While we predict that these attacks will continue, the migration to chip-and-pin smartcards towards the end of 2015 will make it harder for hackers to monetize the data stolen from POS systems. They won't be able to use fake magnetic cards and will primarily be relegated to online payment fraud.
What should organizations do to prevent POS-based breaches? They can protect POS systems from malware using white-listing, code-signing and behavioral techniques, harden systems against compromise by controlling who and what can access POS terminals, and monitor for infiltrations with advanced threat prevention platforms. And since malware can communicate to command and control servers over SSL and over normally harmless protocols like DNS, organizations should inspect all traffic, including encrypted traffic.
Security Predictions for 2015 No.5 - Malvertisers Will Dole out Trouble as They Infiltrate Ad Networks
Malware distributors have zeroed in on a fast and effective way to infect millions of users: malvertising. With malvertising, cybercriminals distribute malicious code through online advertising networks.
Because the malware-laden advertisements are hosted by legitimate websites and the ads constantly change, traditional security tools that "black list" malicious sites cannot easily block malvertisers' ads. Malware-laden ads often silently infect machines without users' knowledge.
In 2015, we predict that malvertisers will take advantage of new exploits, known exploits like Dynamic DNS, and signature and sandbox evasion techniques to further propagate their malware across advertising networks. To prevent malware infections, organizations should install anti-malware software on client machines and enforce security controls on clients' browsers. Advanced threat protection platforms can also help detect malware in web traffic. Since many web-based advertisements are now delivered over SSL, organizations should decrypt and inspect encrypted traffic.
Sign up for CIO Asia eNewsletters.