您现在的位置是:Cybersecurity in the future: Security 'by PlayStation' and IoT asbestos >>正文
Cybersecurity in the future: Security 'by PlayStation' and IoT asbestos
后花园论坛社区|2024夜上海论坛网|爱上海419论坛 -- Back garden17514人已围观
简介ZDNetHELSINKI, FINLAND: Social dependency on internet connectivity, the toxic hell stew caused by vu...
HELSINKI, FINLAND: Social dependency on internet connectivity, the toxic hell stew caused by vulnerable Internet of Things (IoT) devices, and "walled garden" devices will all feature heavily in the future of cybersecurity, an expert has predicted.
During the SPHERE cybersecurity conference on June 1, WithSecure Chief Research Officer (CRO) Mikko Hyppönen told attendees that several themes are likely to heavily impact future generations' security alongside how consumer and enterprise devices are managed and protected.
The best internet service providers
When you’re comparing internet providers, you want the most reliable connection.
Read nowThe cybersecurity expert believes that future generations will be just as dependent on connectivity as we are on electricity today. If the electricity grid fails due to a solar storm, for example, Hyppönen said many countries would feel the sting and potentially collapse due to how reliant we have become on this power source.
One prediction he offered is that while the internet is important today, it has not reached a stage where it is considered crucial for society to function -- unlike electricity. However, the day may come when connectivity powers everything in society, from the economy to food production. So without it, society "wouldn't be able to function."
The executive is, of course, talking about the millions, if not billions, of IoT devices connected to the internet today.
Internet of Things
- The top 6 home automation systems: Put your home on auto-pilot
- Microsoft launches Defender for IoT to protect printers, smart TVs, and more
- The best Amazon Echo speakers: Which Alexa is right for you?
- What is the IoT? The Internet of Things explained
Hyppönen highlighted the trouble brewing when you have a future filled with devices containing outdated firmware that cannot be updated -- a scenario he calls "IoT asbestos."
The best security key
While robust passwords help you secure your valuable online accounts, hardware-based two-factor authentication takes that security to the next level.
Read nowAccording to Hyppönen, over 98% of malware samples scanned by WithSecure daily originate from money-making cybercriminal gangs.
The "enemy" base has evolved far beyond the development of floppy disk viruses. Threat actors now make a fortune from ransomware and cryptocurrencies, leading to a current -- and future -- scenario when you have wealthy criminals able to invest in their attacks.
Artificial Intelligence
- AI in 2023: A year of breakthroughs that left no human thing unchanged
- These are the jobs most likely to be taken over by AI
- AI at the edge: 5G and the Internet of Things see fast times ahead
- Almost half of tech executives say their organizations aren't ready for AI or other advanced initiatives
However, as more people enter AI as a career, barriers to entry come down, and it becomes easier to utilize AI frameworks. But "criminal groups can also start competing for these skills," as they have the wealth required to do so.
As a result, AI will take over the manual labor currently conducted by cybercriminals, turning the cybersecurity battlefield from a fight between the manual labor of threat actors and automated defenses to a clash between the "automatic and automatic."
"The only thing able to stop a bad AI is a good AI," Hyppönen noted.
Security "by PlayStation"
Another shift in the tech world of note, which is already happening but has room to grow, is what the executive calls "Security by PlayStation."
When you purchase a gaming console, like a PlayStation 5 or an Xbox, you buy a computer but do not have the right to customize it or launch programs that the vendor has not approved. Sure, it is possible to jailbreak a PlayStation and run unsigned code, but this is a difficult task and not one the average gamer will undertake.
8 habits of highly secure remote workers How to find and remove spyware from your phone The best VPN services: How do the top 5 compare? How to find out if you are involved in a data breach -- and what to do next 8 habits of highly secure remote workersTags:
转载:欢迎各位朋友分享到网络,但转载请说明文章出处“后花园论坛社区|2024夜上海论坛网|爱上海419论坛 -- Back garden”。http://dzbz.com.cn/news/2662.html
相关文章
OpenStack cloud sees explosive growth
Cybersecurity in the future: Security 'by PlayStation' and IoT asbestosOpenStack clouds are heading for multi-billion dollar revenue.The Tech Trends to Watch in 2023Learn...
阅读更多
UN sets up advisory team to coordinate 'inclusive' AI governance
Cybersecurity in the future: Security 'by PlayStation' and IoT asbestosMR.Cole_Photographer/Getty ImagesThe United Nations (UN) has set up an advisory team to look at how...
阅读更多
ChatGPT browsing feature deactivated only a week after roll out
Cybersecurity in the future: Security 'by PlayStation' and IoT asbestosMaria Diaz/ZDNETJust a week after the ChatGPT Browse feature went live on the iOS app, OpenAI had to...
阅读更多
热门文章
- Everyone wants responsible AI, but few people are doing anything about it
- Later, Discord! Midjourney AI tool is moving to dedicated website
- Cloud revenues power Microsoft's $51.7 billion Q2 in fiscal year 2022
- Technology spending will rise next year. And this old favourite is still a top priority
- One in four tech professionals are ready to leave their jobs, survey reveals
- How to avoid losing your unused Google accounts next month
最新文章
How LangChain turns GenAI into a genuinely useful assistant
OpenAI unveils new safety plan for frontier AI models. How it'll impact future development
Google Workspace's AI assistant Duet AI is about to get a whole lot smarter
How long does it take to calculate 100 trillion digits of pi? Ask Google
Microsoft, TikTok give generative AI a sort of memory
Chatbot showdown: ChatGPT, Google Bard, and Bing Chat put to a real