{"id":28313,"date":"2023-09-02T06:54:23","date_gmt":"2023-09-02T10:54:23","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=28313"},"modified":"2023-10-20T05:06:08","modified_gmt":"2023-10-20T09:06:08","slug":"earth-2050-cybersecurity","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/earth-2050-cybersecurity\/28313\/","title":{"rendered":"Predictions for Earth 2050: How will cybersecurity change?"},"content":{"rendered":"<p>If you\u2019re like me, having a long-term vision is a wonderful aspiration\u2026 frequently quashed by today\u2019s more screamingly imminent \u2018to do\u2019 list. Five-year plan?\u00a0 I\u2019m still working on the next five days. But the next five minutes? That\u2019s a no-brainer: let\u2019s get immersed in the futuristic predictions for the world in 2050, and the evolving role of cybersecurity in it.<\/p>\n<h2>Cyber-immunity will intuitively protect our systems<\/h2>\n<h3><img decoding=\"async\" class=\"alignnone size-large wp-image-28362\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/09\/02201920\/Kaspersky-_Cyber-Immunity_inline-1024x765.jpg\" alt=\"\" width=\"1024\" height=\"765\"><br>\nPredicted by: Eugene Kaspersky, CEO, Kaspersky<\/h3>\n<p>In 2050, digital systems have moved up to a whole new level. They\u2019re no longer assistants making life easier for us mere mortals, they\u2019ve become the basis of civilization \u2013 the very framework keeping the world functioning properly.<\/p>\n<p>This quantum leap forward has generated new requirements for the reliability and stability of artificial intelligence (AI). Since the romantic era around the turn of the 21st century, cyberattacks are not yet extinct, but they\u2019re now only a threat to outliers who reject modern standards of digital immunity.<\/p>\n<p>One of the pillars of <a href=\"https:\/\/usa.kaspersky.com\/blog\/how-to-create-cyberimmune-system\/27437\/\" target=\"_blank\" rel=\"noopener\">cyber-immunity<\/a> is digital intuition, the ability of AI systems to make the right decisions in conditions where the source data is insufficient to make a rational choice.<\/p>\n<p>There\u2019s no mysticism here: digital intuition is the logical continuation of machine learning. When the number and complexity of related self-learning systems exceeds a certain threshold, the quality of decision-making rises to a level that eludes rational understanding. An intuitive solution results from the superimposition of the experience of a huge number of machine-learning models, much like the result of the calculations of a quantum computer.<\/p>\n<p>Digital intuition \u2013 with its ability to instantly, and correctly, respond to unknown challenges \u2013has helped build the digital security standards of this new technological era.<\/p>\n<h2>The robot servants are uprising<\/h2>\n<h3><img decoding=\"async\" class=\"alignnone\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/09\/02184314\/earth2050_cyber_robot_maid.jpg\" alt=\"Robot vacuum cleaner cleans the floor while someone sleeps nearby\" width=\"1000\" height=\"749\">Predicted by: Vitaly Kamluk, Director, Global Research &amp; Analysis Team, Kaspersky<\/h3>\n<p>Busy workers rejoice! Help for your home is arriving. A robot servant will cook your meals, do your laundry and clean your apartment. These autonomous systems will be able to carry out many complex tasks using the processing power of a central intelligent system, and in tricky situations, they\u2019ll switch to remote technical support managed by real people.<\/p>\n<p>There will be mass attempts to hack these <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/video-series\/ai-and-robots-will-take-all-our-jobs-tech-leaders-dont-think-so\/40344\/\" target=\"_blank\" rel=\"noopener nofollow\">helpful robots<\/a> by labor rights activists and criminals trying to blackmail their owners. Since the servants will all be equipped with cameras, microphones and sensors, they offer a unique viewing platform for home-based espionage. Expect compromises of the manufacturers\u2019 infrastructure and the implantation of malicious code in devices with the aim of enacting, en masse, attacks that could be serious.<\/p>\n<h2>The man(less) mining machine<\/h2>\n<h3><img decoding=\"async\" class=\"aligncenter wp-image-28885 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/07084040\/earth2050_mining-1-1-1024x769.jpeg\" alt=\"Robot in mining tunnel hacks at rock face with pick\" width=\"1024\" height=\"769\">Predicted by: Andrey Nikishin, formerly Future Technologies Project Director, Kaspersky<\/h3>\n<p>Mining is a fully automated process; people are not needed and former miners regain their health. One robot extracts rock from the soil, the second cleans it, the third guards the perimeter, while the fourth delivers the purified ore to industrial consumers.<\/p>\n<p>A hacker who gains access to the system can re-program individual robots so they take a small amount of the platinum ore to an unauthorized place. The <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/halodi-vr-robotics\/37849\/\" target=\"_blank\" rel=\"noopener nofollow\">guard robots<\/a> are also hacked, so they\u2019re unaware of this theft.<\/p>\n<h2>The big reveal of dynamic clothes<\/h2>\n<h3><img decoding=\"async\" class=\"alignnone wp-image-28887 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/09\/07084823\/earth2050-dynamic-clothes-1-1-1024x765.jpeg\" alt=\"Man surprised his clothes have disappeared while giving a presentation in front of colleagues\" width=\"1024\" height=\"765\"> Predicted by Vladislav Biryukov, Head of Consumer Social Media, Kaspersky<\/h3>\n<p>Dynamic clothing is <em>\u00e0 la mode<\/em>. The fabric\u2019s characteristics \u2013 color, pattern, lighting, transparency, and in advanced models, even the cut and length \u2013 can be automatically changed. Some people now wear shirts or dresses with variable transparency levels, which allows them to reveal more at any moment they choose. Few people \u2018program\u2019 their clothes by themselves; most enjoy free fashion patterns or, for the fashionistas, expensive programs from well-known designers.<\/p>\n<p>Initially lacking security, the process of getting a smart clothing upgrade has led to the emergence of a new kind of extortion. \u201cHeading to a business meeting, sir? Transfer 10 bitcoins to this account number now, or we\u2019ll expose you!\u201d.<\/p>\n<p>The naked truth in the boardroom. Awkward. Not quite the transparency in business we were hoping to achieve in 2050.<\/p>\n<h2>A quantum (computing) leap threatens cryptography<\/h2>\n<h3><img decoding=\"async\" class=\"aligncenter wp-image-28886 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/09\/07084333\/earth2050_quantum_cryptography-1-1-1024x764.jpeg\" alt=\"Person places a final piece into a digital puzzle\" width=\"1024\" height=\"764\"> Predicted by Alexey Malanov<\/h3>\n<p>Cryptography is widely used in many spheres of online activity. It\u2019s no exaggeration to say that the world will experience a huge shock if suddenly everything that\u2019s encrypted today is unlocked.<\/p>\n<p>How cryptography works: some operations can be easily carried out in one direction, but they\u2019re very difficult to reverse. For example, an image can be quickly transformed into a picture puzzle, but to arrange all of the pieces back into the picture takes much longer. Modern public-key cryptography is based on this principle: I know two numbers, I have multiplied them and told everyone the answer. Now everyone can encrypt a message for me using the result of the multiplication, but only I can decipher this using the original multipliers.<\/p>\n<p>There are already quantum computers that allow you to quickly solve problems that seem to be circuit-breaking for conventional computers, like how to de-compose a composite number. The only obstacle to the end of the digital world \u2013 let\u2019s call it \u2018cryptocalypse\u2019 \u2013 is that quantum computers can only work with small numbers.<\/p>\n<p>But by 2050, quantum computing will allow security services or master criminals to access universal decryption, and they may choose to do bad things with it. For example, if a villain steals your credit card, he or she will immediately know your PIN. The ability to decipher brings with it the opportunity to forge: an ATM informs the bank one thousand dollars are withdrawn, but the villain falsifies the message to say only 10 dollars were taken out. We will need to develop new safety standards \u2013 fast.<\/p>\n<p>On the bright side, encryption helps with verification so you can be sure you\u2019re actually on your real bank\u2019s website, not a cleverly cloned fake, when you wire the ransom to keep your business suit from turning into your birthday suit. Phew! One challenge solved.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How will cybersecurity change by 2050? Will quantum computing increase attacks, or will cyber-immunity protect our critical systems? Predictions from Kaspersky\u2019s security experts.<\/p>\n","protected":false},"author":2521,"featured_media":49081,"template":"","coauthors":[3452],"class_list":{"0":"post-28313","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-cybersecurity","7":"emagazine-category-future-tech","8":"emagazine-category-opinions","9":"emagazine-tag-earth-2050","10":"emagazine-tag-predictions"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/earth-2050-cybersecurity\/28313\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/earth-2050-cybersecurity\/20433\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/28313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/49081"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=28313"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=28313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}