article thumbnail

Is the Grid Secure Enough for the Electric Vehicle Influx?

IT Security Guru

Two goods have emerged as the most popular: cryptocurrencies and electric vehicles. According to a forecast by the International Energy Agency (IEA), electric car sales are expected to reach an all-time high in 2022. million EVs in the United States utilizes less than 0.5 percent of the total energy produced in 2021.

article thumbnail

Cybersecurity threats: what awaits us in 2023?

SecureList

The ongoing geopolitical storm brings not only classical cyberthreats for business, but also unpredictable risks and ‘black swans’ The main problem for 2023 will be supply-chain stability and cybersecurity. The economic downturn (caused by energy prices, inflation, sanctions, etc.) Vulnerabilities in Autonomous Vehicles.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spam and phishing in 2022

SecureList

If the movie lover entered their bank card details on the fake site, they risked paying more than the displayed amount for content that did not exist and sharing their card details with the scammers. Soccer fans chasing merchandise risked compromising their bank cards or just losing some money.

article thumbnail

Navy Insider Threat Bust: Encryption, Social Engineering, and Crypto

SecureWorld News

They are words that could strike fear into the heart of a CISO, Chief Risk Officer, or corporate counsel. Tools involved digital media, encrypted communication, cryptocurrency, and secret data handoffs. Could your organization have an insider threat attempting to utilize these same methods and technologies?

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Since blockchain’s arrival, cryptocurrency has framed the technology as permissionless, or a public blockchain. For advantages, private blockchains are more scalable and energy-efficient with suggested use cases of banking and supply chain management. Mitigating risk of false key propagation and identity theft. Block Armour.

article thumbnail

The Marvels and Challenges of AI

Webroot

In finance, algorithms handle stock trading, fraud detection, and credit risk assessment. Financial institutions assess investment risks, adapting to market dynamics. Energy efficiency Smart grids balance energy supply and demand, minimizing wastage. Renewable energy sources integrate seamlessly into the grid.

article thumbnail

Advanced threat predictions for 2024

SecureList

APT targeting turns toward satellite technologies, producers and operators The only known case of an attack utilizing satellite technologies that happened in recent years was the KA-SAT network hack of 2022. iOS devices may not be the only targets: other devices and operating systems could also face risks.

Hacking 110