Educational CyberPlayGround ®

Future Trends in Computing

SEE BIG DATA

2018

Get off the internet for a few minutes, take a break.

No one is safe: About 28% of the 962 industrial companies surveyed have faced targeted attacks in the last 12 months.

Threat model was different, 20+ years ago they were implemented for performance. 10+ years ago for power. Now security matters. A design flaw was found in Intel's microprocessors, causing a "redesign" of Linux and Windows kernels to get rid of the "chip-level security bug,". Intel chips dating as far back as a decade are in jeopardy. However, a variety of processors and operating systems (OS), not just those from Intel, are at risk. Norman Feske (founder of @GenodeLabs OS framework) discusses impact of #Meltdown & #Spectre attacks. About speculative execution vulnerabilities in ARM-based and Intel CPUs. Kudos to @solardiz and @paxteam for inventing a defense technique that protected computers against mainstream attacks for almost 20 years. The start of all this was @anders_fogh's blog post: (link: https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/) cyber.wtf/2017/07/28/neg… He deserves credits on this! #meltdown #intelbug #fuckwit #kaiser #kpti

@rootkovska And that's not the only thing that's unacceptable about #IntelME: blatant open source licence infringement is another dimension of wrong, for example. But there's plenty more reasons to be worried about security, too. E.g. it is absolutely unacceptable there exists an embedded system (#IntelME) within our processors which has (hardware) DMA capability to access host memory. It is merely irrelevant if/how the _current_ ME firmware makes use of it. E.g. it is absolutely unacceptable there exists an embedded system (#IntelME) within our processors which has (hardware) DMA capability to access host memory. It is merely irrelevant if/how the _current_ ME firmware makes use of it.

"Security Through Distrusting" by @rootkovska One of the examples: How to use #Bitcoin's Multisig to trigger operations via different devices. $BTC

Cybercrimes are expected to cost more than $6 trillion globally by 2021, and 2018 cybersecurity spending is expected to reach $93 billion.

Internet of Things (IoT) devices are the worst. 24 billion devices by 2020 and $6 trillion in investment between 2015-2020. Higher estimates have around 50 billion connected devices — or an average of 6.58 devices per person — by 2020. 24 billion devices have a huge security dilemma and 50 billion devices have an even bigger one. IoT devices and algorithms are ready to reap and harness the 2.5 quintillion bytes of data already generated daily, but these benefits could be dramatically offset by the lack of adequate security. After all, device security often takes a backseat to time to market pressures and societal demands, which is currently causing around three-quarters of IoT devices to be in "failing" condition.

Most Promising Areas of Investment Picked By Computer
Ironically, the VC world, having fuelled the creation of computing, is one of the last areas of business to introduce computing to decision-making.

  • eye authentication is now of real interest to both telcos and banks toincrease user trust and safety in financial transactions.
  • secure mobile solution is being adopted by US government agencies