Skip to content

Cyber Threats Evolve in 2016: New Targets, Familiar Tactics

Fantasy sports and presidential candidates were new targets in 2016. Drones and connected vehicles posed additional threats in an ever-evolving digital landscape.

In this image in the center there are some people who are wearing helmets, and holding sticks it...
In this image in the center there are some people who are wearing helmets, and holding sticks it seems that they are fighting. And at the bottom there is floor, in the background there is net.

Cyber Threats Evolve in 2016: New Targets, Familiar Tactics

Cyber threats in 2016 are evolving, with new targets and familiar tactics. Fantasy sports platforms, presidential candidates, and major sporting events are among those at risk.

In 2016, cyber attackers showed no signs of slowing down. They continued to rely on tried-and-true methods like banking trojans and spear phishing. However, their targets expanded to include fantasy sports platforms like FanDuel and DraftKings. These sites, with their large user bases and valuable customer data, became attractive targets for data theft or result manipulation.

Drones emerged as a potential threat, capable of penetrating consumer devices and enterprise networks. Meanwhile, connected vehicles like the Jeep Cherokee faced serious safety implications due to remote hacking vulnerabilities. Major sporting events in 2016, such as the World Cup and Summer Olympics, also found themselves in the crosshairs, with cyber attacks potentially influencing outcomes or winning bets.

As the world becomes increasingly digital, cyber attackers find no shortage of opportunities to steal or disrupt data. In 2016, they turned their attention to fantasy sports, presidential candidates, connected vehicles, and major sporting events. While traditional attacks remained effective, new targets and threats like drones posed additional challenges. The digital landscape in 2016 was a complex and evolving battleground, requiring constant vigilance and adaptation from cybersecurity professionals.

Read also:

Latest