Often, virus writers don’t even bother to run encryption or mask their communications. However, you do get the occasional off-the-wall approaches that don’t fall into either of the categories. Take, for instance, the case of a Trojan that Kaspersky Lab researchers discovered in mid-March and which establishes a DNS tunnel for communication with the C&C server.
With the emergence of wearables, the convergence between the virtual and the physical world makes people feel more natural using technology all the time. Unfortunately, the emergence of new technologies also entails new security risks.
Financial data stealing is one of the most effective ways to monetize malware, exploits and other cybercriminal's tools. At the same time, attacks against cash machines (ATM) seemed to explode in year 2015 with several public incidents and a rush by law enforcement authorities globally to respond to this crisis.
Advanced Persistent Threats or APT - concerted, stealthy, ongoing attacks against specific organisations. Typically make use of highly sophisticated malware to breach an organisation's security defences and gain the access and control necessary to achieve their aims.