The global cyber security market size is forecast to grow to $345.4 billion by 2026, a jump of more than 58.5 per cent from $217.9bn this year, according to Statista. Getty
The global cyber security market size is forecast to grow to $345.4 billion by 2026, a jump of more than 58.5 per cent from $217.9bn this year, according to Statista. Getty
The global cyber security market size is forecast to grow to $345.4 billion by 2026, a jump of more than 58.5 per cent from $217.9bn this year, according to Statista. Getty
The global cyber security market size is forecast to grow to $345.4 billion by 2026, a jump of more than 58.5 per cent from $217.9bn this year, according to Statista. Getty

Top 10 cyber crime trends to watch for in 2022


Alkesh Sharma
  • English
  • Arabic

Global cyber crime costs are expected to increase by nearly 15 per cent on a yearly basis over the next four years to reach $10.5 trillion annually by 2025, from $3tn in 2015, California research company Cybersecurity Ventures has said.

Cyber criminals have taken note of successful tactics from this year, including those making headlines tied to ransomware, nation states, social media and the shifting reliance on a remote workforce.

Industry experts expect them to pivot those into next year's campaigns and grow in sophistication, wielding the potential to wreak more havoc across industries.

“Over this past year, we have seen cyber criminals get smarter and quicker at retooling their tactics to follow new bad actor schemes – from ransomware to nation states – and we don’t anticipate that changing in 2022,” Raj Samani, fellow and chief scientist of the combined company formed after the merger of McAfee Enterprise and FireEye, said.

.
.

“With the evolving threat landscape and continued impact of the global pandemic, it is crucial that enterprises stay aware of the cyber security trends so that they can be proactive and actionable in protecting their information,” Mr Samani said.

The National looks at the top 10 cyber security trends of the year ahead:

Weaponising operational technology environments

Cyber criminals could weaponise operational technology environments to harm or kill humans in the next four years, the Connecticut-based technology research and consulting company Gartner has said.

The OT is a type of computing and communication system – including both hardware and software – that controls industrial operations, mainly focusing on the physical devices and processes they use. It is used to gather and analyse data in real time, which is further used to monitor a manufacturing unit or to control equipment.

Various industries, such as telecoms and oil and gas, use OTs to ensure different devices work in co-ordination.

Attacks on OT environments have evolved from “immediate process disruption” such as shutting down a plant – for example in the recent Colonial Pipeline ransomware attack that took down the largest fuel pipeline in the US – to compromising the “integrity of industrial environments” with intent to cause physical or reputational harm, Gartner said.

Remote working brings new challenges

Remote working spurred by the Covid-19 pandemic could compound cyber threats in 2022.

Home devices that employees use to access office networks are usually not subject to the same security restrictions as corporate devices. This complicates efforts to control and monitor employees’ digital behaviour, applications and data outside traditional firewalls, industry analysts said.

Remote working spurred by the Covid-19 pandemic could compound cyber threats in 2022. Getty
Remote working spurred by the Covid-19 pandemic could compound cyber threats in 2022. Getty

Geopolitical cyber concerns pose growing risks

Some state actors will launch cyber attacks because they are “cheap, reliable, portable, easily hidden and hard to detect”, Moody’s Investors Service said in a report earlier this year.

The state-sponsored attacks threaten reputational damage, cause disruption of work flow and loss of intellectual property.

“Entities that find themselves the targets of these attacks could experience substantial credit damage,” the rating agency had said at the time.

Use of social media for attacks

While using social media to target victims is not a new strategy, it is relatively uncommon. It demands a level of research to engage the vulnerable target into interactions and establish fake profiles.

“The targeting of individuals has proven a very successful channel and we predict the use of this vector could grow not only through espionage groups, but [also] other threat actors looking to infiltrate organisations for their own criminal gain,” McAfee Enterprise and FireEye said in its cyber threats predictions for 2022.

Cryptocurrency exchanges to experience an increase in attacks

Cryptocurrency exchanges experienced a 10-fold increase in attacks in the first half of the year compared with the prior year period, said a report by cyber threat intelligence company PhishLabs, although it did not disclose the exact number of attacks.

The majority of the cryptocurrency attacks were orchestrated through social media.

“We anticipate cryptocurrency businesses will continue to be aggressively targeted by threat actors through social media in future … [it is] due to a majority of their activity and communication taking place through social platforms,” the report said.

Hackers pulled off the biggest cryptocurrency heist yet on August 10, stealing $613 million in digital coins from token-swapping platform Poly Network, only to return $260m worth of tokens less than 24 hours later.

Phishing attacks

Phishing typically comes in the form of fraudulent emails or pop-up messages that aim to obtain personal information from victims, such as credit card details and sensitive data, including personal identification numbers, usernames and passwords.

In May, cyber criminals targeted the US company Colonial Pipeline, which ships about 2.5 million barrels of oil each day across the country. Photo: Reuters
In May, cyber criminals targeted the US company Colonial Pipeline, which ships about 2.5 million barrels of oil each day across the country. Photo: Reuters

Phishing emails may also secretly install malicious software or malware in victims' computers. Such nefarious installations may be a virus or spyware designed to collect more information, which could lead to further fraud.

API becoming a lucrative target

Internet of Things and 5G traffic between API (application programming interface) services and apps will make them increasingly lucrative targets, causing unwanted exposure of information.

The connected nature of APIs potentially also introduces additional risks to businesses as they become an entry vector for wider supply chain attacks, McAfee Enterprise and FireEye said.

“In most cases, attacks targeting APIs go undetected as they are generally considered as trusted paths and lack the same level of governance and security controls.”

API is a connection between computers or programmes that allows two applications to interact with each other.

Cyber security talent crunch

The coming year will prove to be the most challenging one yet with regards to the continuing cyber security talent crunch, said the US cyber security firm BeyondTrust.

“Some drivers of this supply-demand imbalance include the accelerated adoption of hybrid cloud and digital transformation initiatives, post-pandemic projects ramping up and budgets becoming available for spend,” it added.

Rise of ransomware

The use of ransomware has picked up pace and became more dangerous in 2021. It will continue its rapid rise next year and its variations will increase with the frequency of attacks.

“Organisations must stop trying to prevent adversaries’ missions and instead prevent them from being worthwhile,” said Marty Edwards, vice president of operational technology at Columbia-headquartered cyber security company Tenable.

“In other words, organisations must make sure these missions cost too much to conduct. If the reward doesn’t cover the cost of the investment, threat actors won’t pursue it,” he added.

Cloud migration poses threat

Nearly half of the organisations moved business-critical functions to the cloud as a direct result of the pandemic, said Tenable.

However, cloud migration requires specific considerations that will likely be overlooked in 2022. For instance, detecting and preventing malicious activity in the cloud is a lot different, said Bob Huber, chief security officer at Tenable.

“And this can be further complicated by the nuances of working with cloud providers, as well as other company stakeholders looking to rapidly adopt new services in the cloud.

“Unless organisations educate their entire teams, not just security teams, about securing the cloud, they will inevitably pay the price as their migration accelerates,” said Mr Huber.

Alita: Battle Angel

Director: Robert Rodriguez

Stars: Rosa Salazar, Christoph Waltz, Keean Johnson

Four stars

INDIA%20SQUAD
%3Cp%3ERohit%20Sharma%20(capt)%2C%20Shubman%20Gill%2C%20Cheteshwar%20Pujara%2C%20Virat%20Kohli%2C%20Ajinkya%20Rahane%2C%20KL%20Rahul%2C%20KS%20Bharat%20(wk)%2C%20Ravichandran%20Ashwin%2C%20Ravindra%20Jadeja%2C%20Axar%20Patel%2C%20Shardul%20Thakur%2C%20Mohammed%20Shami%2C%20Mohammed%20Siraj%2C%20Umesh%20Yadav%2C%20Jaydev%20Unadkat%3C%2Fp%3E%0A
Bawaal%20
%3Cp%3E%3Cstrong%3EDirector%3A%3C%2Fstrong%3E%20Nitesh%20Tiwari%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EStars%3A%3C%2Fstrong%3E%20Varun%20Dhawan%2C%20Janhvi%20Kapoor%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%201%2F5%3C%2Fp%3E%0A
UAE currency: the story behind the money in your pockets
The specs
  • Engine: 3.9-litre twin-turbo V8
  • Power: 640hp
  • Torque: 760nm
  • On sale: 2026
  • Price: Not announced yet

Opening day UAE Premiership fixtures, Friday, September 22:

  • Dubai Sports City Eagles v Dubai Exiles
  • Dubai Hurricanes v Abu Dhabi Saracens
  • Jebel Ali Dragons v Abu Dhabi Harlequins
What are the GCSE grade equivalents?
 
  • Grade 9 = above an A*
  • Grade 8 = between grades A* and A
  • Grade 7 = grade A
  • Grade 6 = just above a grade B
  • Grade 5 = between grades B and C
  • Grade 4 = grade C
  • Grade 3 = between grades D and E
  • Grade 2 = between grades E and F
  • Grade 1 = between grades F and G
The White Lotus: Season three

Creator: Mike White

Starring: Walton Goggins, Jason Isaacs, Natasha Rothwell

Rating: 4.5/5

UK's plans to cut net migration

Under the UK government’s proposals, migrants will have to spend 10 years in the UK before being able to apply for citizenship.

Skilled worker visas will require a university degree, and there will be tighter restrictions on recruitment for jobs with skills shortages.

But what are described as "high-contributing" individuals such as doctors and nurses could be fast-tracked through the system.

Language requirements will be increased for all immigration routes to ensure a higher level of English.

Rules will also be laid out for adult dependants, meaning they will have to demonstrate a basic understanding of the language.

The plans also call for stricter tests for colleges and universities offering places to foreign students and a reduction in the time graduates can remain in the UK after their studies from two years to 18 months.

Rooney's club record

At Everton Appearances: 77; Goals: 17

At Manchester United Appearances: 559; Goals: 253

Arabian Gulf Cup FINAL

Al Nasr 2

(Negredo 1, Tozo 50)

Shabab Al Ahli 1

(Jaber 13)

Company%20Profile
%3Cp%3E%3Cstrong%3ECompany%20name%3A%3C%2Fstrong%3E%20myZoi%3Cbr%3E%3Cstrong%3EStarted%3A%3C%2Fstrong%3E%202021%3Cbr%3E%3Cstrong%3EFounders%3A%3C%2Fstrong%3E%20Syed%20Ali%2C%20Christian%20Buchholz%2C%20Shanawaz%20Rouf%2C%20Arsalan%20Siddiqui%2C%20Nabid%20Hassan%3Cbr%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20UAE%3Cbr%3E%3Cstrong%3ENumber%20of%20staff%3A%3C%2Fstrong%3E%2037%3Cbr%3E%3Cstrong%3EInvestment%3A%3C%2Fstrong%3E%20Initial%20undisclosed%20funding%20from%20SC%20Ventures%3B%20second%20round%20of%20funding%20totalling%20%2414%20million%20from%20a%20consortium%20of%20SBI%2C%20a%20Japanese%20VC%20firm%2C%20and%20SC%20Venture%3C%2Fp%3E%0A
How to avoid crypto fraud
  • Use unique usernames and passwords while enabling multi-factor authentication.
  • Use an offline private key, a physical device that requires manual activation, whenever you access your wallet.
  • Avoid suspicious social media ads promoting fraudulent schemes.
  • Only invest in crypto projects that you fully understand.
  • Critically assess whether a project’s promises or returns seem too good to be true.
  • Only use reputable platforms that have a track record of strong regulatory compliance.
  • Store funds in hardware wallets as opposed to online exchanges.
COMPANY%20PROFILE
%3Cp%3E%3Cstrong%3EName%3A%20%3C%2Fstrong%3EYango%20Deli%20Tech%0D%3Cbr%3E%3Cstrong%3EBased%3A%20%3C%2Fstrong%3EUAE%0D%3Cbr%3E%3Cstrong%3ELaunch%20year%3A%20%3C%2Fstrong%3E2022%0D%3Cbr%3E%3Cstrong%3ESector%3A%20%3C%2Fstrong%3ERetail%20SaaS%0D%3Cbr%3E%3Cstrong%3EFunding%3A%20%3C%2Fstrong%3ESelf%20funded%0D%3Cbr%3E%3C%2Fp%3E%0A
BMW%20M4%20Competition
%3Cp%3E%3Cstrong%3EEngine%3A%20%3C%2Fstrong%3E3.0%20twin-turbo%20inline%20six-cylinder%0D%3Cbr%3E%3Cstrong%3ETransmission%3A%3C%2Fstrong%3E%20eight-speed%0D%3Cbr%3E%3Cstrong%3EPower%3A%20%3C%2Fstrong%3E503hp%0D%3Cbr%3E%3Cstrong%3ETorque%3A%3C%2Fstrong%3E%20600Nm%0D%3Cbr%3E%3Cstrong%3EPrice%3A%3C%2Fstrong%3E%20from%20Dh617%2C600%0D%3Cbr%3E%3Cstrong%3EOn%20sale%3A%3C%2Fstrong%3E%20Now%0D%3C%2Fp%3E%0A
Company profile

Name: Tharb

Started: December 2016

Founder: Eisa Alsubousi

Based: Abu Dhabi

Sector: Luxury leather goods

Initial investment: Dh150,000 from personal savings

 

Labour dispute

The insured employee may still file an ILOE claim even if a labour dispute is ongoing post termination, but the insurer may suspend or reject payment, until the courts resolve the dispute, especially if the reason for termination is contested. The outcome of the labour court proceedings can directly affect eligibility.


- Abdullah Ishnaneh, Partner, BSA Law 

Company%20Profile
%3Cp%3E%3Cstrong%3ECompany%3A%3C%2Fstrong%3E%20Astra%20Tech%3Cbr%3E%3Cstrong%3EStarted%3A%20%3C%2Fstrong%3EMarch%202022%3Cbr%3E%3Cstrong%3EBased%3A%20%3C%2Fstrong%3EDubai%3Cbr%3E%3Cstrong%3EFounder%3A%20%3C%2Fstrong%3EAbdallah%20Abu%20Sheikh%3Cbr%3E%3Cstrong%3EIndustry%3A%3C%2Fstrong%3E%20technology%20investment%20and%20development%3Cbr%3E%3Cstrong%3EFunding%20size%3A%3C%2Fstrong%3E%20%24500m%3C%2Fp%3E%0A
UAE currency: the story behind the money in your pockets
If you go

Flights

Emirates flies from Dubai to Phnom Penh with a stop in Yangon from Dh3,075, and Etihad flies from Abu Dhabi to Phnom Penh with its partner Bangkok Airlines from Dh2,763. These trips take about nine hours each and both include taxes. From there, a road transfer takes at least four hours; airlines including KC Airlines (www.kcairlines.com) offer quick connecting flights from Phnom Penh to Sihanoukville from about $100 (Dh367) return including taxes. Air Asia, Malindo Air and Malaysian Airlines fly direct from Kuala Lumpur to Sihanoukville from $54 each way. Next year, direct flights are due to launch between Bangkok and Sihanoukville, which will cut the journey time by a third.

The stay

Rooms at Alila Villas Koh Russey (www.alilahotels.com/ kohrussey) cost from $385 per night including taxes.

Difference between fractional ownership and timeshare

Although similar in its appearance, the concept of a fractional title deed is unlike that of a timeshare, which usually involves multiple investors buying “time” in a property whereby the owner has the right to occupation for a specified period of time in any year, as opposed to the actual real estate, said John Peacock, Head of Indirect Tax and Conveyancing, BSA Ahmad Bin Hezeem & Associates, a law firm.

THREE POSSIBLE REPLACEMENTS

Khalfan Mubarak
The Al Jazira playmaker has for some time been tipped for stardom within UAE football, with Quique Sanchez Flores, his former manager at Al Ahli, once labelling him a “genius”. He was only 17. Now 23, Mubarak has developed into a crafty supplier of chances, evidenced by his seven assists in six league matches this season. Still to display his class at international level, though.

Rayan Yaslam
The Al Ain attacking midfielder has become a regular starter for his club in the past 15 months. Yaslam, 23, is a tidy and intelligent player, technically proficient with an eye for opening up defences. Developed while alongside Abdulrahman in the Al Ain first-team and has progressed well since manager Zoran Mamic’s arrival. However, made his UAE debut only last December.

Ismail Matar
The Al Wahda forward is revered by teammates and a key contributor to the squad. At 35, his best days are behind him, but Matar is incredibly experienced and an example to his colleagues. His ability to cope with tournament football is a concern, though, despite Matar beginning the season well. Not a like-for-like replacement, although the system could be adjusted to suit.

WRESTLING HIGHLIGHTS
Updated: December 29, 2021, 4:30 AM`