The global cyber security market is forecast to grow to $345.4 billion by 2026, according to Statista. EPA
The global cyber security market is forecast to grow to $345.4 billion by 2026, according to Statista. EPA
The global cyber security market is forecast to grow to $345.4 billion by 2026, according to Statista. EPA
The global cyber security market is forecast to grow to $345.4 billion by 2026, according to Statista. EPA

Top 12 cyber crime trends to watch for in 2023


Alkesh Sharma
  • English
  • Arabic

The global cyber security market's size is expected to expand at a compound annual growth rate of 12 per cent from 2022 to 2030, from $184.93 billion last year, according to the US company Grand View Research.

The growing number of cyber attacks and the fast proliferation of online shopping platforms, increased adoption of cloud solutions and rapid expansion of smart machines and connected devices are some of the factors driving the market growth.

As the industry evolves at a prolific pace, The National looks at the top 12 cyber security threats and trends of the year ahead.

Digital DNA theft

If you have ever seen the sci-fi movie “The 6th Day”, we are on the same path for having replicas of our digital selves.

In 2023, deep fakes will become so authentic that not only will we see our digital identities being stolen, but also digital versions of our DNAs will be at risk, according to industry experts. Exposing our digital DNA on the internet will enable deep fakes to replicate and create digital humans.

Illustrations of video avatars created by Synthesia, an AI video platform that creates digital humans. Reuters
Illustrations of video avatars created by Synthesia, an AI video platform that creates digital humans. Reuters

A deep fake is a human impersonation created with advanced technologies, including artificial intelligence and machine learning.

Humans sync their physical lives on social media with constant uploads of photos, videos, audio and personal preferences with enough data points and some enhanced algorithms, said Joseph Carson, chief security scientist at California-based security firm Delinea.

“It is only a matter of time before attackers can create lifelike digital avatars of anyone, and it will be incredibly difficult to identify the difference without sophisticated technology to analyse the source data,” Mr Carson said.

Cyber attacks transferring between smart devices

Smart home and Internet of Thing (IoT) devices are increasingly being targeted by cyber criminals as the most vulnerable entry points to any home or business security network.

The typical cyber attack moves from hacker to device, but 2023 may bring cyber offensives that jump between smart devices, including wearable devices, voice-controlled assistants, smartphones and temperature-control equipment at home, experts said.

Humans sync their physical lives on social media with constant uploads of photos, videos, audio and personal preferences. AP
Humans sync their physical lives on social media with constant uploads of photos, videos, audio and personal preferences. AP

Factors such as extensive connectivity, widespread sharing of data among devices and reliance on weak security networks will rapidly orchestrate such attacks.

Strategies to thwart supply chain threats

The scope of threats related to supply chains has never been higher.

Attackers now have more resources and tools at their disposal to disrupt supply chains that are crucial to maintain adequate supply of goods and services, especially during the pandemics such as Covid-19.

The standard diligence and security assessments that chief security officers have performed on third parties are no longer adequate given the escalating frequency and impact of supply chain attacks, experts said.

Regulations, such as the EU Network and Information Security Directive 2.0, are forcing companies to conduct more frequent and dynamic assessments of their supply chain risk and to better control the access third parties have to their networks.

Camera-based malware is here

Don’t let your camera’s viewfinder deceive you.

The camera on the mobile devices is a powerful tool for documenting memories and daily lives. These cameras have been augmented with software algorithms to recognise AI tools to enhance the quality of pictures and videos.

“In 2023, [we] expect to see the first of many exploits that challenge smart cameras and the technology embedded within to leverage vulnerabilities,” said Brian Chappell, chief security strategist at cyber security firm BeyondTrust for Europe, Middle East, Africa and Asia Pacific.

Smartphone camera technology can itself become exploitable for malware execution, experts said. Bloomberg
Smartphone camera technology can itself become exploitable for malware execution, experts said. Bloomberg

“The technology may itself become exploitable for malware execution. This malicious behaviour … can obfuscate sensitive information, provide misinformation, embed malware or perform some other form of misdirection based on the content.”

QR code threat getting real

A QR code is a machine-readable code used for storing information for reading by a smart device. It is just like a digital business card that usually has various details such as phone number, email and home address.

When you scan a compromised QR code, it could send your location coordinates to a geolocation-enabled application and can also automatically redirect you to a malicious website.

Organisations at risk of becoming cyber insurable

With more organisations aiming to buy cyber insurance as a financial safety net to protect their businesses from serious financial exposure resulting from data breaches and ransomware attacks, the need to get a solid cyber strategy in place will be mandated to get insurance.

“The days of cheap and easy are over,” said Mr Carson.

As of the second quarter of 2022, the US cyber-insurance prices increased 79 per cent over the prior year, according to Marsh global insurance market index.

“The truth is, it is becoming downright difficult to obtain quality cyber insurance at a reasonable rate. In 2023, more businesses will face the stark realisation that they are not cyber insurable,” said Mr Chappell.

Death of personal password

The growth of non-password-based primary authentication could finally spell the end of the personal password in 2023 and in the years to come, experts said.

More applications, not just the operating system itself, will start using advanced non-password technologies, such as biometrics, either to authenticate directly or leverage biometric technology, like Microsoft Hello, Apple FaceID or TouchID, to authorise access.

More applications will start using advanced non-password technologies, such as biometrics, experts said. EPA
More applications will start using advanced non-password technologies, such as biometrics, experts said. EPA

“Personal accounts are still commonly backed by passwords as the ultimate fallback, but the need to remember, retrieve and type passwords is going to dwindle rapidly as the technology to reliably recognise us improves,” Mr Chappell said.

Jump of ransomware

The use of ransomware has picked up pace and became more dangerous in 2022. It will continue its rapid rise next year and its variations will increase with the frequency of attacks.

A recent report by security firm Cybereason found that 73 per cent of organisations suffered at least one ransomware attack in 2022, compared with just 55 per cent in 2021.

“With ransomware continuing to adapt with different enhancements, we must always be flexible to change,” Mr Carson said.

Taking EVs and autonomous technology off-road

As electric vehicles and autonomous technology aim to become mainstream, they also carry the threat of increased cyber attacks.

Threat actors could disable vehicle’s display screens, entertainment, navigation, climate controls, and even the ability to call for help using the car’s system. This could be more dangerous when autonomous driving truly goes mainstream.

“Expect to see everything from custom displays to malware using car resources for crypto mining. In the next decade, this will be a risk surface and viable commercial market no one should ignore,” said Morey J Haber, chief security officer at BeyondTrust for Europe, Middle East, Africa and Asia-Pacific.

Causing more blackouts

An increase in the number of cyber attacks on energy production and distribution networks will lead to power outages, fuel shortages and heating or cooling resource depletion.

While a fault in any energy source can drive prices higher, the threat of an intentional disruption could leave people out in the cold or completely disrupt electronic transaction processing, said Mr Haber.

“Threat actors recognise this weakness, and we should expect nation-states and opportunistic cyber-organised crime syndicates to refine their methods to target energy sectors.”

Multi-factor authentication invincibility fails

In 2022, threat actors, such as Lapsus$, exposed the shortcomings of multi-factor authentication. The terms MFA bombing, MFA bypass, and MFA fatigue all leapt into the cyber security lexicon.

In 2023, experts expect a new round of attack vectors that target and successfully bypass MFA strategies.

Lapsus$ bypasses MFA framework using techniques such as spamming original account holders. This year, some of its victims included Microsoft, T-Mobile and Nvidia.

Weaponising operational technology environments

Cyber criminals could weaponise operational technology environments to harm or kill humans, the Connecticut-based technology research and consulting company Gartner has said.

The use of ransomware has picked up pace and became more dangerous in 2022. Reuters
The use of ransomware has picked up pace and became more dangerous in 2022. Reuters

The OT is a type of computing and communication system – including both hardware and software – that controls industrial operations, mainly focusing on the physical devices and processes they use. It is used to gather and analyse data in real time, which is further used to monitor a manufacturing unit or to control equipment.

Various industries, such as telecoms and oil and gas, use OTs to ensure different devices work in co-ordination.

"OT that once had a single function and purpose is now becoming smarter, leveraging commercial operating systems and applications to perform expanded missions. As these devices expand in scope, their design is susceptible to vulnerabilities and exploitation," Mr Chappell said.

THE SPECS

Jaguar F-Pace SVR

Engine: 5-litre supercharged V8​​​​​​​

Transmission: 8-speed automatic

Power: 542bhp​​​​​​​

Torque: 680Nm​​​​​​​

Price: Dh465,071

SHOW COURTS ORDER OF PLAY

Wimbledon order of play on Tuesday, July 11
All times UAE ( 4 GMT)

Centre Court

Adrian Mannarino v Novak Djokovic (2)

Venus Williams (10) v Jelena Ostapenko (13)

Johanna Konta (6) v Simona Halep (2)

Court 1

Garbine Muguruza (14) v

Svetlana Kuznetsova (7)

Magdalena Rybarikova v Coco Vandeweghe (24) 

The%20Specs%20
%3Cp%3E%3Cstrong%3ELamborghini%20LM002%3C%2Fstrong%3E%3Cbr%3E%3Cstrong%3EEngine%3A%3C%2Fstrong%3E%205.2-litre%20V12%3Cbr%3E%3Cstrong%3EPower%3A%3C%2Fstrong%3E%20450hp%20at%206%2C800rpm%3Cbr%3E%3Cstrong%3ETorque%3A%20%3C%2Fstrong%3E500Nm%20at%204%2C500rpm%3Cbr%3E%3Cstrong%3ETransmission%3A%20%3C%2Fstrong%3EFive-speed%20manual%3Cbr%3E%3Cstrong%3E0-100kph%3A%3C%2Fstrong%3E%209%20seconds%20(approx)%3Cbr%3E%3Cstrong%3ETop%20speed%3A%3C%2Fstrong%3E%20210kph%20(approx)%3Cbr%3E%3Cstrong%3EYears%20built%3A%3C%2Fstrong%3E%201986-93%3Cbr%3E%3Cstrong%3ETotal%20vehicles%20built%3A%3C%2Fstrong%3E%20328%3Cbr%3E%3Cstrong%3EValue%20today%3A%3C%2Fstrong%3E%20%24300%2C000%2B%3Cbr%3E%3C%2Fp%3E%0A
10 tips for entry-level job seekers
  • Have an up-to-date, professional LinkedIn profile. If you don’t have a LinkedIn account, set one up today. Avoid poor-quality profile pictures with distracting backgrounds. Include a professional summary and begin to grow your network.
  • Keep track of the job trends in your sector through the news. Apply for job alerts at your dream organisations and the types of jobs you want – LinkedIn uses AI to share similar relevant jobs based on your selections.
  • Double check that you’ve highlighted relevant skills on your resume and LinkedIn profile.
  • For most entry-level jobs, your resume will first be filtered by an applicant tracking system for keywords. Look closely at the description of the job you are applying for and mirror the language as much as possible (while being honest and accurate about your skills and experience).
  • Keep your CV professional and in a simple format – make sure you tailor your cover letter and application to the company and role.
  • Go online and look for details on job specifications for your target position. Make a list of skills required and set yourself some learning goals to tick off all the necessary skills one by one.
  • Don’t be afraid to reach outside your immediate friends and family to other acquaintances and let them know you are looking for new opportunities.
  • Make sure you’ve set your LinkedIn profile to signal that you are “open to opportunities”. Also be sure to use LinkedIn to search for people who are still actively hiring by searching for those that have the headline “I’m hiring” or “We’re hiring” in their profile.
  • Prepare for online interviews using mock interview tools. Even before landing interviews, it can be useful to start practising.
  • Be professional and patient. Always be professional with whoever you are interacting with throughout your search process, this will be remembered. You need to be patient, dedicated and not give up on your search. Candidates need to make sure they are following up appropriately for roles they have applied.

Arda Atalay, head of Mena private sector at LinkedIn Talent Solutions, Rudy Bier, managing partner of Kinetic Business Solutions and Ben Kinerman Daltrey, co-founder of KinFitz

The five pillars of Islam

1. Fasting

2. Prayer

3. Hajj

4. Shahada

5. Zakat 

Forced%20Deportations
%3Cp%3EWhile%20the%20Lebanese%20government%20has%20deported%20a%20number%20of%20refugees%20back%20to%20Syria%20since%202011%2C%20the%20latest%20round%20is%20the%20first%20en-mass%20campaign%20of%20its%20kind%2C%20say%20the%20Access%20Center%20for%20Human%20Rights%2C%20a%20non-governmental%20organization%20which%20monitors%20the%20conditions%20of%20Syrian%20refugees%20in%20Lebanon.%3C%2Fp%3E%0A%3Cp%3E%E2%80%9CIn%20the%20past%2C%20the%20Lebanese%20General%20Security%20was%20responsible%20for%20the%20forced%20deportation%20operations%20of%20refugees%2C%20after%20forcing%20them%20to%20sign%20papers%20stating%20that%20they%20wished%20to%20return%20to%20Syria%20of%20their%20own%20free%20will.%20Now%2C%20the%20Lebanese%20army%2C%20specifically%20military%20intelligence%2C%20is%20responsible%20for%20the%20security%20operation%2C%E2%80%9D%20said%20Mohammad%20Hasan%2C%20head%20of%20ACHR.%3Cbr%3EIn%20just%20the%20first%20four%20months%20of%202023%20the%20number%20of%20forced%20deportations%20is%20nearly%20double%20that%20of%20the%20entirety%20of%202022.%26nbsp%3B%3C%2Fp%3E%0A%3Cp%3ESince%20the%20beginning%20of%202023%2C%20ACHR%20has%20reported%20407%20forced%20deportations%20%E2%80%93%20200%20of%20which%20occurred%20in%20April%20alone.%26nbsp%3B%3C%2Fp%3E%0A%3Cp%3EIn%20comparison%2C%20just%20154%20people%20were%20forcfully%20deported%20in%202022.%3C%2Fp%3E%0A
Violence%20
%3Cp%3EInstances%20of%20violence%20against%20Syrian%20refugees%20are%20not%20uncommon.%3C%2Fp%3E%0A%3Cp%3EJust%20last%20month%2C%20security%20camera%20footage%20of%20men%20violently%20attacking%20and%20stabbing%20an%20employee%20at%20a%20mini-market%20went%20viral.%20The%20store%E2%80%99s%20employees%20had%20engaged%20in%20a%20verbal%20altercation%20with%20the%20men%20who%20had%20come%20to%20enforce%20an%20order%20to%20shutter%20shops%2C%20following%20the%20announcement%20of%20a%20municipal%20curfew%20for%20Syrian%20refugees.%3Cbr%3E%E2%80%9CThey%20thought%20they%20were%20Syrian%2C%E2%80%9D%20said%20the%20mayor%20of%20the%20Nahr%20el%20Bared%20municipality%2C%20Charbel%20Bou%20Raad%2C%20of%20the%20attackers.%3Cbr%3EIt%20later%20emerged%20the%20beaten%20employees%20were%20Lebanese.%20But%20the%20video%20was%20an%20exemplary%20instance%20of%20violence%20at%20a%20time%20when%20anti-Syrian%20rhetoric%20is%20particularly%20heated%20as%20Lebanese%20politicians%20call%20for%20the%20return%20of%20Syrian%20refugees%20to%20Syria.%3Cbr%3E%3Cbr%3E%3C%2Fp%3E%0A
Jetour T1 specs

Engine: 2-litre turbocharged

Power: 254hp

Torque: 390Nm

Price: From Dh126,000

Available: Now

The Matrix Resurrections

Director: Lana Wachowski

Stars:  Keanu Reeves, Carrie-Anne Moss, Jessica Henwick 

Rating:****

The biogs

Name: Zinah Madi

Occupation: Co-founder of Dots and links

Nationality: Syrian

Family: Married, Mother of Tala, 18, Sharif, 14, Kareem, 2

Favourite Quote: “There is only one way to succeed in anything, and that is to give it everything.”

 

Name: Razan Nabulsi

Occupation: Co-founder of Dots and Links

Nationality: Jordanian

Family: Married, Mother of Yahya, 3.5

Favourite Quote: A Chinese proverb that says: “Be not afraid of moving slowly, be afraid only of standing still.”

Our legal columnist

Name: Yousef Al Bahar

Advocate at Al Bahar & Associate Advocates and Legal Consultants, established in 1994

Education: Mr Al Bahar was born in 1979 and graduated in 2008 from the Judicial Institute. He took after his father, who was one of the first Emirati lawyers

The specs

Engine: 2.0-litre 4cyl turbo

Power: 261hp at 5,500rpm

Torque: 405Nm at 1,750-3,500rpm

Transmission: 9-speed auto

Fuel consumption: 6.9L/100km

On sale: Now

Price: From Dh117,059

SPEC%20SHEET%3A%20APPLE%20M3%20MACBOOK%20AIR%20(13%22)
%3Cp%3E%3Cstrong%3EProcessor%3A%3C%2Fstrong%3E%20Apple%20M3%2C%208-core%20CPU%2C%20up%20to%2010-core%20CPU%2C%2016-core%20Neural%20Engine%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EDisplay%3A%3C%2Fstrong%3E%2013.6-inch%20Liquid%20Retina%2C%202560%20x%201664%2C%20224ppi%2C%20500%20nits%2C%20True%20Tone%2C%20wide%20colour%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EMemory%3A%3C%2Fstrong%3E%208%2F16%2F24GB%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EStorage%3A%3C%2Fstrong%3E%20256%2F512GB%20%2F%201%2F2TB%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EI%2FO%3A%3C%2Fstrong%3E%20Thunderbolt%203%2FUSB-4%20(2)%2C%203.5mm%20audio%2C%20Touch%20ID%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EConnectivity%3A%3C%2Fstrong%3E%20Wi-Fi%206E%2C%20Bluetooth%205.3%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EBattery%3A%3C%2Fstrong%3E%2052.6Wh%20lithium-polymer%2C%20up%20to%2018%20hours%2C%20MagSafe%20charging%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ECamera%3A%3C%2Fstrong%3E%201080p%20FaceTime%20HD%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EVideo%3A%3C%2Fstrong%3E%20Support%20for%20Apple%20ProRes%2C%20HDR%20with%20Dolby%20Vision%2C%20HDR10%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EAudio%3A%3C%2Fstrong%3E%204-speaker%20system%2C%20wide%20stereo%2C%20support%20for%20Dolby%20Atmos%2C%20Spatial%20Audio%20and%20dynamic%20head%20tracking%20(with%20AirPods)%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EColours%3A%3C%2Fstrong%3E%20Midnight%2C%20silver%2C%20space%20grey%2C%20starlight%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EIn%20the%20box%3A%3C%2Fstrong%3E%20MacBook%20Air%2C%2030W%2F35W%20dual-port%2F70w%20power%20adapter%2C%20USB-C-to-MagSafe%20cable%2C%202%20Apple%20stickers%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EPrice%3A%3C%2Fstrong%3E%20From%20Dh4%2C599%3C%2Fp%3E%0A
Barings Bank

 Barings, one of Britain’s oldest investment banks, was
founded in 1762 and operated for 233 years before it went bust after a trading
scandal. 

Barings Bank collapsed in February 1995 following colossal
losses caused by rogue trader Nick Lesson. 

Leeson gambled more than $1 billion in speculative trades,
wiping out the venerable merchant bank’s cash reserves.  

Benefits of first-time home buyers' scheme
  • Priority access to new homes from participating developers
  • Discounts on sales price of off-plan units
  • Flexible payment plans from developers
  • Mortgages with better interest rates, faster approval times and reduced fees
  • DLD registration fee can be paid through banks or credit cards at zero interest rates
INDIA'S%20TOP%20INFLUENCERS
%3Cp%3E%3Cstrong%3EBhuvan%20Bam%3C%2Fstrong%3E%3Cbr%3E%3Ca%20href%3D%22https%3A%2F%2Fwww.instagram.com%2Fbhuvan.bam22%2F%3Fhl%3Den%22%20target%3D%22_self%22%3EInstagram%3C%2Fa%3E%20followers%3A%2016.1%20million%3Cbr%3EBhuvan%20Bam%20is%20a%2029-year-old%20comedian%20and%20actor%20from%20Delhi%2C%20who%20started%20out%20with%20YouTube%20channel%2C%20%E2%80%9CBB%20Ki%20Vines%E2%80%9D%20in%202015%2C%20which%20propelled%20the%20social%20media%20star%20into%20the%20limelight%20and%20made%20him%20sought-after%20among%20brands.%3Cbr%3E%3Cstrong%3EKusha%20Kapila%3C%2Fstrong%3E%3Cbr%3E%3Ca%20href%3D%22https%3A%2F%2Fwww.instagram.com%2Fkushakapila%2F%3Fhl%3Den%22%20target%3D%22_self%22%3EInstagram%3C%2Fa%3E%20followers%3A%203.1%20million%3Cbr%3EKusha%20Kapila%20is%20a%20fashion%20editor%20and%20actress%2C%20who%20has%20collaborated%20with%20brands%20including%20Google.%20She%20focuses%20on%20sharing%20light-hearted%20content%20and%20insights%20into%20her%20life%20as%20a%20rising%20celebrity.%3Cbr%3E%3Cstrong%3EDiipa%20Khosla%3C%2Fstrong%3E%3Cbr%3E%3Ca%20href%3D%22https%3A%2F%2Fwww.instagram.com%2Fdiipakhosla%2F%3Fhl%3Den%22%20target%3D%22_self%22%3EInstagram%3C%2Fa%3E%20followers%3A%201.8%20million%3Cbr%3EDiipa%20Khosla%20started%20out%20as%20a%20social%20media%20manager%20before%20branching%20out%20to%20become%20one%20of%20India's%20biggest%20fashion%20influencers%2C%20with%20collaborations%20including%20MAC%20Cosmetics.%3Cbr%3E%3Cstrong%3EKomal%20Pandey%3Cbr%3E%3C%2Fstrong%3E%3Ca%20href%3D%22https%3A%2F%2Fwww.instagram.com%2Fkomalpandeyofficial%2F%3Fhl%3Den%22%20target%3D%22_self%22%3EInstagram%3C%2Fa%3E%20followers%3A%201.8%20million%3Cbr%3EKomal%20Pandey%20is%20a%20fashion%20influencer%20who%20has%20partnered%20with%20more%20than%20100%20brands%2C%20including%20Olay%20and%20smartphone%20brand%20Vivo%20India.%3Cbr%3E%3Cstrong%3ENikhil%20Sharma%3C%2Fstrong%3E%3Cbr%3E%3Ca%20href%3D%22https%3A%2F%2Fwww.instagram.com%2Fnikkkhil%2F%3Fhl%3Den%22%20target%3D%22_self%22%3EInstagram%3C%2Fa%3E%20followers%3A%201.4%20million%3Cbr%3ENikhil%20Sharma%20from%20Mumbai%20began%20his%20online%20career%20through%20vlogs%20about%20his%20motorcycle%20trips.%20He%20has%20become%20a%20lifestyle%20influencer%20and%20has%20created%20his%20own%20clothing%20line.%3Cbr%3E%3Cem%3ESource%3A%20Hireinfluence%2C%20various%3C%2Fem%3E%3Cbr%3E%3C%2Fp%3E%0A
Key findings of Jenkins report
  • Founder of the Muslim Brotherhood, Hassan al Banna, "accepted the political utility of violence"
  • Views of key Muslim Brotherhood ideologue, Sayyid Qutb, have “consistently been understood” as permitting “the use of extreme violence in the pursuit of the perfect Islamic society” and “never been institutionally disowned” by the movement.
  • Muslim Brotherhood at all levels has repeatedly defended Hamas attacks against Israel, including the use of suicide bombers and the killing of civilians.
  • Laying out the report in the House of Commons, David Cameron told MPs: "The main findings of the review support the conclusion that membership of, association with, or influence by the Muslim Brotherhood should be considered as a possible indicator of extremism."
Updated: December 30, 2022, 4:30 AM