Tag

Top

Browsing

While founder and CEO Elon Musk’s unpredictable management of Twitter has forced Tesla stock into a sharp decline, the carmaker’s models remain popular through most of 2022, according to Cox Automotive’s Kelley Blue Book.

For the first nine months of 2022, it was reported that four of the top six best-selling electric cars were Teslas. At the top of the rankings were the Tesla Model Y, with 191,451 units sold, and the Model 3, with 156,357 units. The Ford Mustang Mach-E stood third with 28,089 units.

“With all the negative headlines surrounding Tesla and its increasingly controversial CEO Elon Musk in recent weeks, it’s easy to forget that the company’s cars are still very popular,” data journalist Felix Richter wrote Tuesday on Statista.

“While it is too early to say whether Musk’s Twitter acquisition and the unrest that accompanied it will have a significant negative impact on demand for Tesla’s cars,” he continued, “its current position as the maker of the most popular electric cars in the United States And evident in many parts of the world.”

power of the first mover

In the EV space, Tesla has been wildly popular, and it remains so, observed Brent Gruber, executive director of global automotive at JD Power, a consumer research, data and analytics firm based in Troy, Michigan.

Citing data from JDP’s December survey, Gruber said that four out of 10 buyers looking to buy a vehicle in the next 12 months are “very” or “somewhat” likely to buy an EV. Considering the Tesla brand. “It’s second only to Chevrolet,” Gruber told TechNewsWorld.

“However,” he continued, “the percentage of those potential EV shoppers who are considering Tesla has declined by five percentage points since November.”

Chris Jones, principal analyst at global market research company Canalys, said Tesla still benefits from being a first mover in the EV market.

“There was very little competition, and there still isn’t much competition,” Jones told TechNewsWorld.

“Tesla also had a status appeal that the Nissan Leaf, Chevy Volt, BMW i3 didn’t have at the time,” he added.

Another attractive feature for early customers, he continued, were over-the-air updates to Tesla’s software. “Now only some of its competitors can do that,” he said. “So Tesla was a decade ahead in software updates and the ability to make the vehicle better when it was out of date.”

Charging Advantage

Being a “pure play” electric car company that works at scale is another advantage Tesla has in the market — in addition to being the only EV maker with a charging network, said Rob Enderle, president and principal analyst at the Enderle Group. An advisory services firm in Bend, Ore.

“Other car companies are ramping up their electric vehicles, but they are facing supply problems due to the pandemic, war and other supply issues,” Enderle told TechNewsWorld.

This chart shows the best-selling electric cars in the US for the first nine months of 2022.

Chart credit: Statista


Tesla’s charging network is a key element of its offering, maintained Mike Ramsey, vice president and analyst for automotive and smart mobility at Gartner. “Their charging network is a fundamental differentiator between them and other brands selling electric vehicles,” he told TechNewsWorld.

Gruber said vehicle charging is one of Tesla’s notable advantages over its competitors. In JDP’s 2022 charging studies, Tesla received awards for highest satisfaction with Level 2 permanently attached home chargers, public Level 2 charging and DC fast charging.

In the public charging study, Gruber observed that the wide availability of the Tesla charging network, ease of use – especially with the payment/account process – and network reliability helped the network perform well.

Ease of use was also one of the standout metrics for Tesla in the home charging study, he said.

bumpy road ahead

While 2022 has been a good year for Tesla sales, storm clouds may be on the horizon. “Musk’s Twitter escapades, coupled with his move to the political right, have alienated the typical left-leaning Tesla buyer, hurting sales and forcing rebates and other practices to move vehicles.” ,” Enderle maintained.

“Our local Tesla dealer appears to be up to its neck in overstock due to slow sales, suggesting Tesla numbers may be in transition or overpriced,” he said.

“Since Tesla sells through their own stores, there is no third party verification of their sales numbers, and they have been going to promote rapidly declining valuations for some time now,” he explained.

“As FTX showed,” he continued, “oversight on corporations is almost non-existent, which calls into question much of what is reported by every public company, especially those under high stress like Tesla and Twitter. “

The competition is also heating up. “Buyers have an increasing selection of EVs to choose from,” Gruber said.

“The number of products coming from OEMs is growing rapidly,” he continued. “Those products now fill vacancies in popular segments and brands with high loyalty rates, such as the Ford F-150 Lightning and Toyota bZ4X.”

“Competition is increasing, and we’re seeing it in our data,” he said.

musk chakra

Ramsey agreed that competition will be a future challenge for Tesla. “They showed the way for startups like Rivian and Lucid,” he said. “Those guys are going to get stronger and stronger.”

“Meanwhile, traditional car companies are adding more and more electric vehicles to their lineups that are going to be a lot more affordable than Tesla,” he observed.

“New competitors like Lucid and Rivian are causing Tesla pain,” Enderle said. Anecdotally, he notes that two of his neighbors now have Rivian, and one who owns a Tesla is considering a Rivian.

“Plus,” he continued, “better electric vehicle solutions from various carmakers will put more pressure on the company, but the firm’s biggest problem is Musk, and fixing him has proven problematic.”

“They forced Tesla to provide incentives to sell cars, resulting in a massive drop in Tesla’s valuation and Musk’s net worth,” he added. “It has also increased the number of potential Tesla buyers considering alternatives.”

Ramsey pointed out, however, that Tesla’s CEO has long been a mix for the company. “Since the company’s inception, Elon Musk has been key to Tesla’s success and the source of some of its problems,” he said. “He’s gone through periods where he’s had more losses than gains, but it goes in cycles.”

A new analysis of data from the FBI’s Internet Crime Complaint Center (IC3) shows that Nevada has the most cybercrime victims by a larger margin than any other state in the union – 801 per 100,000 Internet users, four times the national average. .

An analysis by Surfshark, a privacy protection toolset developer based in Lithuania, states that the most common cybercrime committed in Nevada is identity theft, which may be because it is home to Las Vegas.

“With Nevada, it is easy to predict that identity thieves are targeting tourists who gamble,” said Mike Parkin, a senior technical engineer at Vulkan Cyber, a SaaS for enterprise cyber risk prevention in Tel Aviv, Israel. one provider told TechNewsWorld.

In 2021, Surfshark analysts said, there were 9,054 victims of identity theft in Nevada or 49% of all cybercrime victims.

Other states with high cybercrime victim rates per 100,000 Internet users include Iowa (342), Alaska (322), and Florida (293).

“These statistics from the FBI’s IC3 division help paint the overall picture of identity crimes committed each year in the US,” said James E. Lee, chief operating officer of the Identity Theft Resource Center (ITRC) in San Diego.

“When you add up the more than 1.4 million reports of identity theft filed with the FTC in 2021, the 15,000 ID crime victims who contacted the ITRC in 2021, and the 190 million victims of data compromise tracked by the ITRC in 2021, So you start to look at the enormity of the problem presented by identity crimes,” Lee told TechNewsWorld.

“The bottom line is this: There are more identity theft crimes reported each year in the US than all other crimes except theft combined,” he said. “And the volume and velocity of identity crimes continue to increase, along with their financial impact.”

purp hotbed

Nevada is also a hotbed for cybercriminals, with 150 cybercriminals per 100,000 Internet users, nearly three times the national average, according to analysts.

He explained that although threat actors outside the United States commit many cyber crimes, the FBI has identified a significant number of cyber criminals within US borders. In most cases, the FBI can identify the specific state where a cybercriminal is located, allowing them to see which states have the most cybercriminals per capita.

Only two other states reached triple digits in percentage per 100,000 Internet users: Delaware (120) and Maryland (113).

“It is interesting that Nevada had both the highest victims and highest offenders, while Nevada was in the bottom three in terms of victim harm,” Parkin observed.

According to analysts, the average victim of cybercrime in Nevada loses $4,728 per scam, while scammers average $4,280 per swindled in West Virginia and $3,820 in Iowa.

“Without a deeper analysis, it is difficult to say why the numbers are trending this way,” Parkin continued, “although Nevada is unique in demographics, local culture, and major industries, which may all play a role.”

badlands bad men

“Cybercrime is a growing concern in Nevada and across the country,” said John T. Sandler, spokesman for Nevada Attorney General Aaron D. Ford.

“Our office has conducted extensive campaigns to educate Nevadans about the many different ways scammers like to target residents in their daily lives,” Sandler told TechNewsWorld. “These include phishing, romance, solicitation, gift card, holiday and government fraud scams.”

“AG Ford also joins a bipartisan coalition of attorneys general urging the FTC to adopt a national rule targeting impersonation scams,” he said.

While Nevada has the lowest losses for cybercrime victims, North Dakota has the highest losses at $31,711 per scam.

Analysts said studies have shown that the two most vulnerable age groups to cybercrime are youth under 25 and people 75 and older. He argued that 41% of North Dakota’s population is in those age groups which may contribute to that high loss figure.

However, Parkin pointed out that North Dakota’s small population, 774,948, may have influenced the statistics in the analysis.

Although the most profitable cybercrimes nationally are fund transfers via email and fake investment schemes, this is not the case in North Dakota, where 50% of money lost in cybercrime – $12.1 million – was committed by pretending to be friends or family. Lost to bandits, or romantic online relationships.

Other states with high per capita losses from cybercrime include New York ($19,266), South Dakota ($19,065), and California ($18,302).

Seniors most targeted

The analysts also revealed that the average cyberthief clears $14,048 per scam, but that too, from a state between Colorado ($33,605), Louisiana ($31,064), New York ($29,919) and Wyoming ($27,918) There can be a lot of ups and downs in other states. Highest. Among the lowest were West Virginia ($2,630), Nebraska ($4,148), Montana ($4,327), and Connecticut ($4,394).

In states where criminals commit the most thefts, cybercriminals are increasingly targeting small to medium-sized businesses with financial capital, analysts said.

He said the most profitable cybercrime in New York was investment scams, accounting for 34% of all money lost due to cybercrime in 2021. By comparison, only 19% of all money swindled through cybercrime nationwide in 2021 were investment scams.

Analysts said that the age group most prone to cyber crimes are seniors. In 2021, $1.7 billion is expected to be paid to 92,371 Americans age 60 and older.

Analysts say that while senior citizens have been the worst hit by cybercrime, other age groups have been disproportionately victimized. For example, people in the 40 to 49 year old group represent only 12.4% of the population, but account for 20.8% of all cybercrime victims in the United States. On the other side of the coin, people under the age of 20 represent 24.8% of the population, but only 3.5% of cybercrime victims.

There are also some variations by state, analysts said. For example, in 16 states, the most targeted age group was 59 and under, and in Iowa, the most targeted group was 20 to 29-year-olds.

“From a ‘who can I steal from’ perspective,” Parkin said, “children and the elderly are probably easier targets than people in the 40 to 49 range, but they are likely to have fewer resources to target.”

Analyzing cyber crime on a state-by-state basis can be useful for criminals, he said. “Understanding victims and target demographics can be used to develop specific techniques to help prevent attacks,” he added. “It may also help to understand why attacks are more or less effective in different regions.”

Nearly all the top 10 universities in the United States, United Kingdom and Australia are putting their students, faculty and staff at risk of compromising email by failing to prevent attackers from spoofing the email domains of schools.

Universities in the United States are most at risk with the worst levels of security, followed by the United Kingdom, then Australia, according to a report released Tuesday by enterprise security company Proofpoint.

The report is based on an analysis of Domain-Based Message Authentication, Reporting and Conformance (DMARC) records in schools. DMARC is a nearly decade old email verification protocol used to authenticate the domain of an email message before it reaches its destination.

The protocol provides three levels of protection – Monitor, Quarantine, and the strongest level, Deny. The report found that none of the country’s top universities had a disallowed level of security enabled.

“Higher education institutions hold a greater proportion of sensitive personal and financial data, perhaps more than any industry outside of healthcare,” Ryan Kalember, Proofpoint’s executive vice president of cybersecurity strategy, said in a statement.

“Unfortunately, this makes these institutions a highly attractive target for cybercriminals,” he continued. “The pandemic and rapid changes in distance learning have further increased cybersecurity challenges for tertiary education institutions and open them up to significant risks from malicious email-based cyberattacks such as phishing.”

Barriers to Adoption of DMARC

Universities are not alone in poor DMARC implementation.

A recent analysis of 64 million domains globally by Red Sift, a London-based manufacturer of an integrated email and brand protection platform, found that only 2.1 percent of domains had implemented DMARC. Furthermore, only 28% of all publicly traded companies in the world have fully implemented the protocol, while 41% have only enabled its basic level.

There can be many reasons for not adopting DMARC by an organization. “There may be a lack of awareness of the importance of implementing DMARC policies, as well as companies not fully aware of how to begin implementing the protocol,” said Ryan Witt, Proofpoint Industries Solutions and Strategy Leader. Explained.

“Additionally,” he continued, “the lack of government policy to mandate DMARC as a requirement may be a contributing factor.”

“Further, with the pandemic and the current economy, organizations are struggling to change their business models, so competing priorities and lack of resources are also likely factors,” he said.

Installing the technology can also be challenging. Craig Lurey, CTO and co-founder of Keeper Security, a provider of zero-trust and zero-knowledge cybersecurity software in Chicago, explained, “This requires the ability to publish DNS records, which requires experience in systems and network administration. is needed.”

Furthermore, he told TechNewsWorld: “Many layers of setup are necessary to implement DMARC properly. This needs to be closely monitored during the implementation and rollout of the policy to ensure that legitimate email is not being blocked. ,

no bullets for spoofing

Nicole Hoffman, a senior cyber threat intelligence analyst at Digital Shadows, a provider of digital risk protection solutions in San Francisco, agreed that implementing DMARC can be a daunting task. “If implemented incorrectly, it can break things and disrupt business operations,” she told TechNewsWorld.

“Some organizations hire third parties to assist with implementation, but this requires financial resources that need to be approved,” she said.

He cautioned that DMARC will not protect against all forms of email domain spoofing.

“If you receive an email that appears to be from Bob on Google, but the email actually originated from Yahoo Mail, DMARC will detect it,” she explained. “However, if a threat actor registers a domain similar to that of Google, such as Google3, DMARC will not detect it.”

Unused domains can also be a way to avoid DMARC. “Domains that are registered but unused are also prone to email domain spoofing,” Luray explained. “Even when organizations have implemented DMARC on their primary domains, failing to enable DMARC on unused domains makes them potential targets for spoofing.”

Unique challenges of universities

Universities can have their own difficulties when it comes to implementing DMARC.

“Many times universities don’t have a centralized IT department,” Brian Westnage, Red Sift senior director of global channels, told TechNewsworld. “Each college has its own IT department operating in silos. This can make it a challenge to implement DMARC across the organization as everyone is doing something different with email. ,

Witt said the ever-changing student population at universities, coupled with a culture of openness and information-sharing, can often conflict with the rules and controls needed to effectively protect users and systems from attack and compromise.

In addition, he continued, many educational institutions have an affiliated health system, so they need to comply with the controls associated with a regulated industry.

Funding at universities could also be an issue, noted John Bumbank, the principle threat hunter of Netenrich, a San Jose, Calif.-based IT and digital security operations company. “The biggest challenge for universities is under-funding of security teams – if they have one – and under-funding of IT teams in general,” he told TechNewsWorld.

“Universities don’t pay particularly well, so part of it is the knowledge gap,” he said.

“Many universities have a culture against enforcing any policies that may hinder research,” he said. “When I worked at a university 15 years ago, there were knock-down drag-out fights against the mandatory antivirus on workstations.”

costly problem

Mark Arnold, vice president of advisory services at LARES, an information security consulting firm in Denver, noted domain spoofing is a significant threat to organizations and the technology of choice for threat actors to impersonate businesses and employees.

“Organizational threat models must account for this prevalent threat,” he told TechNewsWorld. “Implementing DMARC helps organizations filter and validate messages and thwart phishing campaigns and other commercial email agreements.”

Business email agreement (BEC) is probably the most costly problem of all cyber security, maintained Witt. According to the FBI, BEC thieves lost $43 billion between June 2016 and December 2021.

“Most people don’t realize how exceptionally easy it is to spoof email,” Witt said. “Anyone can send a BEC email to an intended target, and there is a high probability of it getting through, especially if the impersonated organization is not authenticating their email.”

“These messages often do not contain malicious links or attachments, bypassing traditional security solutions that analyze messages for these traits,” he continued. “Instead, emails are sent only with text designed to prepare the victim to act.”

“Domain spoofing, and its cousin typosquatting, are some of the lowest-hanging fruits for cybercriminals,” Bumbenek said. “If you can get people to click on your email because it looks like it’s coming from their own university, you’ll get a higher click-through rate and, by extension, more fraud damages, stolen credentials and more.” See you successful cybercrime.”

“In recent years,” he said, “attackers have been stealing students’ financial aid refunds. There is a lot of money to be made by criminals here.”