QTS-Unit-Question 3

3. Share your thoughts on what you imagine to be the future of cyber attacks. Consider the types of information we store and share online today. What information will hackers try to get in the future? What approaches do you think they will use?
First and foremost, some hacking methods in review in the recent history as learned lessons are malware, hacking, online scams, phishing emails, fake news to name a few. Computers will probably always be around and that means unfortunately that cyber criminals will be around as well and more sophisticated. Therefore, it is an ongoing race between cyber criminals and white hat hackers. They are becoming smarter and cyber criminals are too. However, cyber criminals tentatively have more incentives to think about novel approaches to serve their needs and purposes so it is a big challenge for cyber security experts to take proactive measures to deal with and mitigate damages and loss. Intentionally, many hackers think that breaking into a security system is a sign of how mart they are. It is certain that the most common crime is cyber criminals try to steal credit card information, sell fake credit cards and personal information to withdraw money, buy things using the name of the person whose identity had been stolen. They can also hack companies’ or individuals’ email accounts for fraud. Other criminals set up a website called Silk Road, a secret marketplace for illegal goods and there are in the future such more and more black websites or even a secret hacking company. At school, students hacked into professors’ databases and changed grades, so they are likely to hack schools’ management system as well. In the recent years, stealing patent or copyright of newly-unreleased films, music or works of art is potential. On a higher and more serious level, we will witness hacking companies’ system, banking systems, even countries’ military defense system risking to national security. Ultimately, cyber experts have kept on such measures to prevent cyber attacks as using strong passwords, passphrases, hashing passwords, multi-factor or two-factor authentication, and more reliable biometric security. In the future, cyber criminals can be that they use AL to support or search for weakness in the computer programs victims are using to look for cyber fingerprints – clues left behind in the computer programs that have been broken into or a software to extract the victims’ identity from their online posted images. Overall, a piece of advice is always be careful what personal information users put online what files or links you choose to click on. To sum up, below is some extracts from cyber experts cited from a website
They all think that the fight against cyber criminals never stops and takes lots of efforts. They are quoted as saying as follows:
What will cyber attacks look like in the future?
Experts predict a cyberattack is expected to happen every 11 seconds in 2021. In 2019, that rate was 19 seconds and in 2016 it was 40 seconds. In the future, cyber attacks could happen every second.
Cybersecurity experts predict the financial loss posed by ATM threats will amount to $6 trillion by the end of 2021. Cyber-attack incidents are also expected to occur every 11 seconds in in 2021. In 2019, that speed was 19 seconds and in 2016 it was 40 seconds. In the future, cyber attacks could happen every second. As a result, we will see an increase in frequency and significant financial losses for victims.

1. Deepfake and malicious call
The Deepfake trend started in 2019 when threat actors innovated their tools and technologies for malicious and entertainment purposes, such as illegal pornography. In the future, cybercriminals will call customer service centers using synthetic voices to decipher whether organizations have the tools and technology to detect their activity. One of the main areas that will be targeted will be the banking sector.
As companies begin to implement voice technology and individuals adopt digital assistant technologies like Alexa and Siri, fraudsters will also continue to explore potential opportunities in the voice economy. (voice economy). According to Pin Drop statistics, 90 voice attacks took place every minute in the US. 1 out of 796 calls to the call center were malicious calls.
Some of the challenges companies will face include protecting voice interactions, privacy concerns, and supporting call centers with tools and solutions to detect and prevent them. prevent fraud.
2. Security Cam video data breach
In March 2021, Bloomberg reported on a surveillance camera data breach. The breach gave hackers access to live feeds of more than 150,000 security cameras located at companies, hospitals, prisons, police departments and schools. Major companies affected include Cloudflare Inc. and Tesla Inc. Not only that, hackers can view live feeds from mental hospitals, women’s health clinics.
This scenario paints a vivid picture of the risk of a security camera video data breach and the consequences of a privacy breach.


+ There are no comments

Add yours