What will cyber-crimes look like in 2022? See these hacking trends

When the Covid induced pandemic hit in March 2019, every line of business took a toll. But as the economy has bounced back in 2020-21, so have cyber crimes. As 2022 draws near, hackers are looking for new ways to infiltrate companies and disrupt operations.

As per American Finance giant Nasdaq report, by the end of September 2021, the number of businesses who fell prey to data breaches was 17% higher than 2020. Cybersecurity experts are warning that cybercriminals will be adjusting their tactics next year to better take advantage of the pandemic’s impact and to become even more sophisticated in their attacks.

‘The Nokia 2021 Threat Intelligence Report’ read that banking malware threats are sharply increasing as cyber criminals target the rising popularity of mobile banking on smartphones, with plots aimed at stealing personal banking credentials and credit card information.

Read more

Trojan Malware, downloaded by 3 Lakh Android users, targeting SBI users

Trojan Malware, downloaded by 3 Lakh Android users, targeting SBI users

Cryptocurrency mining has been garnering everyone’s interest especially over the span of the last couple of months. However, hackers are using this public interest in cryptocurrencies to trick innocent netizens into installing malicious apps on their smartphones containing dangerous malware and adware. This trend will continue into 2022 as well.

Read more

Ransomware top threat for Indians in 2021, crypto frauds on the rise: Report

Ransomware top threat for Indians in 2021, crypto frauds on the rise: Report

Making deepfakes is getting easier and more convincing than ever. Cybercriminals are using video and audio deepfakes to add fake authenticity to their scams. Crimes involving faked images and audio have already on the rise. The next wave of deepfake crimes will involve video. The working-from-home, video-call-laden work culture might will serve as a caterer deepfake cybercrime.

Since all the Internet of Things (IOT) devices have microphones and cameras that are always online, they act as an invitation for hackers to use them to spy on users.

Read more

OTP managers for Google, Twitter, WhatsApp spying on you: Report

OTP managers for Google, Twitter, WhatsApp spying on you: Report

As more and more organizations are relying on the cloud, continous monitoring and updation of the process to prevent data leaks is the need of the hour. The cloud aspect of cybersecurity will be a critical challenge to overcome in 2022.