{"id":4322,"date":"2014-11-24T11:49:40","date_gmt":"2014-11-24T16:49:40","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4322"},"modified":"2020-02-26T18:59:19","modified_gmt":"2020-02-26T14:59:19","slug":"cyberfuture-unfavorable-forecast","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/cyberfuture-unfavorable-forecast\/4322\/","title":{"rendered":"The Dangers of a Smart Future"},"content":{"rendered":"<p>Technology is progressing at full speed, becoming so inseparably weaved into our everyday lives that it is now seen as a commodity. However, not all breakthroughs are as awe-inspiring and jaw dropping as they may have been before. For example, the ever-growing data rates on mobile networks will not bring us any joy and can certainly leave a user with a \u201ccan it go faster?\u201d reaction.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/11\/05111743\/Cyberfuture-pessimistic-view-1-1024x768.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4863\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/11\/05111743\/Cyberfuture-pessimistic-view-1-1024x768.png\" alt=\"Cyberfuture-pessimistic-view\" width=\"1067\" height=\"800\"><\/a><\/p>\n<p>Upon seeing the newest generation of televisions, one is likely awed by the price or shape of the product, rather than the astonishing pixel density. Furthermore, no one even seems to care that mobile devices are now essentially capable of calculating the flight path of a spacecraft bound for Mars.<\/p>\n<p>It is not terribly surprising that Kim Kardashian\u2019s nude cover photos generated almost as much buzz as the landing of a probe on a comet 400 million kilometers from Earth. I have noticed a noteworthy side effect of the obvious technology overdose: we are significantly less cautious about our security and we do not give a second thought to the number of threats, both real and theoretical, that may become commonplace issues over the next 5 to 10 years as technology progresses.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>A #high-tech #future \u2013 is it safe to live in?<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F6cDV&amp;text=A+%23high-tech+%23future+%E2%80%93+is+it+safe+to+live+in%3F\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Interestingly, the more sophisticated and developed that technology and the Internet become, the more they put us, and our world, in jeopardy. So, exactly how dangerous might our future be? Let\u2019s take a look.<\/p>\n<h3>Estates and property<\/h3>\n<p>Today smart homes are still a luxury unknown to the common homeowner. But, with such omnipresent tech goliaths like Google and Apple in play, it may be only a matter of years until many of us are sitting in living rooms packed with smart devices. A mobile device alone could control the climate, lighting, home security system and a number of household appliances.<\/p>\n<p>The same concept applies to cars. Volvo and BMW are already offering basic car controls and surveillance capabilities via your smartphone or tablet. Over the course of the next several years, many \u2018middle-class\u2019 models will likely include these features as standard offerings. Furthermore, the cost of this on-board technology is not comparable to the cost of the entire car.<\/p>\n<p>Regardless of the immense progression of technology, some systems still have a lot in common with ordinary padlocks. For example, however robust a system may be, after a strong hit to the necessary points, the lock can be broken in an instant.<\/p>\n<p>Additionally, everything becomes even easier if a culprit has a key, or even an opportunity to get one. With a smartphone acting as a master key, a hacker can easily gain access to someone\u2019s home or car in hours, if not minutes. Recent demonstrations of <a href=\"https:\/\/www.kaspersky.com\/blog\/how-i-hacked-my-home\/\" target=\"_blank\" rel=\"noopener nofollow\">Smart Home<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/connected-car-weak\/\" target=\"_blank\" rel=\"noopener nofollow\">Smart Car hacks<\/a> serve as perfect examples.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Is It Possible to Hack My Car? Find out over at <a href=\"https:\/\/twitter.com\/kaspersky?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Kaspersky<\/a> Daily. <a href=\"http:\/\/t.co\/UOAMP2hb3K\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/UOAMP2hb3K<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/358292731195437057?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 19, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Similar demonstrations have shown that the <a href=\"https:\/\/www.kaspersky.com\/blog\/car_hacking_goes_mobile\/\" target=\"_blank\" rel=\"noopener nofollow\">hacking of electronics-enhanced homes and cars<\/a> is not necessarily done for the single purpose of theft. Having gained access to the central control system, a criminal can also manipulate processes. For example, they could potentially lock people inside, tamper with heating systems, change the composition of potable water, or even control a car\u2019s breaking and steering systems. All of these things can be executed remotely without direct access to the respective buttons, knobs or systems.<\/p>\n<h3>Money<\/h3>\n<p>\u201cClassic\u201d bank robbers that make use of weapons, hostages and getaway cars, are essentially a thing of the past. Criminals that know how to exploit the vulnerabilities in <a href=\"https:\/\/www.kaspersky.com\/blog\/faketoken-2014q1\/\" target=\"_blank\" rel=\"noopener nofollow\">web banking systems<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/the-state-of-mobile-payments-and-the-rise-of-content-driven-commerce\/\" target=\"_blank\" rel=\"noopener nofollow\">online payments<\/a> have replaced these \u2018old-school\u2019 robbers and will only become more skilled in the future.<\/p>\n<p>If you tend to carry cash while shopping, you can feel in control as you watch it leave your pocket and land in the cashier\u2019s box. Is this process equally as transparent when you merely touch your phone to a little black box? Doubtful. In this case, neither the buyer nor the seller can be 100 percent sure of how much money was charged and where it went.<\/p>\n<p>http:\/\/instagram.com\/p\/mYf2wOP0B3\/<\/p>\n<p>The growing use of digital payment systems instead of cash is a common trend and an early Christmas present for cybercriminals. Manipulating information is significantly easier than handling tangible objects. I am afraid that it has become necessary to exercise more persistent control on your bytes that may be flowing in different directions, as they are, in fact, your hard-earned paycheck.<\/p>\n<h3>Personal data<\/h3>\n<p>Long gone are the times when we stored our family memories in one big cardboard box in the closet and placed our movies, CDs and other items on flash drives and hard drives. Today, an increasing number of Internet users use cloud systems to store personal data. In many cases, the volume of data stored in the cloud surpasses the cumulative volume of all of the data stored on physical drives.<\/p>\n<p>It is plausible that in several years, local storage systems will become a relic of the past used solely by super-cautious users. There is logical thinking behind this trend: why pack limited Ultrabook capacities with content if you can simply store everything in the cloud and access your files from anywhere in the world, including your mobile device?<\/p>\n<p>However, there is a catch: as soon as our data (photos, documents, videos and even correspondence) lands in the cloud, it is no longer exclusively ours. From this moment on, <a href=\"https:\/\/www.kaspersky.com\/blog\/avoiding-the-terms-of-service-trap\/\" target=\"_blank\" rel=\"noopener nofollow\">ownership rights also apply to anyone who owns the cloud storage<\/a>. This was true 5 years ago and it will continue to be true moving forward.<\/p>\n<p>It seems as though there is no going back. In the next several years, corporations like Google will likely have very accurate digital \u2018models\u2019 of the millions of people accessing the Internet. Furthermore, it is likely that data about your health, lifestyle, locations and personal preferences will comingle with tons of \u2018selfies\u2019 and text messages. You do like to check in at posh venues and <a href=\"https:\/\/www.kaspersky.com\/blog\/fitness-trackers-privacy\/\" target=\"_blank\" rel=\"noopener nofollow\">wear a fitness band incessantly<\/a>, don\u2019t you?<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Fitness tracking apps &amp; wearables vs <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#privacy<\/a>. Guess who wins? <a href=\"https:\/\/t.co\/YjIZv2vQVa\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/YjIZv2vQVa<\/a> <a href=\"http:\/\/t.co\/LfMqqWGBES\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/LfMqqWGBES<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/528237276128501761?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 31, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>I cannot help but reference <a href=\"https:\/\/www.kaspersky.com\/blog\/watch-dogs\/\" target=\"_blank\" rel=\"noopener nofollow\">the \u201cWatch Dogs\u201d game<\/a> and the <a href=\"https:\/\/www.kaspersky.com\/blog\/traffic-light-attacks\/\" target=\"_blank\" rel=\"noopener nofollow\">\u201cDie Hard 4.0\u201d movie<\/a>. Both plot lines share similar essential elements including: a city managed by a unified command system, the inhabitants of the city, and a man with unlimited access to almost all electronic devices. Many of the things <a href=\"https:\/\/www.kaspersky.com\/blog\/watchdogs-expert\/\" target=\"_blank\" rel=\"noopener nofollow\">that happen in the movie and the game are now real<\/a>, which is, honestly, slightly terrifying.<\/p>\n<p>http:\/\/instagram.com\/p\/qecvpsP0Hn\/<\/p>\n<p>If you also add constantly evolving malware, unstoppable Internet penetration, and the total irresponsibility and unawareness of users to the equation, you will see our presumably organized, high-tech future turn into a dystopian world. In this world, a city can be plunged into chaos by the touch of a button, people practically belong to corporations, and a 15-year old hacker can steal billions of dollars just because the code of an online banking system happened to have a typo.<\/p>\n<p>Or, maybe it will not turn out this bad.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/E8zandvQvUc?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let&#8217;s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.<\/p>\n","protected":false},"author":214,"featured_media":4324,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1485],"tags":[849,628,426,43,97,630,45],"class_list":{"0":"post-4322","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"tag-future","10":"tag-internet-of-things","11":"tag-mobile-devices","12":"tag-privacy","13":"tag-security-2","14":"tag-smart-home","15":"tag-smartphones"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cyberfuture-unfavorable-forecast\/4322\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cyberfuture-unfavorable-forecast\/4397\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cyberfuture-unfavorable-forecast\/4861\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cyberfuture-unfavorable-forecast\/6753\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cyberfuture-unfavorable-forecast\/6846\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cyberfuture-unfavorable-forecast\/5597\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cyberfuture-unfavorable-forecast\/6753\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cyberfuture-unfavorable-forecast\/6846\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cyberfuture-unfavorable-forecast\/6846\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/future\/","name":"future"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4322"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4322\/revisions"}],"predecessor-version":[{"id":15951,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4322\/revisions\/15951"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4324"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}