{"id":9976,"date":"2017-10-19T06:00:01","date_gmt":"2017-10-19T14:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/19\/news-3749\/"},"modified":"2017-10-19T06:00:01","modified_gmt":"2017-10-19T14:00:01","slug":"news-3749","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/19\/news-3749\/","title":{"rendered":"Today\u2019s Predictions for Tomorrow\u2019s Internet"},"content":{"rendered":"<p><strong>Credit to Author: Rik Ferguson (VP, Security Research)| Date: Thu, 19 Oct 2017 13:00:36 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-125x85.jpg 125w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-640x438.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-440x301.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-380x260.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety.jpg 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Making predictions is a tricky business and in no area more so than in the area of rapidly developing technology. The pace of change continues to accelerate and the nature of innovation is such that entrepreneurs, as well as criminals are continually searching for \u201cthe next big thing\u201d to either benefit or to blight our lives.<\/p>\n<p>The way in which we access and consume information and digital resources is no stranger to change. What was first punched cards and ticker tape moved through CRT text only displays to graphical interface flat screens, mouse and keyboard to mobile devices with touch sensitive screens and haptic feedback. Not only that we left the text era, moved through the \u201cbrowser wars\u201d and then left browsers behind as we fully embraced mobile apps as a means of accessing information. The next great leap here is a perfect storm of a combination of factors. We see wide-scale adoption and integration of \u201cInternet of Things\u201d (IoT) connected devices, the \u201cassistant based economy\u201d comes into its own, and Augmented Reality (AR) and to a lesser extent Virtual Reality (VR) become more widespread as a Human\/Machine interface.<\/p>\n<p>Our homes, our transport, our smart cities, factories and healthcare (to name but a few) are steadily growing more interconnected. Innumerable transmitters and receivers from smart lightbulbs and fitness trackers to public transport and medical devices, collect, exchange and process information making autonomous decisions that affect our surroundings. Voice-activated personal assistants replace physical interfaces as we shape the world around us simply by issuing verbal commands. We blur the lines between the digital and the \u201creal\u201d through AR, data and the internet for the first time is no longer something apart, something we go away and consult; instead it is overlaid on our experience of the real world. We experience life through the filter of the web.<\/p>\n<p>It\u2019s an exciting future for sure but, as with everything, it is important to consider the potential \u201cmisuse case\u201d as well as the obvious benefits. We are talking about a future where attackers no longer hack a device that you use, but rather hacking your perception of reality.<\/p>\n<p>Data in general is gold dust to attackers, the more of it one can accumulate, the more tailored, credible and successful one\u2019s attacks can become. All too often devices destined to be connected and used online are designed and produced either by traditional organisations who have typically not had to pay attention to digital security during the manufacture and design process or by entrepreneurs who are more interested in getting their first product to market to be slowed down by some nagging security concern.<\/p>\n<p>It is becoming a significant challenge to regulatory bodies and to governments to ensure that safety standards, which have previously focused on the physical risks of a product and its components, accurately and clearly identify digital risks and outline the minimum safety criteria.\u00a0 Perhaps in the near future we can hope for a kind of digital kite-mark, offering at least some assurance that physical goods and their supporting infrastructure have been designed and built to a defined standard of digital security, that security was baked -in, not glossed over and that none of the small parts may cause choking.<\/p>\n<p>The need for this becomes ever more urgent as pretty much every \u00a3100+ good becomes connected in some way, in fact <a href=\"http:\/\/www.gartner.com\/newsroom\/id\/2621015\">Gartner estimated in 2013<\/a> that by the year 2020 (have you watched <a href=\"http:\/\/2020.trendmicro.com\/\">our award-winning web series<\/a> yet?) there will be more than 30 billion connected devices.<\/p>\n<p>Unless proper authentication of the integrity, provenance and validity of information can be designed into the processes, devices and decision-making of the future, we\u2019re not just opening up a new attack vector, we\u2019re opening up our lives, our enterprises and our homes.<\/p>\n<p>Watch my recent <a href=\"https:\/\/www.facebook.com\/Trendmicro\/videos\/10155288855152961\/\">Facebook Live segment<\/a> for more insight and connect with me on Twitter where I\u2019m <a href=\"https:\/\/twitter.com\/rik_ferguson\">@rik_ferguson.<\/a><\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/todays-predictions-tomorrows-internet\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Rik Ferguson (VP, Security Research)| Date: Thu, 19 Oct 2017 13:00:36 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-125x85.jpg 125w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-640x438.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-440x301.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety-380x260.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/online-account-safety.jpg 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Making predictions is a tricky business and in no area more so than in the area of rapidly developing technology. The pace of change continues to accelerate and the nature of innovation is such that entrepreneurs, as well as criminals are continually searching for \u201cthe next big thing\u201d to either benefit or to blight our&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10789,11063,13134,714],"class_list":["post-9976","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-consumer","tag-data-privacy","tag-internet-protection","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9976"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9976\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9976"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}