Archive

October 2022

Browsing

Last week, I was in New York for two events: one for Lenovo’s advisory council, which I can’t talk about, and another for BlackBerry’s security conference, which I can and will discuss.

At the BlackBerry event, instead of his traditional entertaining keynote, BlackBerry CEO John Chen interviewed Victor Zora, who shares responsibility for Ukraine’s cyber defense. It was a fascinating conversation.

It was so interesting that Ukraine, due to its unfortunate conflict with Russia, has become a malware and security analyst magnet. Not only is Russia deploying some of the most aggressive malware products out there, but it also has some of the best cybersecurity analysts. A thousand from Blackberry are working to mitigate these attacks, spreading this knowledge around the world so that other countries can benefit and supporting Ukraine in an important, but not massive, talk. .

In short, while the conflict in Ukraine is terrifying for the people who live there, it is also doing so so that we are not compromised by similar attacks in the future.

Let’s explore this unique security dynamic between Ukraine and BlackBerry this week as it should confirm BlackBerry as the company known for cybersecurity. Then we’ll close with my product of the week, my new favorite laptop, the incredibly unique Lenovo ThinkBook Plus Gen 3 Dual-Screen Laptop.

battlefield test

I spend more time than I should on Quora, where we constantly discuss possible future wars and conflicts. Some of the military discussions on that forum are fascinating.

One of the common themes is that America’s current advantage in any conflict is actual war experience. We have fought many of them and as a result, we have more people who have developed related skills. Simulation and training drills are fine, but as Russia is figuring out how armies behave when actual bullets are fired, it may differ significantly from their behavior in artificial conflicts.

This is not only true of people. Defense systems designed for one type of conflict, such as tanks and fighter aircraft, may not perform well when technological advances or battlefields differ from what these systems were designed for. Even when the designs are perfect, the processes around them may not be enough to support these systems once they are in conflict.

So actual battle testing becomes a game-changer when it comes to warfare, and current wars are increasingly being fought in cyberspace.

Ukraine and Blackberry

Blackberry responded aggressively to the Russian threat and quickly stepped in to aid Ukraine as it already had enough resources in the country. But while BlackBerry is an important part of this effort, according to Viktor Zora, it is backed by a large number of volunteer security experts inside and outside Ukraine and helps to better protect the country and against an increasingly failed cyberattack rate. Focuses on security.

This vast collaboration between companies and countries has formed an unmatched cyber-defense cooperation, which could be the largest long-term cyber defense worldwide, which is especially important right now because weapons do not respect borders.

Cyber ​​weapons have a bad tendency to transcend conflicts and infect governments and companies in other parts of the world. Therefore, this unheard-of cooperation on defense provides much stronger protection than would otherwise be the case.

In addition, teamwork between companies and countries potentially creates momentum for law enforcement to cross borders and hold hostile actors accountable. The inability to find and attribute the source of the attack is often the biggest problem in mitigating attacks, especially ransomware. It reminds me somewhat that the problems of the Wild West in American criminals can easily cross the border to avoid prosecution. There were similar issues in Europe before the EU came into existence.

In short, this tremendous effort is increasing cyber resilience in Ukraine – and globally – making us all safer by creating an unprecedented cyber security network and response system that would have been far more advanced and capable if this conflict had not occurred.

Cyber ​​Security and Politics

After Victor Zora, Representative Tony Gonzalez, R-Texas took the stage. Gonzalez, a leading cybersecurity expert in the military, said something that I think is worth repeating: There are two types of politicians in America, those who put their parties first and those who put their country and their jobs first. Huh.

Congressman Gonzalez is a big believer in cyber security. Instead of misbehaving with someone on the other hand, they talked about the need to cooperate, cooperate and feel that they are there to do one thing, not to mistreat the people in another party with whom they work. To do that they need to work. I was impressed, and I am not often influenced by American politicians.

Another interesting point he said is that in the US, the Department of Defense is both the best and the worst at cyber security. Best because it will invest massively in security, but at worst because it has a large number of policies that make it impossible to respond rapidly to a threat.

The conflict in Ukraine provides a perfect example of why it is important that defense organizations not only cooperate and invest, but also be agile and rushing to identify and mitigate threats. As Tony Gonzalez is finding, the policies that are put in place are extremely difficult to change.

One of the stories I heard when I was young was the Zulu rebellion and how a bunch of natives with spears took out a good portion of the British army with their then modern weapons because the policies of the British army paralyzed them Had given.

The British Army had focused on cost control. To receive ammunition you had to fill out and submit an Approved Request. The officer in charge of ammunition had to open a tin (like a sardine container) with a special key to provide that ammunition, and, with thousands of Zulu warriors walking on you, that process left the entire army. Killed (I was told that one of the first casualties was the officer in charge of bullets shot by his own men to get the ammunition quickly).

Ukrainians are fighting for their lives. Obviously, if there are policies that are hurting their efforts, those policies are closed. It offers the lessons of the Zulu War to countries that are not Ukraine – such as in the US and Europe – that should have policy changes that will reduce these kinds of problems when it comes to cyber security around the world.

wrapping up

It was fascinating to see how the close collaboration between Blackberry and Ukraine significantly benefited both entities and how the collaboration was much broader than I ever realized, involving a global army of volunteer cybersecurity experts.

At the same time, it was fascinating that this collaboration was changing behavior and policies around the world, potentially making the world more secure against cyber threats, given the migration of otherwise technologically capable Russians, originating from Russia. Possibly to reduce the worldwide cyber threats that are occurring.

BlackBerry’s work in Ukraine is raising BlackBerry’s profile significantly as it continues to focus on cyber security and IoT to a point where it’s hard to argue that it’s the only company capable of defending against state-sponsored threats. are, unfortunately, an important part of the world we live in now.

Technical Product of the Week

Lenovo ThinkBook Plus Gen 3 Laptop

My problem with the laptop, which is what I’m typing in right now, is that I don’t have enough screen space. My primary monitor in my home office is a 49-inch monster from Dell. Obviously I have a serious problem with my laptop shrinking down to 15 inches.

The ThinkBook Plus Gen 3 not only has a huge screen, but there’s also an additional screen that sits next to the keyboard where you can enter your social media feed, more easily use pen input, or on the primary screen. You can expand on what you are doing. Battery life, as is the case with all large-screen laptops, is limited, but it’s a station-by-station product, and that’s how I operate. I rarely work where there’s a plug, but I’ll take less battery life in exchange for a bigger screen.

Lenovo ThinkBook Plus Gen3 17-inch Laptop

ThinkBook Plus Gen3 17-inch Laptop (Image Credit: Lenovo)


The primary screen is an impressive 17.3 inches, and the second screen is eight inches, effectively pairing a small, embedded tablet with a giant-screen laptop. For a product this unique, it has a very reasonable entry price (as of this writing) of $1,400. is less than,Which is a good value, as most products in the 17-inch-screen class can be far more expensive.

So, it is not only an impressive offering; It is economical also. A friend of mine is traveling with it and shared that it’s been a huge conversation starter when he opens it on a plane. It’s also a great way to watch movies on the main screen while keeping email on the smaller screen.

Another analyst pointed out that he can keep his team meeting on the small screen and play the game on the big screen without notice which usually goes to the other participants if you are no longer watching the meeting (this What surprises me is how few people realize we know what they’re doing with more traditional laptops or desktop computers).

Overall, the Lenovo ThinkBook Plus Gen 3 is the new laptop I’ve been craving – and it’s my product of the week.


, Note: The price of $1,400 was last week after a 40% discount, and there was a notice that the price would revert to $2,309 today. But I expect they’ll discount this level again as we get closer to Black Friday, so you can look forward to that deal.

The opinions expressed in this article are those of the author and do not necessarily reflect the views of ECT News Network.

Germany-based Tuxedo Computers has released its specific operating system as a stand-alone distribution that provides a reasonably productive choice among a bloated supply of Linux variants.

Previously, you could only get Tuxedo OS pre-installed on company computers. Now anyone can try it out as a separate distro, making good on its mission statement of making Linux accessible to the general public. At first blush, Tuxedo OS is identical to a default install of Kubuntu (Ubuntu’s classic iteration of the KDE distro), just with custom startup and shutdown screens and wallpapers.

Buying a dedicated Linux computer instead of reusing new or old Windows or Mac hardware is often hindered by a lack of manufacturers. Perhaps one of the more well-known and accessible outlets is US-based System76, which has launched its own in-house Linux version, POP! _OS as a separate Linux distribution.

Tuxedo Computers based its OS on Ubuntu 22.04 LTS and fine-tuned the KDE Plasma desktop to accommodate its own hardware. System 76 tweaked GNOME Desktop. Both versions run on most computer configurations without hardware requirements or the need for a dedicated set of additional software.

Standard 1.0. No

Don’t let the Tuxedo OS version 1.0 label deter you from trying out this latest Linux offering. The actual coding has been around as long as the pre-installed OS on the company’s hardware lineup. Therefore, its public release is far more polished than its version 1.0 moniker.

The KDE Plasma Desktop is not a full clone of what you can download in other iterations. The in-house developers took six months to develop, test, document and design the stand-alone offering.

Tuxedo OS left-side panel

Tuxedo OS The left side panel shows windows open with Alt+Tab.


The Tuxedo version of this desktop environment includes Tuxedo Control Center, Tuxedo Tomte Driver Configuration Service, and a few other changes.

These include an accent color and wallpaper set, a natively packaged Firefox and Nvidia drivers. Flatpak comes pre-installed instead of Snap, though it’s disabled by default unless you flip the switch for this alternative software distribution package.

troublesome loading routine

My biggest disappointment with Tuxedo OS is the cluttered approach to setting it up. Especially for newcomers to Linux, developers made running live sessions — whether from DVD or USB thumb drives — anything but convenient.

So much so that I almost gave up on installing it out of frustration. Once installed, the operating system is a relatively pleasant experience, provided you prefer the KDE desktop. Loading it up to try it out before even clicking the Install button is a painfully slow process of trial and error.

The problem is not with running an OS originally made for factory installation on dedicated hardware. Developers need to design a more “fail-proof” installation engine if they expect users to adopt Tuxedo OS.

My horror story started with a sophisticated GUI-driven interface. Typically, with most Linux installations the process boots the computer with the ISO files into an easy-to-follow menu where you click on an option and go to the next set of options. But this menu was confusing and often didn’t work without heavy troubleshooting.

For example, the first screen shows options like “Boot from USB/HDD” and “Boot from DVD/VM”, followed by options like “WebFAI Notebook” and “WebFAI Desktop Installation”. Then there was a separate list for “UEFI Firmware Settings”.

Tuxedo OS Live Session Boot

Any readme file options or other sources of information about the meaning of the options were lacking. The menu and website were of no such help.

too many guesses

The first option is ambiguous and suggests starting the computer from a hard drive or removable media. How was this different from the other option specifying HDD or VM?

When I selected the top option, the result was only a terminal screen displaying command prompt. The second entry started the live session of the temporary virtual machine through the ISO installation medium.

But it only works on computers configured with an agreed BIOS setting. Since I tried the installation on four different computers, some had BIOS settings, and some had UEFI settings already disabling Secure Boot on Windows machines.

On some of my machines, the installation started and wandered along the way, and on others, it never started. That encounter prompted me to play with the menu’s fifth option, which involved changing the BIOS and UEFI settings.

I later learned that Integrated WebFAI (short for Fully Automated Installation), a custom Linux deployment tool, requires a special USB key, which the company provides, or you can create one yourself, assuming So that you know the directions. It also requires a wired network connection to complete this type of installation.

long wait plan

Each attempt to install this distro resulted in the painful omission of blank screen before the first menu screen was displayed at the end. Seriously, I mean up to 15 minutes. Sometimes the blinking indicator light on the optical drive would go off, so I had to wait for the blinking to resume before I turned the box off and tried again.

Once I got the right combination of options on one of my four test bench computers, the DVD installation was completely complete. The time factor to do this was much longer than what I typically experience in most other Linux installations.

Once the actual installation process has gone beyond the initial menu selection, response times vary from step to step. The starting language is the default German, and I had to figure out that I needed to click a blank entry field at the bottom of the screen to activate the languages ​​list.

On some of my test gear, the window never opens; On another rig, creating a language selection or time zone with a location lock locks the computer.

On a computer that actually went through these steps, a progress bar increased to 40% and seemingly froze. Then, after a gap of 10 or more minutes, the desktop started showing up on the screen so I could start trying out Tuxedo OS.

I didn’t test Tuxedo OS after the live session. So whatever glitches were waiting for the hard drive installation to complete, I’ll never know.

Why try Tuxedo OS?

This public release without pre-installation on Tuxedo computers will once more invite developers to pull out the installation ISO. The tweaked combination of Ubuntu 22.04 Roots and the revamped KDE desktop brings some useful features to the package.

It comes with LibreOffice and a small selection of games pre-installed. It also includes a Tuxedo Tools group with two custom applications installed and the Tuxedo Control Center system-monitoring app. Tuxedo WebFAI Creator runs as a panel applet by default, although you can easily turn it off.

The developers bundled the OS Probe feature by default. Before Grub 2.06, it was easy to install Ubuntu as a dual boot next to other operating systems. Prober detected the other OS and gave users a boot menu to choose which OS to use for each session.

The same ISO handles encrypted and unencrypted options when installed on a hard drive. A corresponding prompt appears before the installation begins.

The stand-alone version of Tuxedo OS lets you choose the file system of your choice. So, you can configure btrfs or XFS in addition to the standard ext4.

ground level

No doubt, I’ll circle back when the developer releases the upgrade. Neither KDE nor GNOME is a compelling reason for me to swap out my favorite daily driver yet.

But Tuxedo’s approach has piqued my interest and it has the potential to take a mainstream platform position. I use a number of KDE applications on my main productivity computer, and now the “newer” distro has a lot in its suite of apps bundled in. You can find Tuxedo OS on the Tuxedo Computers website.


suggest a review

Is there a Linux software application or distro that you would like to recommend for review? Something you love or want to know?

Email me your thoughts and I’ll consider them for future columns.

And use the Reader Comments feature below to provide your input!

With the San Francisco 49ers being trounced by the Kansas City Chiefs on Sunday, it’s fair to say that Infineon Technologies had a much better week than the Niners. Eventually, Infineon used Levi’s Stadium, home of the 49ers, to host their annual OktoberTech event.

OktoberTech is organized in many cities around the world. Infineon uses the event to showcase its wide portfolio of component semiconductor solutions that often appear in automobiles, industrial power control products, power and sensor systems, and secure connected offerings.

Given Levi’s Stadium’s reputation as one of the most energy-efficient and sustainable arenas in the National Football League, Infineon has extended its decarbonization and digitization themes pervading their product offerings, especially to host Oktobertech. Place chosen for promotion.

Infineon is not light in terms of technology. As of September 2021, the company employed over 50,000 employees globally and recorded revenues of EUR 11.06 billion, or approximately US$10.9 billion.

Objectives of OktoberTech

As articulated by Infineon’s North America President Bob Lefort, OktoberTech is an engaging medium that showcases its solution catalog in a friendly and casual environment and encourages enthusiastic discourse with event attendees and company partners. does.

The OktoberTech moniker pays tribute to the company’s German heritage. Headquartered in Neubiberg, Germany, Infineon was spun off from its former parent company, Siemens AG, in 1999.

Several executive presentations given at the event highlighted the company’s efforts to fight global warming. Thematically, 30 product demos tied directly or indirectly to reducing the impact of carbon emissions and optimizing electrical energy use.

Infineon’s mission is fueled by its legacy of success in several high-profile market categories. The company reports about 20% in the industrial electronics space, 15% in microcontrollers, 44% in sensor technology, and 25% in security-based products.

Infineon Automotive Solutions

Many of the demos showcased at the OktoberTech event included automotive capabilities. For example, Infineon’s Microelectromechanical System (MEMS) microphone technology was shown at the event in collaboration with AI specialist Cerence.

Demo held at Infineon’s OktoberTech event at Levi’s Stadium on October 20, 2022


Essentially the same Infineon microphones that automakers currently use for voice recognition, these microphones are ideal for outdoor applications, such as detecting dangerous road conditions or siren warnings.

The unique engineering challenge with identifying sirens is that police and emergency vehicles use over 1,500 different sirens around the world. However, Cerence’s AI technology can accurately detect a siren, then automatically stop the car, and pull it over to allow emergency vehicles to pass.

Infineon’s MEMS microphone technology is also “hardened” for use outside the car because it is qualified to the AEC-Q103-003 standard, which means it can work in low (-40 degrees F) and high (221 degrees F) temperatures. can work. These microphones also have a form of noise cancellation for capturing distortion-free audio that is needed for loud environments.

Analyst Tech

The extensive library of content capabilities available in the market by Infineon is hard to digest. Many of the end-user products that consumers and businesses use every day and are taken for granted, would not be possible without Infineon’s innovation, design-in prowess, and perhaps most important, cost-effectiveness.

From an external marketing standpoint, Infineon’s main challenge is that most consumers are unfamiliar with the company, as its technology is often not clear to the end user. Other ingredient companies are also not immune to this problem, but I think Infineon will benefit from awareness work and messaging.

However, without this the final product itself would not be possible. In product categories such as automobiles, silicon technology that comprises the overall bill of materials is growing rapidly as cars become more digital, EV-oriented and technology-based.

Even in today’s non-EV vehicles, there are estimated to be around 1,000 chips embedded, and in EVs that number rises to 2,000, underscoring Infineon’s strategic business opportunity.

closing thoughts

Undoubtedly, there are several market tailwinds in the back of Infineon. With automobiles increasingly becoming “computers on wheels” – a phrase used in many interviews with Infineon executives during the OktoberTech event – Infineon’s know-how in this area is a tremendous asset to continued growth.

But supporting decarbonization and adopting digitization more aggressively at the macro-market level could fuel the company’s growth over the next several years.

Another point needs to be made: more progress must be made to dramatically reduce bureaucracy in the local permitting and regulatory areas related to EV chargers. As I reported a few weeks ago, companies like Infineon are able to delve into the EV charger space if it takes several weeks to meet local permitting regulations, which quickly lose their appeal with consumers and businesses.

Infineon’s position in IoT solutions, always one of its forte, should remain solid, with the Matter Inoperability initiative, expected to grow at the hyper-level of the consumer market. eventually It is set to appear in tangible products in early 2023.

Finally, Infineon’s 2016 acquisition of Cyprus Semiconductor has the potential to set the company apart from its competitors. The addition of Cypress allows Infineon to focus on the company’s core growth and a much broader range of applications.

In an extended interview with Infineon’s senior executive team, it appears that its leadership understands its business opportunity and corporate responsibility to maximize decarbonization with its solutions.

Interview with Infineon’s leadership at the OktoberTech event at Levi’s Stadium on October 20, 2022


Bob Lefort quoted from the film “Spider-Man” as saying that Infineon believes that “with great power comes great responsibility.”

Not many profit-driven companies will apply that adage during an important corporate event, and it’s refreshing to see that type of clarity and reality uttered by a senior executive in the technology sector.

Children who played video games for three hours or more a day performed better in tests of cognitive skills, including impulse control and working memory, according to research released Monday.

The study of nearly 2,000 children was conducted by researchers from the University of Vermont in Burlington and sponsored by the National Institute on Drug Abuse (NIDA) and other institutions of the National Institutes of Health and is part of an ongoing study on adolescent cognitive development.

According to the NIDA, several studies have examined the relationship between video gaming and cognitive behavior. Nevertheless, only a handful of neuroimaging studies have addressed the topic, and the sample size in those studies was small, with less than 80 participants.

Vermont researchers examined cognitive and brain-imaging data from nine- and 10-year-olds participating in the large Adolescent Cognitive Development Study. The study subjects were divided into two groups — those who never played video games and those who played for three hours or more a day.

The researchers rated each group on two tasks that assessed their ability to control impulsive behavior and remember information, as well as their brain activity while performing the tasks. The scientists found that video gamers were faster and more accurate at tasks than non-players.

They discovered higher brain activity in areas of the brain associated with attention and memory, and in frontal brain regions associated with more cognitively demanding tasks.

Less brain activity was found in brain regions related to vision. Researchers believe that there may be less activity in visual areas because repeated play practice causes the brain to become more efficient at visual processing.

calming words for parents

One of the study’s authors, assistant professor at the University of Vermont, Badar Charani, said, “There’s a lot of published work that says that video games are associated with negative mental health and cognitive outcomes, which can lead to parents playing their children’s video games.” worry about.”

“We’re seeing heavy video game players — three or more hours a day — and we’re not seeing any association with negative outcomes,” he told TechNewsWorld. “So the message for parents is to be less worrying, and may actually benefit from video gaming.”

Although the study did not find an association between video gaming and the depression, violence, and aggressive behavior found in other studies, it did find that game players report higher mental health and behavioral issues than non-players.

However, the researchers noted that the finding was not statistically significant, meaning they could not tell whether the issues were related to game play or just chance.

“I don’t think video gaming can affect some children’s cognitive skills, because it can help them become more sensitive and attentive to certain subjects,” said Mark N. Venna, president and principal analyst at SmartTech Research. San Jose, Calif.

“But there is also the possibility that certain types of violent video game content may improve cognitive skills at the expense of desensitization, which would be bad for children and society,” he told TechNewsWorld.

“It’s not a simple topic,” said Michael Goodman, director of TV and digital media strategies at Strategy Analytics, an international research, advisory and analytics firm.

“You can’t paint the entire video game industry with one broad brush,” he told TechNewsWorld. “There are aspects of video games that are positive and negative for children. A game can improve your cognitive skills while at the same time making you vulnerable to violence.”

balance imperative

“I think the results of this study are very promising and give us solid data that playing video games can have a positive and meaningful impact on children’s cognitive abilities and performance,” said Dr. Lynn E. Feelin said. University School of Medicine.

“I believe parents will see this as important and valuable findings, considering how many children play video games,” she told TechNewsWorld. Feelin is also director of the play2PREVENT lab at Yale, which works on developing video games targeting important health outcomes in teens.

“We believe and have demonstrated that well-developed and evidence-based video games can positively affect children and adolescents through cognitive training,” she said. “This recent study provides complementary data to support what we have observed.”

As beneficial as video games can be, those benefits can be muted by too much of a good thing. “I think spending too much time on the exclusion of other activities that are important to childhood and adolescence are some of the downsides associated with children playing video games,” Feilin acknowledged.

“Balance is important,” she continued. “But I think we have shown, and this recent study further demonstrated, many positive features and benefits of playing video games.”

NIDA Director Dr. Nora Volkow agreed that balance is key.

“Video gaming can lead young people to neglect other activities, such as doing homework, going to sleep, and having social interactions, which are extraordinarily important for their brain development,” she told TechNewsWorld.

“Like anything, it’s a question of balance,” she agreed. “The lesson we have to learn is how we can optimize video gaming technology to develop tools that can be applied to maximize the improvement of one’s various cognitive skills.”

need more granularity

One of the study’s shortcomings is that the researchers had no data on the style of games played by the video players.

“We need to study this in more detail,” Volkow said. “There are a wide variety of video games. In this particular study, they do not address those differences.”

“You can have a game that is maximizing people shooting. That will improve your reaction time. It will speed you up a lot,” she explained. “Or you can have a video game where you have to escape. There may be a need for a route. It’s going to enhance your memory.”

“We have no granularity in this study as to whether there were tasks-related differences in the types of video games these children were using,” he said.

There will be time to gather that information as the larger cognitive study follows participants into their twenties.

“We plan to follow them in the coming years, and we will have more information about the games they are playing,” Charani said. “For now, we’re seeing this improvement regardless of the type of game they’re playing.”

“It will be interesting to find out whether we still see these benefits as these kids get older,” Volkow said.

A massive phishing campaign built on typoquoting is targeting Windows and Android users with malware, according to a dangerous intelligence firm and cybersecurity website.

More than 200 typoquoting domains are currently used in an ongoing campaign that impersonates 27 brands to trick Web surfers into downloading malicious software to their computers and phones, BleepingComputer reported Sunday.

Threat intelligence firm Cyble revealed the campaign in a blog last week. It reported that phishing websites trick visitors into impersonating Google Wallet, PayPal and Snapchat to download fake Android applications that contain the ERMAC banking trojan.

BleepingComputer explained that while Cyble focused the campaign’s Android malware, a much larger operation aimed at Windows is being deployed by similar threat actors. That campaign features more than 90 websites designed to advance malware and steal cryptocurrency recovery keys.

Typosquatting is an age-old technique of redirecting cyberspace travelers to malicious websites. In this campaign, BleepingComputer explained, the domains used are too close to the original, with a letter swapped out of the domain or an “s” added to it.

It added that the phishing sites also appear to be authentic. They are either clones of real sites or enough to fool a casual visitor.

Typically, victims end up on sites by making typos in the URLs entered in the browser’s address bar, this continues, but URLs are sometimes entered in emails, SMS messages, and on social media as well.

“Typosquatting is not novel,” said Sherrod DeGripo, vice president for threat research and detection at Proofpoint, an enterprise security company in Sunnyvale, Calif.

“Goggle.com was accidentally sending visitors to a malicious site with drive-by malware downloads as early as 2006,” DeGrippo told TechNewsWorld.

abnormal scale

Although the campaign uses tried-and-tested phishing techniques, it does have some distinctive features; Security experts told TechNewsWorld.

“The size of this campaign is unusual, even though the technology is old-school,” said Mike Parkin, senior technical engineer at Vulcan Cyber, a provider of SaaS for enterprise cyber risk prevention in Tel Aviv, Israel.

“This particular operation appears to be on a larger scale than typical typosquatting efforts,” said Jarrod Picker, a competitive intelligence analyst at Deep Instinct, a deep-learning cybersecurity company in New York City.

The focus on mobile apps is another departure from the norm, said Grayson Milborn, director of security intelligence at OpenText Security Solutions, a global threat detection and response company.

“Targeting mobile apps and related websites with the goal of distributing malicious Android apps is something that is not new, but not as common as typosquatting that targets Windows software websites,” he said.

What’s interesting about the campaign is its reliance on both typing mistakes made by users and the deliberate delivery of malicious URLs to the target, observed Hank Schles, senior manager of security solutions at Lookout, a San Francisco-based provider of mobile phishing solutions.

“It appears with a broad campaign [a] There is a high chance of success if an individual or organization does not have proper security,” he said.

Why does typosquatting work?

Phishing campaigns that exploit typoquoting don’t need to be innovative to be successful, maintained Roger Grimes, a defense campaigner at KnowBe4, a security awareness training provider in Clearwater, Fla.

“All typosquatting campaigns are quite effective without the need for advanced or new tricks,” he told TechNewsWorld. “And there are many advanced tricks, such as homoglyphic attacks, that add another layer that can fool even experts.”

Homoglyphs are letters that are similar to each other, such as the letters O and zero (0), or the uppercase I and lowercase letter l (EL), that look similar in a sans-serif font, such as Calibri.

“But you don’t find a ton of these more advanced attacks out there because they don’t need them to be successful,” Grimes continued. “Why work hard when you can work easily?”

Abhay Bhargava, CEO of AppSecEngineer, a security training provider in Singapore, said typosquatting works because of trust.

Bhargava told TechNewsWorld, “People have become so used to seeing and reading well-known names that they think a site, app or software package has almost the same name and the same logo as the original product. “

“People don’t stop to think about minor spelling discrepancies or domain discrepancies that differentiate the original product from the fake,” he said.

Some domain registrars guilty

Picker explained that it’s all too easy to “fat finger” when typing a URL, so PayPal becomes PalPay.

“It will get loads of hits,” he said, “especially since typosquatting attacks typically present a web page that is essentially a clone of the original.”

“Attackers also snatch away multiple similar domains to ensure that many different typos will match,” he said.

Grimes stressed that even the current domain registration system doesn’t help matters.

“The problem is made worse because some services allow bad websites to obtain TLS/HTTPS domain certificates, which many users believe is safe and secure,” he explained. “More than 80% of malware websites have digital certificates. It makes fun of the entire public key infrastructure system.”

“On top of that,” Grimes continued, “the Internet domain naming system is broken, apparently allowing rogue Internet domain registrars to obtain rich registration domains that are easy to see, used in some sort of misdirection attack. Profit incentives, which reward registrants for looking the other way, are a big part of the problem.

Mobile browser more responsive

Hardware form factors can also contribute to the problem.

“Typoquoting is far more effective on mobile devices because of how mobile operating systems are built to simplify the user experience and reduce clutter on small screens,” explained Schles.

“Mobile browsers and apps shorten URLs to improve their user experience, so the victim may not see the full URL in the first place, much less typos,” he continued. “People usually don’t preview URLs on mobile, which is something they can do by hovering over a computer.”

Typosquatting is certainly more effective for phishing on mobile phones because URLs aren’t fully visible, agree CISO and co-founders of Tresorit, an email encryption-based security solutions company in Zurich.

“To run Trojans, not so much because people usually use apps or the Play Store,” he told TechNewsWorld.

How to prevent typosquatting

To protect themselves from falling victim to phishing typosquatting, Picker advises users not to follow links in SMS messages or emails from unknown senders.

He also advised caution while typing URLs, especially on mobile devices.

“When in doubt, the user can directly Google the established domain name, rather than simply clicking on the link,” DeGripo said.

In the meantime, Schles suggested that people should rely on their mobile devices a little less.

“We know how to install anti-malware and anti-phishing solutions on our computers, but there is an inherent belief in mobile devices such that we feel it is not necessary to do so on iOS and Android devices,” he said.

“This campaign is one of countless examples of how threat actors leverage that trust against us,” he said, which demonstrates why it’s important to build a security solution specifically for mobile threats on your smartphone and tablet. .

Marketers are increasingly focusing on presenting potential buyers with a mix of product video as a model that adopts live commerce goals based on consumer-based and consumer-focused product discovery.

The developing new marketing method shares many names. The foremost usage centers on live commerce and livestream shopping. Whatever you call it, marketing strategy allows sellers to showcase products to a live, online audience who can participate in the experience.

This method of showcasing merchandise is common on social media and is now slowly finding new website outlets. The format is very similar in that it enables buyers to communicate directly with promoters through online video and chat.

Industry analysts project Interactive Live Commerce will generate $25 billion in revenue by 2023. They further predict that live commerce sales could generate 20% of all e-commerce by 2026.

This trend began in 2016 with China’s Alibaba online shopping network and has proven to be very effective in Asia-Pacific markets. The innovative approach established the success potential of blending online livestream broadcasts with an e-commerce store to allow viewers to watch and shop simultaneously.

Buyable videos, on the other hand, have a similar role to customer engagement, but they are more limited than live purchases. Shoppable videos contain retail products available for consumption with a link embedded within the video. Clicking on those links redirects viewers to the purchase window without leaving the video page.

As we recently reported, live shopping probably won’t grow as widely with US customers as it is in the Asia-Pacific market. Nevertheless, merchants should not flag potential live shopping offers for increasing e-commerce sales.

Overarching Customer Engagement Approaches

One of the key features of shoppable videos is the “add to cart” feature offered by Jennifer Silverberg, CEO of SmartCommerce, a consumer packaged goods digital marketing firm. Their company’s advertising content for customers is designed with dynamic features that take into account the user’s context to enhance the experience.

“It helps marketers create interactive advertising experiences that put consumers in the driver’s seat,” Silverberg told the E-commerce Times.

Traditional video advertising strategies rely on third-party cookies for targeting, while interactivity allows brands to not only measure authentic actions, but also use those metrics to optimize campaigns and drive actual purchases . Purchasable ads can unlock views in details relevant to specific groups of consumers without the need to leave the video.

Kerv Interactive is a platform provider of technology aimed at reducing additional costs and production times for creating shoppable ads.

“Whether to purchase with a QR code on CTV [connected TV] The ad or product tile in a digital or social video ad has the ability to drive brand consumers to a destination relevant to the time of day or location, and/or serve creatives that take into account the location, time of day, or weather. can,” Kerv COO Marika Roque told the e-commerce Times.

However, the terms and their strategies are not interchangeable. Shoppable and live commerce video serve the same purpose but have their own approach to consumers.

An essential role of a buyable video is to drive greater customer engagement through the ability to buy immediately. Videos are looped and recorded before they are posted, so that buyers can watch them whenever they want.

Live commerce videos, on the other hand, are real-time events that the host is involved in. This approach promotes entertainment, education and product all at the same time.

Benefits of live commerce

One advantage of livestream shopping is that online customers see the products they are interested in. Silverberg suggested that the content is no longer displayed by third parties that decide what buyers see.

“Now I am being invited through my filter. What I saw contains information that is highly relevant to me because I have been invited,” she said in the pattern of audience response.

Viewing appeal is getting buyers to engage with a topic and a presenter that the audience can relate to. Engagement matches the context of the lifestyle or gives the audience a way to emulate what that presenter represents.

“Now I am being offered a product that I think is getting me closer to that interest. It is completely different,” said Silverberg, speaking as a potential buyer.

Another powerful driver of live commerce is the high conversion rate compared to other online marketing methods that the livestream approach achieves. He said that, to some extent, viewers are already opting to watch live video.

“Conversions always come down to matching strategy to consumer expectation and product category expectation. When you get all of those things right and when the message is relevant, then you get a 70% conversion rate,” Silverberg explained.

“It always matches where the consumer is to their propensity to take action,” she said.

The deciding factor

Shoppable ads are a largely untapped measurement tool that allows brands and content platforms to solve cross-platform measurement. They provide new forms of data at a time when consumers are becoming increasingly careful about sharing their information, Kerv’s Roque said.

According to Silverberg, the difference lies in what’s happening beneath the surface. She thinks consumers have become more vulnerable to spam, and to shoppable ads and live commerce addresses.

According to Silverberg, the cost of producing a live commerce presentation can be an advantage over a buyable video, with the potential for higher conversion rates. Shoppable videos also get more conversions.

Traders are increasingly using live commerce strategies. So are social media influencers, and anyone anywhere can use the marking tool. The cost of making a live commerce show depends on the product category.

“If you are intelligent and create something that is both entertaining and relevant and can be shown to a wide audience, the cost makes perfect sense,” Silverberg replied without offering more specific pricing.

in-house or outsource

Keep in mind that live commerce strategies can drive sales more quickly. The results come from the ability to garner a larger immediate audience than other marketing plans.

Plus, the additional personal engagements associated with live commerce justify the associated production costs. According to market research, video content tends to have more engagement than other types of content.

This encourages buying as well as building brand awareness more effectively. Some industry reports suggest that audiences are more likely to share recorded productions with their friends than they usually do with static ads.

A final consideration is whether to opt for in-house production or contract with a professional marketing service. If you opt to do it in-house, expect to get live video shopping tools, a live chat platform, and shopping cart integration.

Like many of you, when “Star Trek: The Next Generation” (TNG) came out, I was fascinated by the holodeck concept. For many of us, this became the bar for the upcoming metaverse or 3D web implementation.

The holodeck was a photorealistic virtual environment built on the concept of harsh lighting, which could render solid objects out of light (that’s a thing) to provide entertainment for the crew. Starships that spend months or years away from their home port will need some form of entertainment. Large Soviet-era submarines needed swimming pools for the same reason.

Although not new, the concept of creating a virtual world also did not become real outside of games that were primarily used for entertainment. While there were simulations for more practical purposes such as military training and going back decades, only a small minority of people ever experienced them. This, coupled with potentially substantial cost restrictions, prevented the show from taking this technology where it was supposed to go. The obvious error is evident now that we actively explore recreating holodeck-like experiences.

Let’s take a look at how TNG got the holodeck technology wrong or at least not implemented it as widely as it would in real life. Then we’ll close with our product of the week, a phone and smartwatch service from Gab Wireless that will keep your kids and maybe some of our older adults more secure.

Simulation-to-interface optimization

The problem with TNG’s holodeck technology didn’t come to me either initially or afterward while watching the show. This came to me while watching various keynotes at Lenovo’s Virtual Tech World event last week.

Lenovo has arguably the best suite of tools for locating commercial interfaces in structures like the Metaverse. It showed a set of deep relationships with core technology providers that will help the company execute in areas where mixed reality is used, such as holodeck-like, VR-based video conferencing offerings. Unlike Meta’s prototypes, these products include legs.

Lenovo’s tools include a variety of glasses and conference/huddle room offerings that combine superior avatars, in which they scan participants in real time with a 3D scanner to create more holodecks than those pioneered by Facebook- To create an experience like that, which uses cartoon-like characters.

It is somewhat similar to the Virtual Medical Doctor in “Star Trek: Voyager” and with a unique badge, could not only exit any area where there were holo-emitters but could also exit Voyager.

In several episodes of both series, there were examples of the ability to not only recreate the bridge and control the interfaces for various ships, but to fool the participants into thinking they were not in the holodeck.

So, what’s wrong?

Well, if you could build anything with hard light, including people, why wouldn’t you have fixed interfaces on a ship, or would you be limited to a live crew?

How the Metaverse Could Change Human-to-Machine Interfaces

We’ve often talked about how the big AI revolution will eliminate the need to learn how to use tech-based tools. As we’ve seen with AI-based artists or writers, users just need to be able to describe what results they want to achieve. If they want a paper on a particular topic, they summarize the assignment, and the AI ​​generates the written result. Or they describe what they want in a picture, and, again, the AI ​​creates it.

Now fast forward hundreds of years in time to the “Star Trek” stories.

Doesn’t this mean that human-machine interfaces throughout the enterprise will be hard light-based, dynamically changing to address both the unique needs of the operator and the situation, and potentially redundant as AI is already very Was doing something the crew does automatically?

physical drone vs hard light human digital twin

“Star Trek: Discovery” recently demonstrated the use of drones. It had data named androids, but why do you need massive staffing levels on starships if you can create digital ones that are indistinguishable from humans?

Also, if you can create complex objects virtually, why wouldn’t you have control interfaces that adapt to the situation rather than be fixed? Also, given that you can place crew almost everywhere, why would you put them on the top deck in a vulnerable position inside the skin of the ship and instead put them in a central armored position within the ship?

I’m pointing this out because, often, with new technology, we first emulate how we used to do things. Then, over time, we break from those old constructions and eventually adapt around the latest technology. As we move into the metaverse, we’re talking about the concept of digital twins, but what if we only need twins and don’t need an actual physical device?

For example, if you’re working from within the Metaverse, your interface can be what you imagine it to be, assuming your body was supportive enough. You won’t need to build an actual office, cubicle, or even PC. All of them can be presented, and Metaverse technology will connect what you did in the Metaverse to an accurate result in the real world.

Let’s say you are writing a paper, attending a meeting, doing research, or even creating a new product. In that case, Metaverse technology can provide you with options you wouldn’t have in the real world and a better interface with other technologies like 3D printers that can take your imagination and create them in the real world.

In personal life you can live in a small house. But in the metaverse, there’s a giant digital mansion that requires less inspection than the real one, and you can do a remodel just by describing what you want to replace — no contractors, no cost, and no cost as a result. There is no long term problem with .

Wrapping up: Lenovo may be the first to grok it

The reason it’s called out Lenovo is that it’s the only multi-national vendor to aggressively produce its Metaverse-ready tool kit, and it has the most breadth with regards to AR- to VR-based industrial headsets.

Lenovo’s CTO, Yong Rui, was also the most candid about the various elements and directions of this technology. He explained that the Metaverse was not evolving in a fixed space as a hybrid of the physical and virtual worlds, which are very different and very similar to “Star Trek” and where the technology is now going.

Rui spoke of four technical layers: orienting the user, describing the virtual environment, improving the realism in textures, and the rules governing the environment or object semantics.

Now think of application on warships, vehicles, or factories. You can use non-physical, virtual and voice-based interfaces that will never wear out, require repair or maintenance – except electronic – and without having to move the user from where they are working Can be changed – even if they are working from home.

This is the future I think we are headed for, with Lenovo in a leading position as a solutions provider, and one that will transform the future represented by “Star Trek” from large, stationary ships to much smaller ones served by humans. will turn into ships. With virtual interfaces, primarily employed by advanced digital AI constructs, potentially eliminating the dangers for red shirt wearers.

In short, the future is closer than what’s going on inside the “Star Trek” holodeck, and the sooner the industry gets this right, the faster our progress will be in the hybrid virtual world that Lenovo talked about. Was. Last week.

Technical Product of the Week

gab phone

I don’t think kids should be given unsupervised smartphones. There are plenty of people who want to hunt down kids who aren’t usually trained or equipped to deal with most of these bad actors. At a Qualcomm mobile event last week, they introduced a service and device solution from Gab Wireless that I found fascinating.

gab phone by gab wirelessSpeaking of the company’s motivation, one of the executives told the story of his younger daughter and inappropriate photos sent by an older boy, which apparently harmed his daughter.

While most products designed to protect children are focused on the needs of parents, meaning children often refuse to use them, Gab is designed to meet the needs of both the child user and the parent. Combines features for those who want to keep them safe.

Content on the go is protected, curated, and under parental controls. But there are tons of games and distractions that even a child has access to. Music service doesn’t just blank out bad words; It excludes songs with inappropriate language.

Using gamification, Gabb has also created phone and smartwatch apps that encourage exercise and promote positive behavior. Plus, the phone protects the child from predators and content that could harm them if viewed unsupervised.

In the end, I think children are not only our most important resource, but our most valuable resource as well, and a service that protects them is an obvious candidate for my Product of the Week.

The opinions expressed in this article are those of the author and do not necessarily reflect the views of ECT News Network.

In five years, 40% of large organizations worldwide will use a combination of Web3, AR Cloud and Digital Twins in Metaverse projects aimed at revenue, research and advisory firm Gartner predicted Monday at its IT Symposium in Orlando, Fla. Was.

Gartner’s Metaverse prediction was part of a top 10 list of strategic technology trends released at the event.

The firm envisions a metaverse as a “collective virtual 3D shared space created virtually by the convergence of augmented physical and digital reality.” It is consistent and provides better immersive experiences, it added.

A full metaverse would be device independent and not owned by a single vendor, Gartner continued, and would be a virtual economy enabled by digital currencies and non-fungible tokens (NFTs).

Gartner’s prediction raised the eyebrows of some analysts. “It’s a little aggressive,” said Mark N. Venna, president and principal analyst at SmartTech Research in San Jose, Calif.

“The primary headwind for Metaverse in business is the arrival of the actual Metaverse app, which will have wider appeal with enterprise accounts,” he told TechNewsWorld.

“Some of this exists – and will continue to surface – in operational areas like inventory management, logistics and other verticals, but unless there is a Metaverse app, or app, that increases productivity, I think 40% is a stretch. ,” added Vena.

Metaverse or Metaverse?

Ross Rubin, principal analyst at Reticle Research, a consumer technology advisory firm in New York City, also sees some of the challenges that could hinder the spread of the metaverse in the enterprise.

“At a core level, we need improvements in device size and power efficiency and broader applications beyond the manufacturing, engineering and other industrial applications we see today,” he told TechNewsWorld.

“Beyond these AR-related improvements, however, there are open questions as to whether the Metaverse will evolve as a single, widely accessible platform like the Web, or whether companies will largely build their own applications as they go. Let’s do it with cloud technology. Today,” he continued.

“However,” Rubin said, “we’re starting to see some encouraging standard-setting here, like the Metaverse Standards Forum.”

Facebook’s owner Meta may also be contributing to the Metaverse traction problems, maintained Rob Enderle, president and principal analyst of Enderle Group, an advisory services firm in Bend, Ore.

“Facebook’s efforts are so bad that they are casting a cloud over the entire segment and, ironically, they are the biggest investors in it,” he told TechNewsWorld.

“Facebook is effectively giving a big indication on this segment that it’s fake,” he said, “even though Nvidia’s efforts seem to be working far better and are being implemented well by firms like BMW. This demonstrates the potential that Facebook is destroying right now.”

need patience

Impatience may also play a role in the company’s Metaverse persistence, noted Quinn Mai, CEO of Coulter, a digital marketing agency in New York City.

“As brands enter the metaverse, they are often disappointed upon arrival, not realizing that this is still a nascent but evolving platform,” she told TechNewsWorld. “They don’t see a large number of users in the metaverse like Decentraland or The Sandbox, and then back off.”

“Persistence is important because the technology that drives Web3 is evolving rapidly and developer activity is growing rapidly, so it is important for brands to experiment now so that they can scale their Web3 projects as they grow. “

“With the recession in the US and the economic warnings from the IMF, many brands are withdrawing from Web3 and focusing on short-term issues,” she continued. “However, like Web 1.0 and Web 2.0, brands that do not innovate will be left behind.”

“Web3 adoption will be driven by Gen Z, which is 25% of the world’s population, so brands that don’t stay the course won’t prosper or join the group in 2027,” Mai said.

‘SuperApps’

Gartner also predicted that by 2027, 50% of the world’s population would be daily active users of multiple “superapps”.

SuperApps combine the features of an app, platform and ecosystem into a single program. Apart from its own set of functionalities, it provides a platform for add-ons by third parties.

“While most examples of SuperApps are mobile apps, the concept can also be applied to desktop client applications, such as Microsoft Teams and Slack, the key being that a SuperApp can consolidate and replace multiple apps for customer or employee use. Gartner Vice President and analyst Frances Karamouzis said in a statement.

Microsoft Teams Virtual Meeting Space

Team Virtual Meeting Space (Image Credit: Microsoft)


Enderle said multi-function apps have always attracted users.

“A single app that does a lot of things has always been attractive over multiple single-centric apps because people don’t want the complexity and learning curve associated with multiple apps,” he said. “So the relative simplicity, perceived cost, and usefulness of SuperApps make them attractive.”

SuperApps have been in the news lately because Elon Musk said he wants to buy Twitter as an accelerator to build one, Rubin explained.

“The model for this is WeChat in China, which is used for tasks as diverse as reading news, making payments and praising cars,” he said. “WeChat was able to develop its functionality partly because there were no major OS vendors and little competition from outside China.”

“There are high odds of it repeating its success outside of China,” he continued. Yet, for example, Apple already supports playing games and sending money through its Messages app, and Telegram supports add-on bot applications that can provide a lot of functionality beyond messaging. “

sustainable technology

One strategic trend that surpasses all others is sustainability, Gartner said. It cited one of its recent surveys where CEOs pointed out that environmental and social change are now the top three priorities for investors, followed by profit and revenue.

This means, it continued, that executives should invest more in innovative solutions designed to address [environmental, social, and governance] Seeking to meet sustainability goals.

,[I]n 2023, providing technology will not be enough,” said David Groombridge, Gartner’s vice president and analyst, in a statement.

“These themes are influenced by environmental, social and governance expectations and regulations, which translate into a shared responsibility to implement sustainable technologies,” he said in a statement.

“With future generations in mind, every technology investment will need to be set against its impact on the environment,” he said. “Sustainable by default as an objective requires sustainable technology.”

In five years, 40% of large organizations worldwide will use a combination of Web3, AR Cloud and Digital Twins in Metaverse projects aimed at revenue, research and advisory firm Gartner predicted Monday at its IT Symposium in Orlando, Fla. Was.

Gartner’s Metaverse prediction was part of a top 10 list of strategic technology trends released at the event.

The firm envisions a metaverse as a “collective virtual 3D shared space created virtually by the convergence of augmented physical and digital reality.” It is consistent and provides better immersive experiences, it added.

A full metaverse would be device independent and not owned by a single vendor, Gartner continued, and would be a virtual economy enabled by digital currencies and non-fungible tokens (NFTs).

Gartner’s prediction raised the eyebrows of some analysts. “It’s a little aggressive,” said Mark N. Venna, president and principal analyst at SmartTech Research in San Jose, Calif.

“The primary headwind for Metaverse in business is the arrival of the actual Metaverse app, which will have wider appeal with enterprise accounts,” he told TechNewsWorld.

“Some of this exists – and will continue to surface – in operational areas like inventory management, logistics and other verticals, but unless there is a Metaverse app, or app, that increases productivity, I think 40% is a stretch. ,” added Vena.

Metaverse or Metaverse?

Ross Rubin, principal analyst at Reticle Research, a consumer technology advisory firm in New York City, also sees some of the challenges that could hinder the spread of the metaverse in the enterprise.

“At a core level, we need improvements in device size and power efficiency and broader applications beyond the manufacturing, engineering and other industrial applications we see today,” he told TechNewsWorld.

“Beyond these AR-related improvements, however, there are open questions as to whether the Metaverse will evolve as a single, widely accessible platform like the Web, or whether companies will largely build their own applications as they go. Let’s do it with cloud technology. Today,” he continued.

“However,” Rubin said, “we’re starting to see some encouraging standard-setting here, like the Metaverse Standards Forum.”

Facebook’s owner Meta may also be contributing to the Metaverse traction problems, maintained Rob Enderle, president and principal analyst of Enderle Group, an advisory services firm in Bend, Ore.

“Facebook’s efforts are so bad that they are casting a cloud over the entire segment and, ironically, they are the biggest investors in it,” he told TechNewsWorld.

“Facebook is effectively giving a big indication on this segment that it’s fake,” he said, “even though Nvidia’s efforts seem to be working far better and are being implemented well by firms like BMW. This demonstrates the potential that Facebook is destroying right now.”

need patience

Impatience may also play a role in the company’s Metaverse persistence, noted Quinn Mai, CEO of Coulter, a digital marketing agency in New York City.

“As brands enter the metaverse, they are often disappointed upon arrival, not realizing that this is still a nascent but evolving platform,” she told TechNewsWorld. “They don’t see a large number of users in the metaverse like Decentraland or The Sandbox, and then back off.”

“Persistence is important because the technology that drives Web3 is evolving rapidly and developer activity is growing rapidly, so it is important for brands to experiment now so that they can scale their Web3 projects as they grow. “

“With the recession in the US and the economic warnings from the IMF, many brands are withdrawing from Web3 and focusing on short-term issues,” she continued. “However, like Web 1.0 and Web 2.0, brands that do not innovate will be left behind.”

“Web3 adoption will be driven by Gen Z, which is 25% of the world’s population, so brands that don’t stay the course won’t prosper or join the group in 2027,” Mai said.

‘SuperApps’

Gartner also predicted that by 2027, 50% of the world’s population would be daily active users of multiple “superapps”.

SuperApps combine the features of an app, platform and ecosystem into a single program. Apart from its own set of functionalities, it provides a platform for add-ons by third parties.

“While most examples of SuperApps are mobile apps, the concept can also be applied to desktop client applications, such as Microsoft Teams and Slack, the key being that a SuperApp can consolidate and replace multiple apps for customer or employee use. Gartner Vice President and analyst Frances Karamouzis said in a statement.

Microsoft Teams Virtual Meeting Space

Team Virtual Meeting Space (Image Credit: Microsoft)


Enderle said multi-function apps have always attracted users.

“A single app that does a lot of things has always been attractive over multiple single-centric apps because people don’t want the complexity and learning curve associated with multiple apps,” he said. “So the relative simplicity, perceived cost, and usefulness of SuperApps make them attractive.”

SuperApps have been in the news lately because Elon Musk said he wants to buy Twitter as an accelerator to build one, Rubin explained.

“The model for this is WeChat in China, which is used for tasks as diverse as reading news, making payments and praising cars,” he said. “WeChat was able to develop its functionality partly because there were no major OS vendors and little competition from outside China.”

“There are high odds of it repeating its success outside of China,” he continued. Yet, for example, Apple already supports playing games and sending money through its Messages app, and Telegram supports add-on bot applications that can provide a lot of functionality beyond messaging. “

sustainable technology

One strategic trend that surpasses all others is sustainability, Gartner said. It cited one of its recent surveys where CEOs pointed out that environmental and social change are now the top three priorities for investors, followed by profit and revenue.

This means, it continued, that executives should invest more in innovative solutions designed to address [environmental, social, and governance] Seeking to meet sustainability goals.

,[I]n 2023, providing technology will not be enough,” said David Groombridge, Gartner’s vice president and analyst, in a statement.

“These themes are influenced by environmental, social and governance expectations and regulations, which translate into a shared responsibility to implement sustainable technologies,” he said in a statement.

“With future generations in mind, every technology investment will need to be set against its impact on the environment,” he said. “Sustainable by default as an objective requires sustainable technology.”

Sharing high-resolution media online could inadvertently expose sensitive biometric data, according to a report released by a cyber security company on Tuesday.

This can be especially dangerous, said a 75-page report by Trend Micro, because people do not know they are exposing the information.

In the report, for example, the #EyeMakeup hashtag on Instagram, which has nearly 10 million posts, and the #EyeChallenge with more than two billion views, is enough to pass an iris scanner to uncover iris patterns.

“By publicly sharing certain types of content on social media, we give malicious actors the opportunity to source our biometrics,” the report states. “By posting our voice messages, we uncover voice patterns. By posting photo and video content, we highlight our face, retina, iris, ear-shaped patterns and, in some cases, palms and fingerprints. ,

“Since such data may be publicly available, we have limited control over its distribution,” it added. “Therefore we do not know who has already accessed the data, nor do we know for how long or for what purposes the data will be kept.”

not a panacea

The report covers what types of biometric data can be exposed on social media and outlines more than two dozen attack scenarios.

“The report suggests that biometric identification is not a panacea,” said Will Duffield, a policy analyst at the Cato Institute, a Washington, DC-based think tank.

“As we design detection systems, we need to be aware of technologies going down the pike and potential abuse in the real world,” he told TechNewsWorld.

“Trend Micro raises some valid concerns, but these concerns are not new to biometrics professionals,” Sami Alini, a biometrics specialist with Contrast Security, a maker of self-protection software solutions in Los Altos, Calif., told TechNewsWorld.

He said there are several ways to attack a biometric system, including a “presentation” attack described by the report, which substitutes a photo or other object for the biometric element.

To counter this, he continued, “viability” must be determined to ensure that the biometric presented is that of a living person and not a “replay” of a previously captured biometric.

Avi Turgman, CEO and co-founder of IronVest, an account and identity security company in New York City, agreed that “viability” is one key to thwarting attacks on biometric security.

“The Trend Micro report raises concerns about fraudulent biometrics created through social media content,” he told TechNewsWorld. “The real secret in fraud-proof biometrics is detecting liveliness, something that cannot be recreated through images and videos collected on social media.”

one factor not enough

Even when tested for liveability, biometrics can still be very easy to bypass, security awareness advocates at KnowBe4, a security awareness training provider in Clearwater, Fla., maintained.

“Holding the phone in front of a person’s face while sleeping can unlock the device, especially when they use it with the default settings, and collecting fingerprints is not a difficult task,” he told TechNewsWorld.

“What is even more worrying is that once the biometric factor is compromised, it cannot be changed like a password,” he said. “You can’t change your fingerprints or facial structure for a long time if you violate it.”

If the Trend Micro report shows anything, it’s that multi-factor authentication is a necessity, even if one of those factors is biometric.

“When used as a single factor for authentication, it is important to note that biometrics may be subject to failure or manipulation by a malicious user, particularly when that biometric data is publicly available on social media, Darren Guccione, CEO of Keeper Security, a password management and online storage company based in Chicago.

“As the capabilities of malicious actors using voice or facial biometric authentication continue to grow, it is imperative that all users implement multiple factors of authentication and use strong, unique passwords in their accounts to limit the blast radius. Apply if an authentication method is violated,” he told TechNewsWorld.

metaverse problems

“I don’t like to put all my eggs in one basket,” said Bill Malik, Trend Micro Vice President of Infrastructure Strategies. “Biometric is nice and useful, but having an additional factor of authentication gives me more confidence.”

“For most applications, a biometric and a PIN are fine,” he told TechNewsWorld. “When a biometric is used alone, it’s really easy to create.”

He stressed that the collection of biometric data will become an even greater problem when the metaverse becomes more popular.

“When you get into the metaverse, it’s going to get worse,” he said. “You’re putting on these $1,500 glasses that are designed to not only give you a realistic view of the world, but to find out what you like and don’t like about the world you see.” We are constantly monitoring your subtle expressions to find out.

However, he is not concerned that additional biometric data is being used by Digital Desperado to create deepfake clones. “Hackers are lazy, and they get everything they need with simple phishing attacks,” he declared. “So they’re not going to spend a lot of money for a supercomputer so they can clone someone.”

Device tied biometrics

Another way to secure biometric authentication is to tie it to a piece of hardware. With a biometric enrolled on a specific device, it can only be used to authenticate the user with that device.

Reed McGinley-Stempel, co-founder and CEO of Stitch, a passwordless authentication company in San Francisco, said, “This is the way Apple and Google’s biometric products work today — it’s not just the biometrics that you get when you use Face ID. Let’s check the time.”

“When you actually do a Face ID check on your iPhone, it checks that the current biometric check matches the biometric enrollment that’s stored in your device’s secure enclave,” he told TechNewsWorld.

“In this model,” he continued, “the threat of someone accessing your photos or fingerprinting yours doesn’t help them unless they have control over your physical device, which is something for attackers to climb into.” There is a very steep hill for the remote nature in which the cyber attackers operate.”

losing control of our data

The Trend Micro report states that as users, we are losing control over our data and its future uses, and the common user may not be well aware of the risks posed by the platforms we use every day. Is.

Data from social media networks is already being used by governments and even startups to extract biometrics and create identity models for surveillance cameras, it continued.

The fact that our biometric data cannot be changed means that in the future, such a wealth of data will be increasingly useful to criminals, it added.

Whether that future is five or 20 years ahead, the data is available now, it said. We are indebted to our future selves for taking precautions today to protect ourselves in tomorrow’s world.


trend micro report, Leaked Today, Exploited for Life: How social media biometric patterns affect your futureAvailable here in PDF format. No form is required to be filled at the time of this publication.