Remove 2030 Remove Artificial Intelligence Remove Media
article thumbnail

Elections 2024, artificial intelligence could upset world balances

Security Affairs

Governments should recognize electoral processes as critical infrastructure and enact laws to regulate the use of generative Artificial Intelligence. Artificial intelligence is undoubtedly a potent weapon in the hands of malicious actors who could exploit it to manipulate the outcome of elections.

article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

Enter Project 2030, a collaboration between Oxford Visiting Researcher Victoria Baines and Trend Micro Vice President of Security Research Rik Ferguson, which uses a mixture of survey data and forward-thinking understanding of technology to predict the infosec concerns a decade from now. AI could also bolster obfuscation techniques, he said.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Chief Brad Smith wants AI to be controlled by 2024

CyberSecurity Insiders

Microsoft President Brad Smith has issued a warning against the use of Artificial Intelligence technology and said that if the tech remains uncontrolled, and then it can spell doom on mankind by 2024. .

article thumbnail

Execs fear business setbacks from failure to keep up with ‘digital born’ competitors

SC Magazine

Respondents were asked to not only rank 36 macroeconomic, strategic and operational risks for 2021, but also to look out over the horizon and rate the expected impact of those risks in 2030. That specific risk tied to the ability to keep up with innovation moved from 18 th place in 2021 to third place in 2030.

Risk 90
article thumbnail

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Security Boulevard

These powerful quantum computers are expected to become generally available at some point between 2030 and 2040. The need to migrate to PQC stems from the ability quantum computers will have to decrypt data protected with todays public-key cryptographic algorithms.

Risk 69
article thumbnail

Advanced threat predictions for 2025

SecureList

These attacks were extremely carefully orchestrated – to conduct them, Lazarus stole the source code of a cryptocurrency-related computer game, promoted social media accounts related to that game, and obtained access to a unique chain of zero-day exploits used to infect targets visiting the game website.

IoT 117