Computer security focuses on data protection and privacy, highlighting the role of virtual currencies, machine learning and connected smart devices. The experts share their report on the cyber security issues that will be highlighted during the next year.
“Cyber attacks, data leaks and cases in which failures were reported in the control of the privacy of customers and users during 2018, make clear the challenge of ensuring the protection of assets. Therefore, the practical objectives of information security should be focused on safeguarding the confidentiality, integrity and availability of computer systems and data, “said Camilo Gutierrez, head of the Research Laboratory of ESET Latin America.
The “Trends 2019” report reflects on the importance and responsibility of companies when it comes to protecting the large volumes of data they have collected over the years. 2018 was highlighted in the history of data privacy, because the European Union (EU) made effective the General Data Protection Regulation (GDPR), which has implications for any organization (regardless of its location) that handles personal information of EU citizens. Other parts of the world will take the path of the EU, and also analyze the possibility of the existence of a global law.
In terms of malware, the report highlights that used for illegal cryptocurrency mining for 2019. Although it was not the main topic of 2018, the illegal mining of cryptocurrencies had a growth in terms of propagation (among which the practice known as cryptojacking stands out), which will surely occupy a prominent place in the scenario of threats for next year.
On the other hand, the role of smart homes is highlighted through the use of voice assistants. The existing possibilities that criminals can take advantage of IoT devices interconnected in the home and thus invade privacy, in addition to highlighting the role of users linked to the amount and type of data that is shared with these devices.
In this context, the report has a section dedicated to Machine Learning (ML). This technology, which is based on the generation of information from the automated analysis of large volumes of data, also gained space in the field of cyber security. Although the algorithms used could allow developers to identify current threats in a more efficient way, they can also be used by malicious actors to develop automated tasks and obtain information on vulnerable targets. The report explains the potential of this technology for both attackers and those in charge of security.