The Future of Cyber ​​Security: Essential Connections and Security “By PlayStation”

(Helsinki, Finland) – Society legend CRO (Chief Research Officer) Miko Hyponen predicts that “what we have in our time will be the first generation to be online. This will mark our generation forever.”

In the future, he predicts a toxic hell due to complete economic and social dependence on Internet connections, weak Internet of Things (IoT) devices and the proliferation of “walled garden” devices.

At the June 1 SPHERE Cybersecurity conference, WithSecure Research Director Mikko Hyppönen mentioned a number of themes that could have a major impact on the security of future generations, just as connected devices are managed and protected by professionals and the general public.

Dependence on connection

“We are living through a technological revolution, even if at times its dimensions are difficult to measure,” Hyponen said. “The Internet is the best – and worst – thing that has ever happened in our time.”

Cybersecurity experts believe that future generations will depend on electricity as much as we do today on connectivity. If the power grid fails due to a solar storm, for example, Hyponen said that many countries will feel the effects and that the source of this energy could collapse because of the dependence we have built on the screw.

“Today, the Internet is important but not important. Electricity is very important, Finland will not survive without electricity,” he explained when Russia announced a few weeks ago that it would cut off power supplies to its Finnish neighbor.

And he predicted that the Internet is important today, it has not reached a stage where it is seen as important for the functioning of society, as opposed to electricity. However, the day may come when connectivity will power everything in society, from the economy to energy and food production, and without it society “cannot function.”

“Connectivity will be like lightning” assures him that he is “forever” in cyber security. He was actually the No. 6 employee of WithSecure, founded in 1988.

A dynamic that has a huge impact on security, as Internet-connected systems are constantly under attack, new vulnerabilities are discovered and hackers continue to develop their tactics.

“The more developed a nation is, the weaker it is,” Hyponen noted.

Direct toxic attachments

“In 15 to 20 years, we’re going to look at today’s decisions that are bothering us and thinking about what we were thinking when we decided to connect everything to the same public Internet,” explains Miko Hyponen.

“Why? Because it’s not expensive.” “Consumers are looking for prices above all else, and therefore systems are not secure.”

The leader must be talking about the millions, if not billions, of IoT devices connected to the Internet today.

Mr Hyponen pointed to problems with devices whose firmware could not be updated – a scenario the executive called “IoT’s asbestos”.

The similarity with asbestos comes from the fact that this insulating material was widely used in the construction sector, a few years later it was realized that it is very dangerous to health.

Similarly, we are rapidly seeing a toxic mix of Internet-connected devices that are not going to be updated, puzzled with security holes that attackers could use to create botnets, for example.

Cybercrime is a growing business and hackers should be respected

According to Hyppönen, more than 98% of the malware samples analyzed daily by WithSecure come from money-making cybercriminal gangs.

The basics of his enemies have evolved since he started dealing with them on floppy disks. Hackers are now building their fortunes from ransomware and cryptocurrency, leading to a current – and future – situation where very rich criminals are able to invest heavily in new attacks.

“It’s a game-changer,” says Hyponen. “The richest and most powerful cyber criminal gang, [par exemple, Conti] We have the manpower to carry out large-scale attacks. “

And mentioning the existence of bogus cyber security companies, such as Combi Security, has created cybercriminal groups to infiltrate their future victims through bogus audit operations.

From this perspective, “we do not like cybercriminals, but we must respect them” and their cunning, he said. And to take an example: “The first time I heard about Bitcoin,” he said, was when I saw the malware that Bitcoin was digging. I didn’t know what he was doing or why he was doing it. “

Now, equipped with money and knowledge, these “cybercrime unicorns” can therefore recruit qualified personnel and invest “a lot of money” in new technologies for their weapons portfolio. Cyber.

Fighting in the arena of artificial intelligence

As a result, the next step in the advancement of cybercriminals will be the adoption of artificial intelligence (AI) and machine learning (ML) technology.

Mr Hyponen believes that in the future, hackers will move from hiring cybersecurity specialists to AI professionals – and they have not been able to do so yet because of the lack of talent in this emerging field.

However, as the number of people pursuing a career in AI increases, barriers to entry are reduced and the AI ​​structure becomes easier to use, “criminal gangs can also start competing for these skills” because they have the capital to do so.

Therefore, AI will now accept the manual work done by cyber criminals.

During phishing campaigns, people now work by hand to redirect links, inject malware, infiltrate or even install. But tomorrow is the AI ​​example that will take care of all this. “

Cyber ​​security transforms the battlefield into a conflict between “automated and automated”, from a battle between hackers ‘manual work and cyber security actors’ automatic defenses.

“The only thing that can stop bad AI is good AI,” Hyponen noted

Security “by PlayStation”

Another significant change in the world of technology, which is already underway but which may still be evolving, is what the leader calls “security by PlayStation”.

When you buy a game console, for example a PlayStation 5 or an Xbox, you buy a computer but do not have the right to customize it or launch programs that the seller does not approve. Of course, it is possible to “jailbreak” a PlayStation and run unsigned code, but it is a difficult task that the average gamer will not accept.

A game console, by itself, is a computer used for limited activities. With Apple’s iPad, Android smartphones and Chromebooks in place, companies have already begun to provide their employees with controlled devices – and according to Hyponen, we should expect IT systems to become more common for end users with limited capabilities. .

Leave a Comment