{"id":17202,"date":"2017-01-22T05:00:56","date_gmt":"2017-01-22T13:00:56","guid":{"rendered":"http:\/\/www.yardi.com\/blog\/?p=17202"},"modified":"2020-12-24T22:02:23","modified_gmt":"2020-12-25T06:02:23","slug":"danger-in-the-forecast","status":"publish","type":"post","link":"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/","title":{"rendered":"Stranger Danger"},"content":{"rendered":"<p>In many ways, 2016 will be known as the year of the hack. Between Russian Hackers, DDoS attacks bringing down the eastern seaboard, or the littl<img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-17208\" src=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg\" alt=\"shutterstock_551992834\" width=\"358\" height=\"358\" srcset=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg 800w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg?resize=768,768 768w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg?w=400 400w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg?w=500 500w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg?w=600 600w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg?w=720 720w\" sizes=\"auto, (max-width: 358px) 100vw, 358px\" \/>e matter of over a billion compromised Yahoo! Accounts, last year marked the moment \u201ccyber\u201d security went mainstream. While there\u2019s no doubt more of the same is on the way, <a href=\"https:\/\/www.wired.com\/2017\/01\/biggest-security-threats-coming-2017\/\" target=\"_blank\" rel=\"noopener\">Wired<\/a> has put on its prognostication cap to ponder what new security threats will emerge over the next 12 months. After all, as they say, forewarned is forearmed.<\/p>\n<p>\u201cIt\u2019s hard to know for certain what lies ahead, but some themes began to present themselves toward the end of 2016 that will almost certainly continue well into next year,\u201d begins Wired.<\/p>\n<p>\u201c&#8230;the more we can anticipate them, the better we can prepare.\u201d<\/p>\n<p><strong>Dawn of the Drones<\/strong><\/p>\n<p>Military drones have been fighting proxy battles across the globe for quite some time now, but private, commercial drones could soon turn deadly. Though they\u2019re smaller than their battle-worn counterparts, commercial drones have existed in an unregulated, wild west-type no-man\u2019s-land. Though the FCC currently requires drone owners to register their devices, internationally, there\u2019s little oversight. Wired reports small drones have already been used for terrorist activities and guerrilla warfare, including an attack on US-allied Kurdish soldiers in October of last year.<\/p>\n<p>\u201cWhat better way to deliver deadly ordnance across enemy lines or into secure zones of cities than with remote-controlled accuracy and off-the-shelf hardware that offers no easy way to trace the perpetrator,\u201d Wired asks.<\/p>\n<p>\u201cThe US government is already\u00a0<a href=\"http:\/\/www.popularmechanics.com\/military\/weapons\/a20914\/dod-dhs-buying-drone-jammers\/\" target=\"_blank\" rel=\"noopener\">buying drone-jamming hardware<\/a>. But as with all IEDs, the arms race between flying consumer grade bombs and the defenses against them will likely be a violent game of cat-and-mouse.<\/p>\n<p><strong>iPhone goes to Court<\/strong><\/p>\n<p>Wired predicts the conflict between federal authorities and mobile-phone providers, which hit an apex with the iPhone 5c-encryption standoff in 2016, will only intensify in the coming year. While Apple has remained steadfast in its commitment to protecting the privacy of its customers, the FBI has already begun to lay groundwork for a new day in court.<\/p>\n<p>\u201cIt\u2019s only a matter of time until the FBI or other cops make another legal demand that an encryption-maker assist in cracking its protections for users,\u201d warns Wired. \u201cSooner or later, expect another crypto clash.\u201d<\/p>\n<p><strong>From Russia with Love<\/strong><\/p>\n<p>From the moment the election results began pouring in, <a href=\"http:\/\/www.yardi.com\/blog\/technology\/election-hack\/15897.html\" target=\"_blank\" rel=\"noopener\">suspicions of a possible election hack<\/a> began to focus on the country\u2019s old Cold War nemesis. Many government agencies, from the Department of Homeland Security to the CIA and FBI, have expressed concern over the Kremlin\u2019s apparent attempt to intercede and influence the US presidential election. For Wired, even apparent success could be enough to spur attacks that are more significant in the future \u2013 including the nation\u2019s vulnerable infrastructure.<\/p>\n<p>\u201cThe apparent success of Russia\u2019s efforts\u2026will only\u00a0<a href=\"https:\/\/www.wired.com\/2016\/11\/trumps-win-signals-open-season-russias-political-hackers\/\" target=\"_blank\" rel=\"noopener\">embolden Russia\u2019s digital intruders to try new targets and techniques<\/a>,\u201d writes Wired. \u201cExpect them to replicate their influence operations ahead of elections next year in Germany, the Netherlands, and France, and potentially to even try new tricks like data sabotage or attacks on physical infrastructure.\u201d<\/p>\n<p><strong>Rolling Blackouts<\/strong><\/p>\n<p>Used by both state-sponsored agents and lone-wolf hackers, DDoS attacks use the inherent vulnerabilities in a disparate, often unregulated and sparsely protected internet. <a href=\"http:\/\/www.yardi.com\/blog\/technology\/smart-homes-dumb-security\/16821.html\">Back in October<\/a> of last year, an army of botnets capitalized on the lack of IoT security to launch a series of attacks that brought down internet service for almost half of the country. <a href=\"http:\/\/www.yardi.com\/blog\/technology\/safer-smart-homes\/15819.html\" target=\"_blank\" rel=\"noopener\">With the list of smart devices<\/a> growing every day, the number of entry points for hackers is expanding exponentially, and with each new target comes a new opportunity.<\/p>\n<p>\u201cAnd it\u2019s not just internet connectivity itself,\u201d explains Wired. \u201cThe versatility of DDoS attacks is precisely what makes them so dangerous. In 2017, they\u2019ll be more prevalent than ever.<\/p>\n<p><strong>Billion-dollar Ransom<\/strong><\/p>\n<p>Recently, both the\u00a0<a href=\"https:\/\/www.privacyrights.org\/sites\/privacyrights.org\/files\/ID%20Experts%204th%20Annual%20Patient%20Privacy%20&amp;%20Data%20Security%20Report%20FINAL.pdf\" target=\"_blank\" rel=\"noopener\">Ponemon Institute<\/a>\u00a0and the\u00a0<a href=\"https:\/\/www.privacyrights.org\/data-breach\/new\" target=\"_blank\" rel=\"noopener\">Privacy Rights Clearinghouse<\/a>\u00a0have identified health care data particularly susceptible to cyber-attacks, and the list of potential targets will only grow in the coming year. Hospitals and other healthcare providers are an <a href=\"http:\/\/www.yardi.com\/blog\/technology\/beware-ransomware\/14838.html\" target=\"_blank\" rel=\"noopener\">alluring target<\/a> for hackers in part because they maintain databases full of valuable personal information on patients (and staff). Expect those attacks to intensify over the next 12 months.<\/p>\n<p>\u201cMore innovation, plus more disruption, will come in 2017,\u201d warns Wired. \u201cRansomware attacks on financial firms have already been rising, and attackers may be emboldened to take on large banks and central financial institutions.<\/p>\n<p>\u201cIn other words, ransomware attacks are going to get bigger in every possible sense of the word.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Batten down the hatches, here come 2017\u2019s biggest security threats!<\/p>\n","protected":false},"author":103,"featured_media":17208,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_s2mail":"yes","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[1640,99,1778,76],"class_list":["post-17202","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-cybersecurity","tag-data-security","tag-internet-security","tag-technology-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Yardi Blog<\/title>\n<meta name=\"description\" content=\"Batten down the hatches, here come 2017\u2019s biggest security threats!\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stranger Danger\" \/>\n<meta property=\"og:description\" content=\"Batten down the hatches, here come 2017\u2019s biggest security threats!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/\" \/>\n<meta property=\"og:site_name\" content=\"Yardi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-22T13:00:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-25T06:02:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cutright Elizabeth\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cutright Elizabeth\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/\",\"url\":\"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/\",\"name\":\"Stranger Danger - Yardi Corporate Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg\",\"datePublished\":\"2017-01-22T13:00:56+00:00\",\"dateModified\":\"2020-12-25T06:02:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d\"},\"description\":\"Batten down the hatches, here come 2017\u2019s biggest security threats!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/#primaryimage\",\"url\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg\",\"contentUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg\",\"width\":800,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yardi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stranger Danger\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\",\"url\":\"https:\/\/www.yardi.com\/blog\/\",\"name\":\"Yardi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yardi.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d\",\"name\":\"Cutright Elizabeth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g\",\"caption\":\"Cutright Elizabeth\"},\"description\":\"Elizabeth Cutright is an award-winning writer and editor with over 20 years of experience in journalism, publishing and online content creation. A film school grad with a law degree from the University of San Diego, outside of work Elizabeth can usually be found in the pool, on a hiking trail, or sampling Santa Barbara\u2019s latest vintage.\",\"url\":\"https:\/\/www.yardi.com\/blog\/author\/elizabeth-cutright-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Yardi Blog","description":"Batten down the hatches, here come 2017\u2019s biggest security threats!","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Stranger Danger","og_description":"Batten down the hatches, here come 2017\u2019s biggest security threats!","og_url":"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/","og_site_name":"Yardi Blog","article_published_time":"2017-01-22T13:00:56+00:00","article_modified_time":"2020-12-25T06:02:23+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg","type":"image\/jpeg"}],"author":"Cutright Elizabeth","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cutright Elizabeth","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/","url":"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/","name":"Stranger Danger - Yardi Corporate Blog","isPartOf":{"@id":"https:\/\/www.yardi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/#primaryimage"},"image":{"@id":"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg","datePublished":"2017-01-22T13:00:56+00:00","dateModified":"2020-12-25T06:02:23+00:00","author":{"@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d"},"description":"Batten down the hatches, here come 2017\u2019s biggest security threats!","breadcrumb":{"@id":"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/#primaryimage","url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg","contentUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg","width":800,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.yardi.com\/blog\/danger-in-the-forecast\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yardi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Stranger Danger"}]},{"@type":"WebSite","@id":"https:\/\/www.yardi.com\/blog\/#website","url":"https:\/\/www.yardi.com\/blog\/","name":"Yardi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yardi.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d","name":"Cutright Elizabeth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g","caption":"Cutright Elizabeth"},"description":"Elizabeth Cutright is an award-winning writer and editor with over 20 years of experience in journalism, publishing and online content creation. A film school grad with a law degree from the University of San Diego, outside of work Elizabeth can usually be found in the pool, on a hiking trail, or sampling Santa Barbara\u2019s latest vintage.","url":"https:\/\/www.yardi.com\/blog\/author\/elizabeth-cutright-2\/"}]}},"jetpack_featured_media_url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/01\/shutterstock_551992834.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/17202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/users\/103"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/comments?post=17202"}],"version-history":[{"count":9,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/17202\/revisions"}],"predecessor-version":[{"id":27674,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/17202\/revisions\/27674"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media\/17208"}],"wp:attachment":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media?parent=17202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/categories?post=17202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/tags?post=17202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}