Skip to main content

Where is the World of Cybersecurity Heading in 2020?

TUV Rheinland Releases Their 7th Annual Cybersecurity Trends Report


As we all know, the world of cybersecurity is an ever-evolving, fast-growing industry that can be tough to follow at times. For example, we have seen a rapid upsurge in the use of smart devices and with that, an increased risk of cyberattacks. This has not been limited to private households either. Rather, the logistics industry and private vehicles are also at risk of being hacked. Indeed, as individuals and industries increasingly move online, this inevitably leads to an accumulation of data in mammoth proportions. When access to this data is left uncontrolled, this could potentially destabilise the digital society. In other words, as Petr Lahner, Business Executive Vice President for the business stream Industry Service & Cybersecurity at TUV Rheinland, explains, “…it is particularly serious that cybercrime is increasingly affecting our personal security and the stability of society as a whole.” As such, it is critical that we fully understand these trends. Fortunately, TUV Rheinland, a leading international provider of testing, inspection and certification services, has offered us an in-depth report outlining seven cybersecurity trends to look out for this year. So, what are they?
  • Uncontrolled Access to Personal Data and the Destabilization of the Digital Society
When one requests for a company to disclose the personal information they hold on him or her, it may come as a surprise to receive as many as 800 pages. Yet, that is exactly the predicament that Judith Duportail found herself in 2017, after asking a dating app company to send her any personal information they had about her. They had tracked everything from her Facebook likes and dislikes, to each individual conversation she had with all 870 of her matching contacts since subscribing to the app four years prior. This not only highlights the immense build-up of data that occurs today but the lack of transparency regarding its processing and security. While governments do appear to be picking up on the ethics of big data with the introduction of GDPR and the CCPA, such laws tend to be highly subjective; thus, leaving room for businesses to choose an interpretation favourable to their own self-interest.
  • The Rapid Proliferation of Smart Consumer Devices and the Lack of Security
From smart speakers, to smart watches, to even smart locks and lights, the Internet of Things show no signs of slowing down and is swiftly becoming a fundamental part of our lives. This multiplies the cyber security challenges, previously confined to servers and personal computers, by hundreds, if not thousands in size. With hundreds of billions of devices to monitor and defend, the risk of exploitation is bound to sky-rocket.
  • When Owning a Medical Device Risks an Internet Health Crisis
With the advent of the Internet of Things, comes the Internet of Medical Things. Medical devices such as defibrillators, pacemakers as well as heart and glucose monitors are progressively becoming connected to the internet. However, software vulnerabilities expose both individuals and entire product classes to potentially fatal cyberattacks. Moreover, there has been little investment dedicated to their maintenance and repair, or to the management of data that such devices hold, including after their official lifespan comes to an end.
  • Vehicle and Transport Infrastructure as New Targets for Cyber Attacks
Proprietary software and hardware platforms are allowing vehicles and traffic infrastructure to become ever more integrated which helps to give drivers more flexibility, potentially improve traffic safety and necessitates the development of self-driving cars. Yet, this once again, occasions cyberattacks that could lead to hugely disruptive consequences.
  • Smart Supply Chains turning ‘dumb’?
Supply chains are quickly becoming digitalised with the help of IoT, automation, robotics and big data management which, in turn, facilitates a more efficient and economical means for a company to operate. In some instances, it allows companies to virtualise elements such as warehousing. Nevertheless, the amalgamated nature of these networks could easily be exploited by bad actors.
  • Threats to Shipping
In 2017 alone, over 10 billion tons of goods were transported by sea and this will only continue to grow. There is evidence to suggest that ship navigation, port logistics as well as ship computer networks have faced or are vulnerable to attacks, and they can originate from states and activist groups.
  • Patching Real-Time Operating Systems
With an estimated 75 billion connected IoT devices predicted to exist by 2025, each with their own software stack, any vulnerabilities will likely be buried in large numbers of products going back many years. This creates a significant obstacle for organisations whose patches become less effective, if even the vulnerability is found in the first place.

Comments

Popular posts from this blog

MOST COMMON CYBER ATTACKS

1). PHISHING:        • One of the most insidious techniques used today is Phishing. It's hard to find the person that doesn't know what phishing is. However lot of users still getting tricked by the hackers.         • Phishing implies    the replication of the website with the aim of stealing money or personal information. And once a user enters his credit card details in that fake website, a hacker can get access to those details and will be able to use those information for his own benefit. 2). Viruses and Malicious Codes:        • Hacker's can almost crawl into any website and leave in its database malware or insert code into website files.         • There is a huge variety of viruses, and each may impact the infected websites differently. 3). UI Redress:        • This technique is similar to the phising; but in this case a hacker could create a fake hidden user int...

Face search on web

  Today the web is full of such tools, but it is best to focus on the ones with a very good track record over the years. With that in mind, I'll limit myself to the top four, or better yet, the top 4 from my point of view. If you don't like my choice, you can share yours in the comment section and let's have a worthy discussion. How to search for a face or face on the web You can use any of these free facial recognition search engines to find faces on the internet: 1- PimEyes 2- PicTriev 3- BetaFace 4- Google images 1. PimEyes Having the ability to search for faces from over 10 million websites is an incredible superpower, and that's what  PimEyes   will show you. Yes, it is very similar to Google Search in how it works, but if you are not a fan of the Silicon Valley guys, then PimEyes is a great alternative. Interestingly, users can search with four different photos at the same time to narrow down the results. 2. PicTriev I found  PicTriev  to be quite differen...

Amazon Web Services (AWS) and Cloud Computing for Beginners — Best and free

  Hey Everyone! If you want to learn about the basics of Amazon Web Services, also known as AWS, and you are looking for excellent & important resources such as books, courses and websites then you have come to the right place. In this article, I will share with you the best lessons from Amazon Web Services or AWS that will help you learn this flexible and valuable technology at no cost. and education. You just need to sign up with them and you can read AWS anytime, anywhere, and in your program. What is Amazon Web Service (AWS) benefits? A W S is just a cloud service provider by Amazon. It is flexible because it allows you to upgrade the app without having to worry about hardware, network, database and virtual infrastructure that you need to run your app. For example, if you want to improve your online business plan, you need more servers, information and other infrastructure. Amazon has built many data centers around the world to support its core business which means the E-Co...