Just In
- 8 hrs ago HONOR Pad 9 With Bluetooth Keyboard Up For Grabs At Rs 22,499 in India
- 8 hrs ago Report: Apple’s Foldable iPhone May Get Cancelled
- 9 hrs ago Deal Alert: Grab the Samsung Galaxy S23 Ultra for Under ₹90,000 on Flipkart – Here’s How
- 11 hrs ago OPPO F25 Pro New Coral Purple Colour Variant Launched in India; Where to Buy?
Don't Miss
- Sports Rajasthan Royals Rising Star Riyan Parag's Redemption Story Takes Center Stage in IPL 2024
- Lifestyle Aditi Rao Hydari's 8 Tips for Glowing Skin: A Celebrity Skincare Routine Unveiled, Bonus Tips Included!
- Movies Krishna Mohini Promo: Fahmaan Khan- Debattama Saha's New Show Looks Promising, To REPLACE THIS Drama?
- Finance 1,190% Dividend Payout Soon: UBS Optimistic On Electrical Stock ABB, Recommends Buy For Rs 7,550 TP
- News Jailed Gangster-Turned-Politician Mukhtar Ansari Dies Of Heart Attack
- Automobiles Xiaomi SU7 Electric Car Launched – May End Apple Inc.
- Education RSMSSB Junior Instructor Recruitment 2024; Apply online for 2500 Posts, Check out for more details
- Travel Explore Tamil Nadu's Diverse Wedding Venues
Cybercriminals to exploit AI technology for data breaches in 2018: Symantec
Cyber-criminals will continue to exploit the poor security settings and management of home IoT devices.
Technology is never constant and is constantly. Against such backdrop, global cybersecurity leader Symantec has now stated that cyber-criminals will use Artificial Intelligence (AI) and Machine Learning (ML) to explore victims' networks in 2018.
Furthermore, the Internet of Things (IoT) devices will be hijacked and used in Distributed Denial of Service (DDoS) attacks, warned Tarun Kaura, Director, Product Management, APJ, Symantec. "2018 is the first year where we will see AI versus AI in a cybersecurity context. Cybercriminals will use AI to attack and explore victims' networks, which is typically the most labor-intensive part of the compromise after an incursion," Kaura said in a statement.
This year, we have already witnessed massive DDoS attacks using hundreds of thousands of compromised IoT devices in people's homes and workplaces to generate traffic. "This is not expected to change with cyber-criminals looking to exploit the poor security settings and management of home IoT devices," Kaura added.
According to the security firm, inputs and sensors of these IoT devices will also be hijacked, with attackers feeding audio, visual or other faked inputs to make these devices do what they want rather than what users expect them to do. Beyond DDoS attacks and ransomware, home IoT devices will be compromised by cyber criminals to provide persistent access to a victim's network.
"Home users generally do not consider the cybersecurity implications of their home IoT devices, leaving default settings and not vigilantly updating them like they do with their computers," Kaura said.
Persistent access means that no matter how many times a victim cleans their machine or protects their computer, the attacker will always have a backdoor into victims' network and the systems that they connect to.
When it comes to Blockchain technology, instead of attacking Blockchain technology itself, cybercriminals will focus on compromising coin-exchanges and users' coin-wallets since these are the easiest targets and provide high returns.
Supply chain attacks have been a mainstay of the classical espionage and signals-intelligence operators, compromising upstream contractors/systems/companies and suppliers. "They are proven to have a high-level of effectiveness, with nation-state actors using a mix of human intelligence to compromise the weakest link in the chain," Symantec said.
Source: IANS
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
1,39,900
-
1,29,900
-
79,900
-
65,900
-
12,999
-
96,949
-
16,499
-
38,999
-
49,999
-
30,700
-
23,990
-
1,25,999
-
36,999
-
38,999
-
1,17,840
-
35,000
-
23,960
-
82,510
-
11,999
-
25,999