Pandemic aside, 2022 could be a revolutionary year of change for technology. When telepathic tweets meet quantum cryptography and virtual reality living clashes with data protection, what can we expect in 2022?
Jan 12, 2022 · 6 min read
Seventy-one percent of people in the US are working from home. Research from December 2020 also found that more that half of these people would like to continue working from home after the pandemic.
With the sudden shift from office to home, most of us didn’t know how to secure ourselves and our devices properly while online. That meant that cyberattacks almost quadrupled during the thickest part of the COVID-19 outbreak.
With a brand-new perspective, companies are more likely to invest in decent cybersecurity, which could soften the impact that cyberattacks have on companies. Working from home might also inspire people to be more proactive about their personal online security.
This month, a paralyzed man sent the first ever “direct thought” tweet. How? Synchron. The company has just developed an endovascular brain computing interface, which is attached through the patient’s jugular vein to avoid invasive brain surgery.
Add Elon Musk’s Neuralink to the mix, and we just might be on the verge of commercializing neural-bionic technology.
The Metaverse has been considered laughable, catastrophic, life-changing, and revolutionary, all at once. If virtual reality and augmented reality become an essential way of life, the opportunities for data collection will be lucrative, to say the least.
From a technology standpoint, the metaverse could be the catalyst which sees VR progressing beyond our imagination. Likewise, the progress of virtual reality technology could dwindle if the metaverse isn’t adopted.
The fact that cryptocurrency is decentralized is what makes it so unique. In the future, we may find that centralized banks and governments try to take this decentralization away. They could do so by creating their own currencies that carry the crypto name but closely resemble their fiat counterparts.
Companies still need to measure the productivity of their employees as they work from home, and productivity apps will be their tools of choice.
Apps like DeskTime, StaffCop, and Hubstaff have enabled managers to drill down into the specific activities of each employee. Hubstaff implements random screen capture, which can be set to report once, twice, or three times per minute, and Teramind logs all keyboard activity and forms user-based behavior analytics.
How much of your data are you willing to let your employer have? And will productivity apps be a fair price to pay for a more flexible life? Most companies are probably weighing up these moral, ethical, and corporate issues at this very moment.
In 2021, nearly 70% of ransomware attacks on companies used RaaS. That usually means entire company systems are frozen and held to eye-wateringly high ransom.
Given the success of these ransoms being paid, ransomware software will be in demand, developed at a higher rate, and likely sold on the dark web to hackers.
Multiple middlemen are involved in producing a single product. And attacking an aspect of a company's supply chain may become a popular way to demand ransom.
For example, if an AI supplier contributes to five leading supermarket self-checkout systems, they’re under immense pressure to cave in to ransom demands.
Hackers may also target suppliers more post-pandemic. These suppliers will need to recover from massive hits in revenue and can’t afford to lose any more business.
Over 200M people had their internet cut off by their governments in 2020. The people of Kashmir,Uganda, and Myanmar were all silenced in internet blackouts, which were imposed by their governments during elections or political upheavals.
Political regimes are continuing to use the internet as a powerful control mechanism. Up by 49% from 2019, government-imposed internet blackouts are likely to become more frequent in 2022.
With the growing use of surveillance in our societies, it's only a matter of time before spyware is weaponized by intelligence agencies. After all, their findings can be meshed with other surveillance data from multiple sources.
Apple, for instance, proposed “NeuralMatch” this year. It is a tool that scans all of your iPhone photos before they’re uploaded to iCloud to combat sexual-related crimes. But plans have been postponed since users think that Apple could also use this tool to monitor our general everyday activities.
Operating in the background, however, we still have the 14 Eyes Alliance, the members of which track and exchange information on their citizens. Adding to this is the general data snooping by your ISP, as well the depressing estimate of there being one street camera for every 14 people in the UK.
Quantum computing has been applied to weather forecasting, machine learning, drug design, logistics, and financial modeling. But like any emerging technology, it needs securing, which is why we think that quantum cryptography will mature alongside quantum computing.
Quantum cryptography uses quantum physics to encrypt and transmit data to help prevent it from being hacked. It works by sending photons, or quantum particles of light, across an optical link. Traditional cryptography uses mathematical computations or algorithms to encrypt data.
Experts believe that quantum cryptography is virtually unbreakable, however, it could disrupt classical encryption that we currently use, so the cybersecurity world has a lot to prepare for.
As another emerging technology, AI systems that aren’t secured properly could make an easy target for hackers. What’s worrying is that when it comes to new technology, vulnerabilities are often realized only once they’ve been exploited.
“Ring” doorbells, Amazon Alexa, and Google Assistant have all been at the center of privacy scandals and malfunctioning. In 2019, a woman in the US discovered that her Echo had sent recordings of her private conversations to her husband's work colleague. Meanwhile, various researchers are reportedly able to command Google Assistant with the “ultrasonic wave trick.”
With the number of vulnerabilities in our current AI systems, new cybersecurity tools are bound to emerge in 2022.
Quantum threat and machine-learning takeovers aside, bad passwords are still one of the biggest threats to our safety.
In 2021, millions of people had their data stolen from reputable companies or had their online accounts broken into. A popular way to hack accounts is by using abrute-force attack, where millions of password and username combinations are tried against a system per second until one sticks.
Worryingly, NordPass research found that “123456” is still the most popular password, making it even easier for criminals to steal your personal information.
Eighty-five percent of all cybersecurity breaches are caused by the “human element.” Carelessness, weak passwords, and lack of cybersecurity knowledge are just a few of the reasons why cyberattacks like phishing and spoofingalmost double year after year.
In a way, this is good news because it means we’re more than capable of taking control of our own security to avoid cybercriminals.
The problem is that there are multiple ways someone could get all of your stored passwords.Instead, store all of your passwords in a secure, encrypted password manager like NordPass.It’ll sync with your device and transfer all of your passwords over in minutes.