One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8434556
Date de publication 2024-01-04 11:00:00 (vue: 2024-01-04 18:09:07)
Titre VR et AR: risques de sécurité potentiels à préparer
VR and AR: Potential security risks to be prepared for
Texte The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Virtual reality (VR) and augmented reality (AR) technologies capture everyone’s imagination with use cases and an unlimited potential for future implementations. While these concepts have been around for decades, they continue to be buzzwords with a fascinating flavor of science fiction. The truth is that the VR and AR combination is close to mainstream adoption these days, with plenty of examples of successful projects creating ripples in ecommerce, entertainment, and many other industries. According to Statista, the global virtual reality and augmented reality market is worth $32.1 billion in 2023, and analysts predict it will exceed $58 billion by 2028. These appear to be conservative estimates, with another study forecasting growth up to a whopping $252 billion in the next four years. Whereas these technologies aren’t susceptible to major malicious exploitation at this point, their skyrocketing popularity might encourage threat actors to come up with viable attack vectors in the near future. This article highlights some of the current security and privacy concerns that stem from the rising adoption of VR and AR technologies. 1. Eye tracking Many people consider eye tracking in VR to be truly revolutionary. The logic of such a perspective is clear: this tech enhances the accuracy of virtual interaction and takes the user experience to a new level by helping interpret people’s emotions. It is also believed to give the security of VR systems a boost because eye scanning can refine biometric verification in the login workflows. As useful as it is, glance tracking could also expose users to hidden monitoring and other privacy risks. For example, VR game makers may be tempted to embed advertisements in their products, similar to how sponsored information is shown in mobile games. If this is the case, eye tracking would be a perfect instrument for advertisers to figure out which ads draw your attention and which ones you ignore. As per analysts’ findings, 95% of decisions to buy a product occur in the subconscious mind. By snooping on a user’s visual response, marketers may be able to derive conclusions regarding their preferences and dislikes. The flip side is that such a technology could potentially play into unscrupulous parties’ hands as a powerful surveillance instrument. 2. Blackmail and harassment Adult entertainment is one of the most popular areas of the virtual reality industry. According to a relevant study, the VR adult content market will see a staggering rise from $716 million in 2021 to $19 billion in 2026. Cybercriminals may try to cash in on this hype by engaging in what’s known as “sextortion”. The idea is to deceive users into thinking that the malefactors have some embarrassing evidence of their private pastimes and instruct them to send money in exchange for not disclosing this information. In some cases, the scammers may even include a valid password for one of the user’s web accounts so that the blackmail message appears true. Bear in mind that they obtained these authentication details from a large-scale data breach that occurred in the past. While these emails contain
Envoyé Oui
Condensat $19 $252 $32 $58 $716 “silver “spatial 2019 2021 2023 2024 2026 2028 able above abuse accessible according accounts accuracy across actors actual actually add additionally adhere adopt adoption ads adult advantage advertisements advertisers afterward allow also alter always amazing analysts analysts’ announced another any anyone’s app appear appearance appears apple apple’s application apply ar: are area areas aren’t around article artificial at&t attack attempts attention audibly augmented authentication author available avatars avoid awareness based bear because become been before believed belong best better biggest billion biometric blackmail boost breach breakthrough built bullet” but buy buying buzzwords call can capture car case cases cash cause caution cautious celebrity certainly certifications characteristics check clear: click clicking close coexists coin collect collection combination combined come comes common communities companies computing” concepts concerns conclusions conflicts conservative consider contain content continue core could create creating credentials criminals crooks cryptocurrency current cybercriminals data day days decades deceive decide decisions dedicated deepfake deepfakes deleteme deposit derive details device devices different digital direction disable disclosing dislikes displays distant distinguish distort documents does doesn’t don’t download downside draw drivers easy ecommerce ecosystem effect effective else emails embarrassing embed emotions empty enable encourage endorse endorsement endorsements engage engaging enhances entertainment entirely environment environments especially estimates even every everyone’s everything evidence evolving exactly examining example examples exceed exchange exercise experience experiences exploitation expose extra eye facebook facial factor fail fake far fascinating faux fiction figure figuring financial find findings fine flavor flip focus follow following footage footprint forecasting forged forth forward four fraudulent from front frustrating functionality future gadget game games general genuine giant give glance global goes going good grow growth hack hacking handle hands happen harassment hardware harm harvested has have head headlong heed helping here hidden highlights holds home how however hype ico idea identities identity ignore illusion image imagination imagine immersive imminent imperative impersonating implementations implications impostor include increasingly industries industry information initial initiative inspect instance instruct instrument intact integrate intelligence intensive interaction international internet interpret invest it’s its join june keep know known large largely last latter layer lenses level like likely link lives location logic login look mainstream maintain major make makers makes malefactors malicious manage many mapping market marketers matter may measures media mentioned message method might million mimic mind mindful minimum mobile modifying money monitoring more most motion mounted movements movie much near necessity never new news next not nothing objects obtained occur occurred offenders offering one one’s ones online onto opt orchestrated organizations other out overprivileged overshadow overshare parties parties’ password passwords past pastimes people people’s per perfect permissions perpetrate person personal perspective peruse phony physical pitfalls play plenty plunge point policies political popular popularity positions possible post potential potentially powerful practice practices precision predicaments predict preferences prepared print privacy private pro product products progress projects promise proper prove provided provisions pseudonyms public publicly purchasing ramifications rapidly read real realistic reality reasonable receiving recognition recommendations referred refine refrain regarding regular relevant reliable removal reputable require requires resolve response responsibility reuse revo
Tags Data Breach Hack Tool Threat Mobile Prediction
Stories
Notes ★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: