Cybersecurity Trends that Need to be Watched Out
By Enterprise Security Magazine | Tuesday, February 12, 2019
Various industries are suffering from flaws in billions of microchips leading to ransomware attacks. This type of software locks down computer systems to be paid by ransom. According to Juniper Research, the quantity of data stolen by cybercriminals might rise by around 175 percent over the next five years. Decision makers in the businesses are facing anxiety about how to citing security and privacy and keep on digital transformation progress. Following are some of the emerging cyber-threats that are poisoning the functions of many fields:
AI-generated fake video and audio: Cybercriminals create fake video and audio messages that are difficult to decipher if it is a real one, using artificial intelligence (AI). Hackers are throwing highly realistic fake video and audio into the mix, either to reinforce instructions in a phishing e-mail or as a standalone tactic. For instance, cybercriminals can manipulate stock prices by posting a fake video of a CEO announcing that a company is facing a financing crisis. The fake audio or video can also be used to spread false news in elections and to stoke geopolitical tensions.
Breaching AI defense: Generative adversarial networks (GANs) can be used to try to guess what algorithms defenders are using in their AI models. Also, hackers target data sets used to train models and poison them. For instance, they switch labels on samples of malicious code to indicate that they are safe.
Hacking smart contracts: Smart contracts are stored on a blockchain as software programs that automatically execute during the exchanges of digital assets if conditions encoded in them are met. As the blockchain is designed to be transparent keeping data associated with smart contracts private is difficult. If hackers exploit the flaws, they will be able to steal millions of dollars of money.
Businesses that host data from other companies on their servers or manage IT systems of clients lure hackers. They can breach these companies’ systems and get access to those of clients.