Technology

New Technology, New Threats

Each day, something new is created, or at least an advancement to an existing one is made. In terms of technology, the creativity is out if this world, both literally and metaphorically. We’ve seen the advancement from typewriters, to computers, to smart-phones, smart-tvs and so many other new things. These devices are here to simplify our lives, as well as make them complex from the rear-view.

Some may pose new threats to us, their destined users. Here are five technologically advanced devices that may, in a way, pose threats to us.

Self-Driving Cars:

These are fully automated vehicles that are connected to the internet, allowng users to enjoy stress-free driveless journeys. Car manufacturers have promised to unveil prototypes very soon. Audi, Mercedes, Mazda, Toyota and Nissan plan to release their self-driving or driverless cars in 2020.

Google-Autonomous-Toyota-Prius-front-three-quarter

The threats that will accompany these vehicles include cybercriminals, keeping track of the car’s location, breaching privacy. Also, they could be hacked into and their functions tampered with, putting the passengers’ safety at risk.

64-Bit Smartphones:

The 64-bit chips on smartphones, enable the device to run up to 42 times faster than and process graphics up to 56 times than the original smartphone. Any smartphone, running on a 64-bit processor, has increased processing power and allows the use of more powerful mobile apps.

There is a possibility that the threats that affect desktop computers, could as well affect these smartphones as well. If this is a reality, malware that affects these smartphones will shorten their battery life tremendously.

Videogames Technology:

They are connected peripherals and consoles that offer the users new ways to purchase and enjoy interractive media. The Oculus Rift, a virtual reality headset developed and manufactured by Oculus VR initiated a Kickstarter campaign in 2012 to fund the Rift’s development, after being founded as an independent company two months prior. The project proved successful, raising (US) $2.5 million. In March 2014, Facebook purchased Oculus for $2 Billion.

The threats posed include the fact that cybercriminals may create new online threats for these connected consoles. Valve‘s Steam Machine, that allows gamers to stream their games from their PCs to their big TV screens, might bring about new Linux-based threats.

Wearable Computer Technology:

Wearables are any computing device worn on the body. These computing devices can be worn, allowing for hands-free media recording and computing. They include smart glasses, smart watches among others. Approximately 10% of American smartphone users, will end up buying and using smart glasses. It is predicted that worldwide shipment of smart watches will reach 214M units by 2018.

Unless there are advanced security features, recording functions may be abused to violate the privacy of both the user and those around them.

Flexible 4K TVs:

They are ultra high-definition big screen TVs with curved screens that can be bent for optimal viewing angles. A 4K Ultra High Definition screen comes with 8,294,400 pixels, displaying four-times as many pixels as 1080p HDTVs. Research firms predict that flexible (Organic Light Emitting Diode) OLED screens will penetrate the display market at a rate of 40% in 2018.

The threats they pose are that they may be used to steal information using its face and/or screen recognition feature. Cybercriminals could also create ransom-ware that blocks the TV’s functions.

HE_Lifestyle-images_0000_Lifestyle-Image1_HE_Curved-OLED_77EG9700_4_-151231

Bottom Line:

New and exciting technology is on the horizon, potentially offering cybercriiminal new opportunities to strike. Improper usage of new technologies could result in personal data being in the hands of cybercriminals. Personal information including online banking information, location, electronic correspondence and facial identities could be at risk. Secure usage of new technologies must always be a priority, in order to ensure protection against data theft and injury

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s