{"id":13054,"date":"2015-12-28T20:03:23","date_gmt":"2015-12-29T03:03:23","guid":{"rendered":"http:\/\/reviewermag.com\/press\/?p=13054"},"modified":"2016-01-07T02:49:52","modified_gmt":"2016-01-07T09:49:52","slug":"cybersecurity-predictions-for-2016","status":"publish","type":"post","link":"http:\/\/reviewermag.com\/press\/2015\/12\/28\/cybersecurity-predictions-for-2016\/","title":{"rendered":"cybersecurity predictions for 2016"},"content":{"rendered":"<p>[Scary Email]<\/p>\n<h1><b>&#8220;WE ARE MOVING TOWARDS DEVASTATION&#8230;&#8221;<br \/>\nTALK TO THE CYBER SECURITY MASTER<\/b><\/div>\n<\/h1>\n<div class=\"gmail_default\"><\/div>\n<div class=\"gmail_default\"><span style=\"font-size: large;\"><b>GET A PREVIEW OF 2016&#8217;S<\/b><\/span><\/div>\n<div class=\"gmail_default\"><span style=\"font-size: large;\"><b>CYBER PREDICTIONS&nbsp;<\/b><\/span><\/div>\n<div class=\"gmail_default\"><\/div>\n<div class=\"gmail_default\"><b><u><span style=\"color: #000000;\">CYBER SECURITY EXPERT:<\/span><\/u><\/b>&nbsp;Michael Daugherty, is a Senior Writer for<i>&nbsp;Cyber Defense Magazine&nbsp;<\/i>and is a Board Member at Snoopwall the powerhouse cyber-security firm. He is author of&nbsp;<i>The Devil Inside the Beltway: The Shocking Expose of the US Government&#8217;s Surveillance and Overreach Into Cyber-security, Medicine and Small Business.<\/i><\/div>\n<div class=\"gmail_default\"><\/div>\n<div class=\"gmail_default\">\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\">Last year I quoted late, great sage and Hall of Fame baseball player Yogi Berra. Yogi once noted, &#8220;It&#8217;s tough to make predictions especially about the future.&#8221;<\/span><\/div>\n<div class=\"gmail_default\"><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\">Fortunately, for me, mine for 2015 were accurate. And so I will venture out to again make predictions, many of which should be considered warnings, for 2016 \u2014 as I remain all the while cognizant of the words of the Chinese philosopher La Tzu that &#8220;those who have knowledge, don&#8217;t predict. Those who predict don&#8217;t have knowledge.&#8221;<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"gmail_default\"><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\">So here are my cybersecurity predictions for 2016:<\/span><\/div>\n<div class=\"gmail_default\"><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\">1. The Internet of Things will increasingly be exploited by hackers. With more and more products including cars, refrigerators, coffee makers, televisions, smartwatches, webcams, copy machines, toys and even medical devices being connected to the Internet, the Internet of Things will become a prime target for hackers to exploit in many ways.<\/span><\/div>\n<div class=\"gmail_default\"><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\">2. Ransomware, whereby hackers take control of the data in their victims&#8217; computers, encrypt the data and threaten to destroy the data unless the victims pay a ransom has evolved into a bigger problem than many people may be aware of because many of the victims of ransomware do not report the attacks out of a concern as to adverse publicity. Companies of all sorts and governmental agencies have become victims of ransomware. The sophistication of the malware used as ransomware makes this a tremendous threat. In addition, while in the past ransomware has been used primarily for financial extortion, it can be expected that terrorists and others may use this malware purely to attack a target and destroy its data without any financial purpose.<\/span><\/div>\n<div class=\"gmail_default\"><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\">3. As more and more data migrates to the cloud, hackers will focus their attention on infiltrating the cloud. As so often is the case, the cloud may be more vulnerable due to the security measures used by the people and companies using the cloud rather than inherent security weaknesses in the companies providing cloud services.<\/span><\/div>\n<div class=\"gmail_default\"><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\">4. ISIS and other terrorist groups will attempt to conduct cyberwarfare including trying to attack vulnerable computer connected infrastructure including energy facilities.<\/span><\/div>\n<\/div>\n<div class=\"gmail_default\"><\/div>\n<div class=\"gmail_default\">\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\"><b><u>READ MORE:<\/u><\/b>&nbsp;<a href=\"http:\/\/system01.catapultapps.com\/s\/2938\/3\/8066467\/7599\/\" target=\"_blank\">http:\/\/www.usatoday.com\/<wbr \/>story\/money\/columnist\/2015\/12\/<wbr \/>27\/weisman-cybersecurity-predi<wbr \/>ctions\/77832588\/?utm_content=<wbr \/>buffer0cd91&amp;utm_medium=social&amp;<wbr \/>utm_source=twitter.com&amp;utm_<wbr \/>campaign=buffer<\/a><\/span><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\">&nbsp;<\/span><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\"><b><u>PLUG BOOK:<\/u><\/b>&nbsp;<a href=\"http:\/\/system01.catapultapps.com\/s\/2938\/3\/8066467\/7600\/\" target=\"_blank\">http:\/\/www.amazon.com\/<wbr \/>Devil-Inside-Beltway-<wbr \/>Surveillance-Cybersecurity\/dp\/<wbr \/>0985742208\/ref=la_B00FEQ56KO_<wbr \/>1_1_title_2_har?s=books&amp;ie=<wbr \/>UTF8&amp;qid=1410913051&amp;sr=1-1<\/a><\/span><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\">&nbsp;<\/span><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\"><b><u>BIO:<\/u><\/b>&nbsp;Daugherty is a government whistleblower by necessity, and CEO of a cancer detection laboratory by trade. A small business owner taking on federal agencies with courage that rivals David meets Goliath, Michael is on a tireless crusade to honor his constitutional rights and the rights of every U.S. citizen. Michael s story of victimization by a cyber-security company linked to federal agencies is not unique that he s telling his story is. In a play-by-play account of questionable government practices, Michael reveals his chilling tale about how our security is not the safety we think it is. His book The Devil inside the Beltway is a must read for anyone who values freedom or takes it for granted.<\/span><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\">&nbsp;<\/span><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\"><b><u>WEBSITE:<\/u><\/b>&nbsp;<wbr \/>TheDevilInsideTheBeltway.com<\/span><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\">&nbsp;<\/span><\/div>\n<div class=\"gmail_default\"><span style=\"font-family: arial, helvetica, sans-serif;\"><b><u>TWITTER:<\/u><\/b>&nbsp;@DaughertyMJ<\/span><\/div>\n<\/div>\n<figure id=\"attachment_13057\" aria-describedby=\"caption-attachment-13057\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2015\/12\/digital-bomb-image.jpg\" rel=\"attachment wp-att-13057\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2015\/12\/digital-bomb-image.jpg?w=600\" alt=\"WE ARE MOVING TOWARDS DEVASTATION...\"  class=\"size-full wp-image-13057\" srcset=\"https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2015\/12\/digital-bomb-image.jpg?w=1536&amp;ssl=1 1536w, https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2015\/12\/digital-bomb-image.jpg?resize=300%2C156&amp;ssl=1 300w, https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2015\/12\/digital-bomb-image.jpg?resize=768%2C399&amp;ssl=1 768w, https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2015\/12\/digital-bomb-image.jpg?resize=1024%2C532&amp;ssl=1 1024w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/a><figcaption id=\"caption-attachment-13057\" class=\"wp-caption-text\">&#8220;WE ARE MOVING TOWARDS DEVASTATION&#8230;&#8221;<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>[Scary Email] &#8220;WE ARE MOVING TOWARDS DEVASTATION&#8230;&#8221; TALK TO THE CYBER SECURITY MASTER GET A PREVIEW OF 2016&#8217;S CYBER PREDICTIONS&nbsp; CYBER SECURITY EXPERT:&nbsp;Michael Daugherty, is a Senior Writer for&nbsp;Cyber Defense Magazine&nbsp;and is a Board Member at Snoopwall the powerhouse cyber-security firm. He is author of&nbsp;The Devil Inside the Beltway: The Shocking Expose of the US Government&#8217;s Surveillance and Overreach Into [&hellip;]<\/p>\n","protected":false},"author":453,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[580,1040,625,1014],"tags":[1193,1192,1194],"class_list":["post-13054","post","type-post","status-publish","format-standard","hentry","category-technology","category-the-law","category-update","category-world-politics","tag-computer-stuff","tag-technology-cybersecurity-predictions-for-2016","tag-the-internet-of-things"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1102,"url":"http:\/\/reviewermag.com\/press\/2009\/07\/22\/going-totally-cyber-with-google-voice\/","url_meta":{"origin":13054,"position":0},"title":"Going totally cyber with Google Voice","author":"admin","date":"July 22, 2009","format":false,"excerpt":"Web-based Communications... another Twitter success story ...By Reviewer Rob Hey, check this out. You can call Reviewer Magazine on our new Google Voice number now. Google Voice, you might already know, is this free voicemail service Google has that sends calls to any number you want, cellphone or landline, and\u2026","rel":"","context":"In &quot;technology&quot;","block_context":{"text":"technology","link":"http:\/\/reviewermag.com\/press\/category\/technology\/"},"img":{"alt_text":"","src":"http:\/\/rt.trafficfacts.com\/ns.php?k=15128gc0e252de4358e43957ea101670842873716edb66h7","width":350,"height":200},"classes":[]},{"id":19959,"url":"http:\/\/reviewermag.com\/press\/2024\/01\/02\/is-artificial-intelligence-beneath-itself\/","url_meta":{"origin":13054,"position":1},"title":"Is &#8220;Artificial Intelligence&#8221; beneath itself?","author":"Reviewer Rob","date":"January 2, 2024","format":false,"excerpt":"[Word Salad]The Universal Brain of AI Why denigrate AI with such dismissive language? \"Artificial Intelligence\" as a term is beginning to seem inappropriate. Given its pervasiveness throughout our smartphone and cyber-run society, it seems less artificial than it does integral. So it's intelligence that's man-made, who cares? When you slide\u2026","rel":"","context":"In &quot;archive&quot;","block_context":{"text":"archive","link":"http:\/\/reviewermag.com\/press\/category\/archive\/"},"img":{"alt_text":"Artificial Intelligence robot","src":"https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2024\/01\/ai-walking-robot-neurosicnes.jpg?fit=1200%2C799&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2024\/01\/ai-walking-robot-neurosicnes.jpg?fit=1200%2C799&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2024\/01\/ai-walking-robot-neurosicnes.jpg?fit=1200%2C799&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2024\/01\/ai-walking-robot-neurosicnes.jpg?fit=1200%2C799&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2024\/01\/ai-walking-robot-neurosicnes.jpg?fit=1200%2C799&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":460,"url":"http:\/\/reviewermag.com\/press\/2008\/03\/21\/cyber-distribution\/","url_meta":{"origin":13054,"position":2},"title":"Cyber Distribution","author":"admin","date":"March 21, 2008","format":false,"excerpt":"[covering the covers]JEFF BUCKLEY\u2019S \"HALLELUJAH\" BECOMES AMERICA\u2019S NUMBER ONE DIGITAL SONGJASON CASTRO\u2019S AMERICAN IDOL PERFORMANCE OF \"HALLELUJAH\" PROPELS JEFF BUCKLEY\u2019S 1994 RECORDING TO THE TOP OF THE ITUNES SINGLES CHART A CRUCIAL SONG FROM HIS 1994 DEBUT ALBUM GRACE BECOMES JEFF BUCKLEY\u2019S FIRST U.S. NUMBER ONEThanks to American Idol, America\u2019s\u2026","rel":"","context":"In &quot;archive&quot;","block_context":{"text":"archive","link":"http:\/\/reviewermag.com\/press\/category\/archive\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1300,"url":"http:\/\/reviewermag.com\/press\/2009\/09\/09\/palm-reading-by-remote\/","url_meta":{"origin":13054,"position":3},"title":"Palm Reading By Remote","author":"admin","date":"September 9, 2009","format":false,"excerpt":"[Cyber Psychic]PALM and TAROT READING BY DAME DARCY, KNOW YOUR FUTURE NOW$20 for palm readings or tarot readingsBy Dame Darcy[Our favorite pagan takes the ancient art into the computer age. ~Editor] For palm readings, please scan and send the palm, fist with pink side down, and back of your predominant\u2026","rel":"","context":"In &quot;archive&quot;","block_context":{"text":"archive","link":"http:\/\/reviewermag.com\/press\/category\/archive\/"},"img":{"alt_text":"Dame Darcy, palm reader.","src":"https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2009\/09\/damedarcysnowportrait.sm.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":14423,"url":"http:\/\/reviewermag.com\/press\/2017\/06\/11\/14423\/","url_meta":{"origin":13054,"position":4},"title":"Meddling Words Matter","author":"Reviewer Rob","date":"June 11, 2017","format":false,"excerpt":"[Syntax] \"Meddling Kids\" Election manipulation by Putin, a thing of humor and satisfaction for our mainstream media? by Reviewer Rob from Intargam Maybe our American mainstream news media really isn't just one monolithic industry with one tight-knit cabal controlling it. Maybe it's not significant that the only real use of\u2026","rel":"","context":"In &quot;living by the sword&quot;","block_context":{"text":"living by the sword","link":"http:\/\/reviewermag.com\/press\/category\/living-by-the-sword\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/reviewermag.com\/press\/wp-content\/uploads\/2017\/06\/meddliing-kids-villian.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":543,"url":"http:\/\/reviewermag.com\/press\/2008\/11\/03\/there-will-be-a-crisis-contrived-or-instigated\/","url_meta":{"origin":13054,"position":5},"title":"there will be a crisis, contrived or instigated","author":"admin","date":"November 3, 2008","format":false,"excerpt":"http:\/\/www.reviewermagazine.com\/obamas-first-6-months.html [Conspiracy theories]\"Within six months of Obama's inauguration\"Allan Weisbecker puts Obama to the testFrom Weisbecker's periodic mass-email: ... I'm curious to know if I'm correct in my assessment of these matters, so I'll make a few predictions; down the line we'll see how it goes: 1. Obama will be elected.\u2026","rel":"","context":"In &quot;archive&quot;","block_context":{"text":"archive","link":"http:\/\/reviewermag.com\/press\/category\/archive\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"http:\/\/reviewermag.com\/press\/wp-json\/wp\/v2\/posts\/13054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/reviewermag.com\/press\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/reviewermag.com\/press\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/reviewermag.com\/press\/wp-json\/wp\/v2\/users\/453"}],"replies":[{"embeddable":true,"href":"http:\/\/reviewermag.com\/press\/wp-json\/wp\/v2\/comments?post=13054"}],"version-history":[{"count":5,"href":"http:\/\/reviewermag.com\/press\/wp-json\/wp\/v2\/posts\/13054\/revisions"}],"predecessor-version":[{"id":13084,"href":"http:\/\/reviewermag.com\/press\/wp-json\/wp\/v2\/posts\/13054\/revisions\/13084"}],"wp:attachment":[{"href":"http:\/\/reviewermag.com\/press\/wp-json\/wp\/v2\/media?parent=13054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/reviewermag.com\/press\/wp-json\/wp\/v2\/categories?post=13054"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/reviewermag.com\/press\/wp-json\/wp\/v2\/tags?post=13054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}