First Midwest BankFirst Midwest Bank logoArrow DownIcon of an arrow pointing downwardsArrow LeftIcon of an arrow pointing to the leftArrow RightIcon of an arrow pointing to the rightArrow UpIcon of an arrow pointing upwardsBank IconIcon of a bank buildingCheck IconIcon of a bank checkCheckmark IconIcon of a checkmarkCredit-Card IconIcon of a credit-cardFunds IconIcon of hands holding a bag of moneyAlert IconIcon of an exclaimation markIdea IconIcon of a bright light bulbKey IconIcon of a keyLock IconIcon of a padlockMail IconIcon of an envelopeMobile Banking IconIcon of a mobile phone with a dollar sign in a speech bubbleMoney in Home IconIcon of a dollar sign inside of a housePhone IconIcon of a phone handsetPlanning IconIcon of a compassReload IconIcon of two arrows pointing head to tail in a circleSearch IconIcon of a magnifying glassFacebook IconIcon of the Facebook logoLinkedIn IconIcon of the LinkedIn LogoXX Symbol, typically used to close a menu
Skip to nav Skip to content

Cybersecurity experts warn that these 7 emerging technologies could put your online security at risk

With three months left in the year, 2019 has already seen an exceptional number of major cybersecurity incidents. 

An avalanche of hacks, breaches, and data exposures have rattled government agencies and private companies alike, and the victims are typically consumers or citizens.

An attack earlier this summer that targeted Uighur Muslims and Tibetans in China exposed flaws in systems like iOS that were previously thought to be impenetrable. Ransomware attacks have swept government agencies across the US, debilitating them for days on end.

Hackers are becoming increasingly innovative with the techniques they use to access sensitive data. In many cases, new technologies that have just hit the market are boons to hackers, who capitalize on people's lack of understanding of how those technologies work, as well as undiscovered holes in new systems' security.

In turn, cybersecurity experts are highlighting certain technologies that have been repeatedly exploited by hackers, calling for heightened awareness of their vulnerability to bad actors. 

Here are seven emerging technologies that pose threats to modern cybersecurity.

AI-generated “deepfake” audio and video can help hackers scam people.

 

Samantha Lee/Business Insider

"Deepfake" technology — which allows people to manipulate video and audio in a way that looks very real — has made leaps and bounds in recent years Indeed, anyone familiar with face-swapping filters on Snapchat or Instagram has witnessed a rudimentary version of deepfake technology firsthand.

As deepfakes become increasingly sophisticated and hard to tell apart from the real thing, cybersecurity experts worry that hackers could use the technology for phishing scams, wherein hackers pose as somebody else to get victims to hand over private information.

Some companies are working on AI-driven software to detect deepfakes, but these efforts are still in the early stages of development.

Quantum computing could easily crack encryption.

In September, Google announced that it had achieved "quantum supremacy," meaning it built a functioning quantum computer — a feat that had been theorized but never achieved. The announcement was a major milestone in the field, but the technology is still nascent and doesn't have many practical applications yet.

Nonetheless, the announcement raised immediate concerns for security watchdogs, who say that quantum computers — which channel aberrant phenomena from quantum physics into computing power — could easily break encryption currently used in products seen as airtight, like blockchain or credit card transactions.

While quantum computers haven't been used to this end by hackers yet, experts worry that the technology could continue to advance in years to come, threatening encrypted data sets that organizations like banks protect for decades.

5G networks will bring faster speeds, and a host of new vulnerabilities.

5G is beginning to roll out as the next generation of wireless network, promising faster wireless internet with the bandwidth to support more devices.

But security watchdogs warn that the shift to 5G could give hackers new inroads to target systems that use the network. The increased speed could make 5G devices more susceptible to DDoS attacks, which aim to flood victims' servers with traffic in order to overwhelm and shut them down, according to Security Boulevard.

The “internet of things” creates new threats to security infrastructure.

 

Reuters/Robert Pratta

The "internet of things," or networks specifically made for internet-connected devices and appliances to communicate with each other, is now used widely across industries.

As this technology becomes more common, however, hackers are increasingly finding vulnerabilities in IoT networks and using them to compromise companies' operations. In one high-profile example, hackers breached the network used by Verizon's shipping vessels and were able to track where the company was shipping its most valuable cargo.

Hackers are using artificial intelligence to outsmart cybersecurity systems.

As artificial intelligence makes leaps forward in sophistication and versatility, hackers are already using it to get around cybersecurity defenses. Hackers can use AI-driven programs to quickly scan networks to find weak points, or predictive text functions to impersonate insiders and trick targets into handing over sensitive information.

"We do imagine that there will be a time when attackers use machine learning and artificial intelligence as part of the attack. We have seen early signs of that," Nicole Egan, CEO of cybersecurity firm Darktrace, told the Wall Street Journal.

As companies outsource high-tech functions to third parties, supply-chain hacks proliferate.

 

Justin Sullivan/Getty Images

A growing number of recent data breaches came about as the result of "supply chain" hacks, wherein break into a company's software that's in turn distributed to clients.

This trend is the result of an increasing number of companies and agencies outsourcing services to third parties, which widens the range of potential victims for hackers to target. According to a recent report by cybersecurity firm Aon, the number of targets that are potentially vulnerable to supply chain hacks is growing exponentially. 

More operational functions are moving online, which is good news for hackers.

Companies and government agencies are maximizing the number of operations that use internet connectivity, drawn in by the efficiency the internet brings.

But doing so comes at a security cost — with more internet connectivity, the "attack surface" that's vulnerable to hacks becomes wider, lowering an organization's defenses, according to the Aon report. If hackers compromise one internet-connected facet of an organization, it's easy for them to laterally hack other devices on the network.




This article was written by Aaron Holmes from Business Insider and was legally licensed through the NewsCred publisher network. Please direct all licensing questions to legal@newscred.com.

Subscribe for Insights

Subscribe