cyber threats that need to be given more attention by 2021

 Now that we have a general sense of the big picture, there are some cyber threats that need to be given more attention by 2021. Let's see what they are?


1. Fake video and audio generated by Artificial Intelligence

With advances in Artificial Intelligence, it is now possible to create fake audio and video messages that are incredibly difficult to distinguish from reality. These deepfakes, as they are called, can be an advantage for hackers in some ways.


AI-generated "phishing" emails designed to trick people into handing over passwords and other sensitive data have already been shown to be more effective than those generated by humans. Now hackers will be able to throw highly realistic fake videos and audio into the mix, either to reinforce instructions in a spam email or as a stand-alone tactic.


Cybercriminals can also use technology to manipulate stock prices, say, by posting a fake video of a CEO announcing that a company is facing a financing problem or some other crisis. Meanwhile, the only real line of defense is security awareness training to raise awareness of risk.


2. Poisoning of AI defenses

Security companies rushed to adopt Artificial Intelligence models as a way to help anticipate and detect cyber attacks. However, sophisticated hackers can try to corrupt these defenses.


Opponent generating networks, or GANs, which launch two neural networks against each other, can be used to try to guess what the advocates of algorithms are using in their AI models. Another risk is that hackers will target data sets used to train models and poison them - for example, by swapping labels on samples of malicious code to indicate that they are safe, not suspect.


3. Hacking smart contracts

Smart contracts are software programs stored on a Blockchain that automatically perform some form of exchange of digital assets if the conditions encoded in them are met. Entrepreneurs launch their use for everything from money transfers to intellectual property protection.


But it is still early in their development, and researchers are finding bugs in some. The same is true of hackers, who exploited flaws to steal millions of dollars in cryptocurrencies.


The bottom line is that Blockchains were designed to be transparent. Maintaining the data associated with private smart contracts is therefore a challenge.

The goal of subnetting is to create a fast, efficient, and resilient computer network. As networks become larger and more complex, the traffic traveling through them needs more efficient routes.

4. Breaking encryption using quantum computers

Security experts predict that quantum computers, which take advantage of exotic phenomena in quantum physics to produce exponential leaps in processing power, can break the cryptography that currently helps protect everything from e-commerce transactions to health records.


Quantum machines are still in their infancy, and it may take a few years before they pose a serious threat. But products like cars whose software can be updated remotely will still be in use a decade or more from now.

Comments

Popular posts from this blog

Discover how to leverage your IT career

What is a DDoS Attack? A Simple Definition

How to prevent a DDoS?