purposes to attract users and drivers, reports have shown a massive increase in user acquisition fraud. Typically, these fraudsters will pose as drivers and end up making hundreds of dollars a month in subsidies by registering numerous driver accounts and conducting fake rides.

Account Takeovers Due to Ongoing Data Breaches

Traditional threats are also expected to linger, with account takeovers projected to increase due in part to the continued massive data breaches. From your insurance provider to your favorite restaurant or even your government, your data has probably been compromised at some point as a consequence of one or multiple of these notorious data breaches.

Cyber Attacks Expected to Move to the Cloud

Cloud service providers like Microsoft Azure and Google Cloud have already become victims of these attacks as fraudsters register an immense number of free, trial accounts and use their computation infrastructure to conduct cyber-attacks. According to DataVisor, “Cloud allows cyber-attackers to significantly increase the number of attack campaigns they can conduct, attributed to the elasticity and compute capacity of these services, and allows them to easily hide behind legitimate network sources and thus remain anonymous.”

With NNT's Change Tracker Gen7, your organization will come equipped with intelligent file integrity monitoring, compliance management, system hardening, threat intelligence & security configuration management all powered by Intelligent Closed-Loop Intelligent Change Control, all working to make your IT estate as secure and compliant as possible. 



Read the article on Info-Security Magazine





The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.