{"id":5118,"date":"2014-11-25T10:26:31","date_gmt":"2014-11-25T15:26:31","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=5118"},"modified":"2020-02-26T15:10:40","modified_gmt":"2020-02-26T15:10:40","slug":"the-dangers-of-the-smart-future","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/the-dangers-of-the-smart-future\/5118\/","title":{"rendered":"The dangers of the smart future"},"content":{"rendered":"<p>Technology is progressing at a frightening pace and is now part and parcel of\u00a0our everyday lives. However, despite all the\u00a0breakthroughs, everything is not as it seems.\u00a0<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/11\/05195922\/Cyberfuture-pessimistic-view.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5120\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/11\/05195922\/Cyberfuture-pessimistic-view.png\" alt=\"Cyberfuture-pessimistic-view\" width=\"1024\" height=\"767\"><\/a><\/p>\n<p>People are no longer impressed by high resolutions or quad-core processors inside your phone yet despite this, we still don\u2019t take any extra care when it comes to security. \u00a0Our technology has advanced a great deal but our attitude to security is still stuck in the 1990\u2019s.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Hi-tech #future \u2013 is it safe to live it?<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FRjV7&amp;text=%23Hi-tech+%23future+%E2%80%93+is+it+safe+to+live+it%3F\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Curiously, the more technology advances. the more dangerous it can become. \u00a0Let\u2019s take a look at some examples:<\/p>\n<h3>Estate and property:<\/h3>\n<p>Smart homes are still something of an oddity but are becoming more common-place as time moves on. \u00a0With the likes of Apple, Google and Amazon all looking to create more connected devices, it won\u2019t be long before all our homes are wired up.<\/p>\n<p>The same goes for cars: many\u00a0car manufacturers are already offering basic car control (such as lane assist) and surveillance capabilities, and in\u00a0a few years, these will more than likely be standard in all newly built cars.<\/p>\n<p>Yet, regardless of how fancy or advanced these are; they all have something in common with the standard padlock: they can all be broken. \u00a0Recent examples show that both\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/how-i-hacked-my-home\/\" target=\"_blank\" rel=\"noopener nofollow\">Smart Home<\/a>s\u00a0and <a href=\"https:\/\/www.kaspersky.com\/blog\/connected-car-weak\/\" target=\"_blank\" rel=\"noopener nofollow\">smart cars<\/a>\u00a0can be broken into.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Is It Possible to Hack My Car? Find out over at <a href=\"https:\/\/twitter.com\/kaspersky?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Kaspersky<\/a> Daily. <a href=\"http:\/\/t.co\/UOAMP2hb3K\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/UOAMP2hb3K<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/358292731195437057?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 19, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Similar experiments showed that <a href=\"https:\/\/www.kaspersky.com\/blog\/car_hacking_goes_mobile\/\" target=\"_blank\" rel=\"noopener nofollow\">hacking of electronics-enhanced homes and cars <\/a>is not necessarily done for a single purpose of theft. Having gained access to the central control system, criminals are able to manipulate processes such as locks, heating systems or even control the car\u2019s breaking or steering.<\/p>\n<h3>Money<\/h3>\n<p>The classic bank robbery (think balaclava\u2019s, guns and police chases) is almost extinct as we know it. \u00a0Instead, they\u2019ve been\u00a0replaced by online robberies with criminals using vulnerabilities in <a href=\"https:\/\/www.kaspersky.com\/blog\/faketoken-2014q1\/\" target=\"_blank\" rel=\"noopener nofollow\">web banking systems<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/the-state-of-mobile-payments-and-the-rise-of-content-driven-commerce\/\" target=\"_blank\" rel=\"noopener nofollow\">online payments<\/a>. And it\u2019s here to stay.<\/p>\n<p>The problem is only set to get worse. \u00a0Think of contactless payments: When you carrying cash, at least you have full control of that money, seeing it leaving your pocket and and passing over to the cash register. Do you know who handles your money when you make a contactless payment? \u00a0Do you know what happens to it after you tap your card?<\/p>\n<p>http:\/\/instagram.com\/p\/mYf2wOP0B3\/<\/p>\n<p>And with Christmas just around the corner, this presents an even juicer target for cyber-criminals. \u00a0Just remember: manipulating information is a lot\u00a0easier that dealing with real objects.<\/p>\n<h3>Personal data<\/h3>\n<p>The times when we used to store all our family memories in the shoe-box in the attic are long gone. \u00a0These days, most people store photos, videos and music on their computer and a growing portion of people are now adopting cloud-computing to store their precious memories.<\/p>\n<p>The problem is that, once you upload the images to the cloud, a lot of the time you\u00a0also\u00a0revoke your\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/avoiding-the-terms-of-service-trap\/\" target=\"_blank\" rel=\"noopener nofollow\">ownership rights<\/a>. \u00a0Why does this happen? \u00a0The main reason is that advertising companies want to create\u00a0detailed models of potential customers so that they can make money. \u00a0After all, that cloud computing storage can\u2019t be free forever.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Fitness tracking apps &amp; wearables vs <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#privacy<\/a>. Guess who wins? <a href=\"https:\/\/t.co\/YjIZv2vQVa\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/YjIZv2vQVa<\/a> <a href=\"http:\/\/t.co\/LfMqqWGBES\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/LfMqqWGBES<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/528237276128501761?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 31, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Another thing to consider with our increasingly connected world is cyber-disruption: \u00a0Games like the recent\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/watch-dogs\/\" target=\"_blank\" rel=\"noopener nofollow\">Watch_Dogs<\/a>\u00a0and the\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/traffic-light-attacks\/\" target=\"_blank\" rel=\"noopener nofollow\">Die Hard 4.0<\/a> movie illustrate the point well. Whilst they\u2019re just movies, they show us the potential that can happen if somebody was able to \u201chack the system\u201d. Don\u2019t think it\u2019s possible? \u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/watchdogs-expert\/\" target=\"_blank\" rel=\"noopener nofollow\">Think again<\/a>.<\/p>\n<p>http:\/\/instagram.com\/p\/qecvpsP0Hn\/<\/p>\n<p>Add to this mix constantly evolving malware, the internet of things and lack of awareness and you can\u00a0see where we may be heading\u2026<\/p>\n<p><strong>But does it have to be that bad?<\/strong><\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/E8zandvQvUc?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology is progressing at a frightening pace and is now part and parcel of\u00a0our everyday lives. However, despite all the\u00a0breakthroughs, everything is not as it seems.\u00a0 People are no longer<\/p>\n","protected":false},"author":214,"featured_media":5127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[842,636,434,43,97,638,45],"class_list":{"0":"post-5118","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-future","10":"tag-internet-of-things","11":"tag-mobile-devices","12":"tag-privacy","13":"tag-security-2","14":"tag-smart-home","15":"tag-smartphones"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/the-dangers-of-the-smart-future\/5118\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/future\/","name":"future"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5118"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5118\/revisions"}],"predecessor-version":[{"id":19162,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5118\/revisions\/19162"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/5127"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}