Toggle light / dark theme

Amanda Christensen, ideaXme guest contributor, fake news and deepfake researcher and Marketing Manager at Cubaka, interviews Dan Mapes, PhD, MBA co-founder of VERSES.io and co-author of The Spatial Web: How Web 3.0 Will Connect Humans, Machines, and AI to Transform the World.

Amanda Christensen Comments:

We’ve come a long way since the invention of the internet, and even further since the invention of the first computer, which together have undeniably significantly facilitated everyday life. We have never had access to more information at the touch of our fingers, or been more connected than we are now.

However, the exponential advancement of the internet has brought along with it a whole host of problems, such as the rampant spread of fake news, deep fake technology, significant data breaches, and hacking, to name a few.

The further advancement of the internet, and particularly AI, is inevitable, as the full potential of their capabilities are far from being reached. But how do we advance in a way that both further optimises our lives but simultaneously protects us from further misuse?

The Spatial Web

« Acording to Electrek, an FBI complaint details how the feds helped foil a plot by Russian hackers to target Tesla’s Nevada Gigafactory with a massive ransomware hack and data breach.

It’s worth noting that the complaint itself never explicitly says that the target of the hack was Tesla, though its Gigafactory is located outside Sparks, Nevada. Electrek, though, is reporting as fact that Tesla is the target. We’ve reached out to Tesla for additional information and we’ll update if any new info comes to light. »


Intriguingly, it sounds as though the hackers weren’t just after ransom.

By Chuck Brooks In FORBES


The surge in digital connectivity and more sophisticated cyber-threats has promulgated the need for smart cybersecurity. Smart Cybersecurity is a logical reaction to try to manage risk by lessening security gaps often posed by reliance on manual processes that are impacted by a continual cybersecurity skills shortage and the administrative burdens of data security management.

Despite the challenges, there is promise for reducing dependence on humans and bolstering cybersecurity capabilities. A myriad of evolving cognitive technologies can help us enhance cybersecurity and navigate the increasingly malicious and disruptive cyber threat landscape. They include:

Artificial Intelligence

O,.o.


Millions of us use Bluetooth wireless communications every day—to make phone calls when driving, with our fitness trackers, streaming at work or play. Innocent enough, seemingly. But no technology comes without a warning: a recently discovered Bluetooth vulnerability allows hackers to spy on your conversations or take control of your smart phone. The vulnerability deals with the encryption between two devices. It even has a name—a KNOB hack (Key Negotiation Of Bluetooth).

This is not the first time Bluetooth has been hacked and it likely won’t be the last. And this one has its limitations. To take advantage of the KNOB vulnerability the hacker has to be in close proximity of your phone. There is also currently no evidence that this vulnerability has been exploited maliciously.

Still, for the sake of cyber hygiene, take the following steps to protect yourself from a KNOB hack: • Install updates for your smart phone as they become available. • Remove devices paired with your phone that you no longer need or recognize. • Turn off Bluetooth when you are not using it.