您现在的位置是:Cybersecurity in the future: Security 'by PlayStation' and IoT asbestos >>正文
Cybersecurity in the future: Security 'by PlayStation' and IoT asbestos
后花园论坛社区|2024夜上海论坛网|爱上海419论坛 -- Back garden9957人已围观
简介ZDNetHELSINKI, FINLAND: Social dependency on internet connectivity, the toxic hell stew caused by vu...
HELSINKI, FINLAND: Social dependency on internet connectivity, the toxic hell stew caused by vulnerable Internet of Things (IoT) devices, and "walled garden" devices will all feature heavily in the future of cybersecurity, an expert has predicted.
During the SPHERE cybersecurity conference on June 1, WithSecure Chief Research Officer (CRO) Mikko Hyppönen told attendees that several themes are likely to heavily impact future generations' security alongside how consumer and enterprise devices are managed and protected.
The best internet service providers
When you’re comparing internet providers, you want the most reliable connection.
Read nowThe cybersecurity expert believes that future generations will be just as dependent on connectivity as we are on electricity today. If the electricity grid fails due to a solar storm, for example, Hyppönen said many countries would feel the sting and potentially collapse due to how reliant we have become on this power source.
One prediction he offered is that while the internet is important today, it has not reached a stage where it is considered crucial for society to function -- unlike electricity. However, the day may come when connectivity powers everything in society, from the economy to food production. So without it, society "wouldn't be able to function."
The executive is, of course, talking about the millions, if not billions, of IoT devices connected to the internet today.
Internet of Things
- The top 6 home automation systems: Put your home on auto-pilot
- Microsoft launches Defender for IoT to protect printers, smart TVs, and more
- The best Amazon Echo speakers: Which Alexa is right for you?
- What is the IoT? The Internet of Things explained
Hyppönen highlighted the trouble brewing when you have a future filled with devices containing outdated firmware that cannot be updated -- a scenario he calls "IoT asbestos."
The best security key
While robust passwords help you secure your valuable online accounts, hardware-based two-factor authentication takes that security to the next level.
Read nowAccording to Hyppönen, over 98% of malware samples scanned by WithSecure daily originate from money-making cybercriminal gangs.
The "enemy" base has evolved far beyond the development of floppy disk viruses. Threat actors now make a fortune from ransomware and cryptocurrencies, leading to a current -- and future -- scenario when you have wealthy criminals able to invest in their attacks.
Artificial Intelligence
- AI in 2023: A year of breakthroughs that left no human thing unchanged
- These are the jobs most likely to be taken over by AI
- AI at the edge: 5G and the Internet of Things see fast times ahead
- Almost half of tech executives say their organizations aren't ready for AI or other advanced initiatives
However, as more people enter AI as a career, barriers to entry come down, and it becomes easier to utilize AI frameworks. But "criminal groups can also start competing for these skills," as they have the wealth required to do so.
As a result, AI will take over the manual labor currently conducted by cybercriminals, turning the cybersecurity battlefield from a fight between the manual labor of threat actors and automated defenses to a clash between the "automatic and automatic."
"The only thing able to stop a bad AI is a good AI," Hyppönen noted.
Security "by PlayStation"
Another shift in the tech world of note, which is already happening but has room to grow, is what the executive calls "Security by PlayStation."
When you purchase a gaming console, like a PlayStation 5 or an Xbox, you buy a computer but do not have the right to customize it or launch programs that the vendor has not approved. Sure, it is possible to jailbreak a PlayStation and run unsigned code, but this is a difficult task and not one the average gamer will undertake.
8 habits of highly secure remote workers How to find and remove spyware from your phone The best VPN services: How do the top 5 compare? How to find out if you are involved in a data breach -- and what to do next 8 habits of highly secure remote workersTags:
转载:欢迎各位朋友分享到网络,但转载请说明文章出处“后花园论坛社区|2024夜上海论坛网|爱上海419论坛 -- Back garden”。http://dzbz.com.cn/news/8772.html
相关文章
Create your own ChatGPT AI bot with this course bundle
Cybersecurity in the future: Security 'by PlayStation' and IoT asbestosImprove your ChatGPT skills with this training bundle.StackSocialYou may have experimented with Chat...
阅读更多
Amazon's Alexa scientists demonstrate bigger AI isn't always better
Cybersecurity in the future: Security 'by PlayStation' and IoT asbestosA simple task, to reduce all the words in an article to a compact sequence of words that explains th...
阅读更多
This school district used ChatGPT to ban 19 books
Cybersecurity in the future: Security 'by PlayStation' and IoT asbestosJ. Countess/Getty ImagesThe Mason City Community School District in Iowa used artificial intelligenc...
阅读更多
热门文章
- McDonald's wants customers to use its app for a truly pitiful reason
- More AI experiences are coming to Discord, including ChatGPT
- Growth in cloud and e
- I took this free AI course for developers in one weekend and highly recommend it
- OpenShift 4.10: Red Hat teams with Nvidia to add AI and machine learning
- What is generative AI and why is it so popular? Here's everything you need to know
最新文章
Swinburne University researchers develop blood donation processing robot
Microsoft's ChatGPT
Meta's sprucing up its ads with new generative AI tools
This new AI service wants to make your video call a little bit easier
I tried Google's new job interview practice tool and I want to cry
Top 25 emerging technologies: Which ones will live up to the hype?