SlideShare a Scribd company logo
1 of 29
The Next Cyber Warfare Wave: AR and VR Worlds
Robert Fine
Editor
VR Voice
July 5, 2018
A little bit about me…
• 20+ years of engineering and IT
• Early days in telecom and wireless
• Popular website in dot.com days (‘99-’01)
• The Cool WAP Site of the Day.com
• M.S. and ABD in Env. Science & Policy
• Global IT Director for Conversation Int’l – 10 yrs
• Started Cool Blue Media in 2009
3
4 Publications
100K+ Email Subscribers
60K+ Uniques Monthly
250K+ Social Media Followers
3000+ articles
COOL
BLUE
MEDIA
The Next Cyber Warfare Wave: AR and VR Worlds
Robert Fine
Editor
VR Voice
June 16, 2018
It’s all VR, AR, MR, XR and roses……. ……or is it?
Right now…
What do we have to worry about?
Or who do we have to worry about?
This guy?
Or whom do we have to worry about?
What concerns should we have in terms
of cyber security in VR and AR?
The illegal recording and theft of user behavioral data.
Possibly leading to a ransomware attack.
The use of misleading information to entice users to take
a certain action.
Perhaps giving up personal and/or credit card information.
What concerns should we have in terms
of cyber security in VR and AR?
During critical maneuvers.
Is the individual(s) you’re interacting with
who you think they are?
VR/AR devices being taken over remotely in the workplace?
Avatar impersonations.
In defense.
In medicine.
Is this the future of the six o’clock news?
Is this news we can trust?
Do we need to be concerned about a
Cambridge Analytics situation
on steroids?
Hyperlinked Worlds in VR Web 4.0?
Whether it’s in AR or VR, or whatever R…..
How do we know it’s safe when we traverse worlds?
Actual pepperoni
slices
Possible ways to implement cyber security
within VR and AR systems.1
1. https://www.antuit.com/blog/virtual-and-augmented-reality-cyber-security-challenges/
Implement secure messaging between VR/AR devices.
Use proper identity and authentication
mechanisms between agents (VR/AR).
Secure VR/AR applications and firmware residing on devices.
Validate the integrity and relevancy of VR/AR content.
Oculus recently bricked all rifts w/ firmware update.
Possible ways to implement cyber security
within VR and AR systems.1
Monitor for abnormal behavior of the VR/AR device,
application and ecosystem.
1. https://www.antuit.com/blog/virtual-and-augmented-reality-cyber-security-challenges/
Implement tamper detection.
Force authentication of communication
between VR/AR devices.
3/4 of respondents (74%) say the presence of
VR tools increases their likelihood of pursuing
cybersecurity careers.2
72% said it would increase their efficiency.
2. https://www.prnewswire.com/news-releases/virtual-reality-and-immersive-technology-are-game-changers-for-cybersecurity-job-growth-300541719.html
But, it’s not all bad…
77% said they would get more enjoyment from
VR based tools compared to desktop based tools.
74% said VR would increase their ease of use.
Closing Thoughts on VR and Blockchain
- Recently attended an all day conference in NYC on Blockchain
- Represented by Fortune 500 brands and enterprise
- Lots of head scratching
PLEASE!!! I Want To Be Corrected!
My skepticism and summation:
Blockchain is not a panacea.
The accounting rules of any particular ledger are defined by the
individual(s) or company(s) establishing that ledger.
Those rules can be modified, updated, deleted or nullified by said
individual(s) or company(s) at anytime.
Closing Thoughts on VR and Blockchain
The Blockchain and Ledger are only as good/valid/secure as the
actors involved participating in good faith.
When humans are involved…. ….good faith can be questionable.
Closing Thoughts on VR and Blockchain
Plug #1
Plug #2
2nd Annual Global
Virtual Reality Day.org
A day of education about VR and AR to the public.
Free to attend.
Last year – 8 cities globally participated
This year – 50 city goal!
Saturday, November 17, 2018
Contact Info:
Robert Fine
Editor
VR Voice
Email: bob@coolbluemedia.net
Tel: +1-202-746-9125
@bobfine
@thevrvoice
http://vrvoice.co
Questions?

More Related Content

What's hot

Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Smart part 1 (1)
Smart part 1 (1)Smart part 1 (1)
Smart part 1 (1)Hari haran
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumZimperium
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security Mahima Anand Sharma
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?Ping Identity
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsCraig Walker, CISSP
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?IBM Security
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!iFixScreens
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Digital Dating Safety
Digital Dating SafetyDigital Dating Safety
Digital Dating SafetyIBM Security
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 

What's hot (20)

Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smart part 1 (1)
Smart part 1 (1)Smart part 1 (1)
Smart part 1 (1)
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the Message
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Digital Dating Safety
Digital Dating SafetyDigital Dating Safety
Digital Dating Safety
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 

Similar to The Next Cyber Warfare Wave: AR and VR Worlds

Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014Truong Minh Yen
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Black Duck by Synopsys
 
Immersive Sydney - #WebXRWeek
Immersive Sydney - #WebXRWeekImmersive Sydney - #WebXRWeek
Immersive Sydney - #WebXRWeekRob Manson
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Are Drones our best friends?
Are Drones our best friends?Are Drones our best friends?
Are Drones our best friends?Codemotion
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesSkycure
 
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...Dana Gardner
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceZimperium
 

Similar to The Next Cyber Warfare Wave: AR and VR Worlds (20)

Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
The Dangers of Lapto
The Dangers of LaptoThe Dangers of Lapto
The Dangers of Lapto
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
 
Latest Trends in Information Technology - 2020
Latest Trends  in Information Technology - 2020Latest Trends  in Information Technology - 2020
Latest Trends in Information Technology - 2020
 
Immersive Sydney - #WebXRWeek
Immersive Sydney - #WebXRWeekImmersive Sydney - #WebXRWeek
Immersive Sydney - #WebXRWeek
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Are Drones our best friends?
Are Drones our best friends?Are Drones our best friends?
Are Drones our best friends?
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
 
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat Intelligence
 

More from Cool Blue Company, LLC

Applied VR For Performance Biofeedback Training
Applied VR For Performance Biofeedback TrainingApplied VR For Performance Biofeedback Training
Applied VR For Performance Biofeedback TrainingCool Blue Company, LLC
 
Crossing The Chasm: What's New For VR 2017
Crossing The Chasm: What's New For VR 2017Crossing The Chasm: What's New For VR 2017
Crossing The Chasm: What's New For VR 2017Cool Blue Company, LLC
 
The Startup's Quickstart Guide To: Argentina
The Startup's Quickstart Guide To: ArgentinaThe Startup's Quickstart Guide To: Argentina
The Startup's Quickstart Guide To: ArgentinaCool Blue Company, LLC
 
The Startup's Quickstart Guide To: Antigua and Barbuda
The Startup's Quickstart Guide To: Antigua and BarbudaThe Startup's Quickstart Guide To: Antigua and Barbuda
The Startup's Quickstart Guide To: Antigua and BarbudaCool Blue Company, LLC
 
The Startup's Quickstart Guide To: Angola
The Startup's Quickstart Guide To: AngolaThe Startup's Quickstart Guide To: Angola
The Startup's Quickstart Guide To: AngolaCool Blue Company, LLC
 
The Startup's Quickstart Guide To: Andorra
The Startup's Quickstart Guide To: AndorraThe Startup's Quickstart Guide To: Andorra
The Startup's Quickstart Guide To: AndorraCool Blue Company, LLC
 
The Startup's Quickstart Guide To: Algeria
The Startup's Quickstart Guide To: AlgeriaThe Startup's Quickstart Guide To: Algeria
The Startup's Quickstart Guide To: AlgeriaCool Blue Company, LLC
 
The Startup's Quickstart Guide To: Albania
The Startup's Quickstart Guide To: AlbaniaThe Startup's Quickstart Guide To: Albania
The Startup's Quickstart Guide To: AlbaniaCool Blue Company, LLC
 
The Startup's Quickstart Guide To: Afghanistan
The Startup's Quickstart Guide To: AfghanistanThe Startup's Quickstart Guide To: Afghanistan
The Startup's Quickstart Guide To: AfghanistanCool Blue Company, LLC
 
How To Get Press Coverage - One Person's Opinion
How To Get Press Coverage - One Person's OpinionHow To Get Press Coverage - One Person's Opinion
How To Get Press Coverage - One Person's OpinionCool Blue Company, LLC
 

More from Cool Blue Company, LLC (12)

Applied VR For Performance Biofeedback Training
Applied VR For Performance Biofeedback TrainingApplied VR For Performance Biofeedback Training
Applied VR For Performance Biofeedback Training
 
Monetization In VR
Monetization In VRMonetization In VR
Monetization In VR
 
VR Voice Special Edition #1
VR Voice Special Edition #1VR Voice Special Edition #1
VR Voice Special Edition #1
 
Crossing The Chasm: What's New For VR 2017
Crossing The Chasm: What's New For VR 2017Crossing The Chasm: What's New For VR 2017
Crossing The Chasm: What's New For VR 2017
 
The Startup's Quickstart Guide To: Argentina
The Startup's Quickstart Guide To: ArgentinaThe Startup's Quickstart Guide To: Argentina
The Startup's Quickstart Guide To: Argentina
 
The Startup's Quickstart Guide To: Antigua and Barbuda
The Startup's Quickstart Guide To: Antigua and BarbudaThe Startup's Quickstart Guide To: Antigua and Barbuda
The Startup's Quickstart Guide To: Antigua and Barbuda
 
The Startup's Quickstart Guide To: Angola
The Startup's Quickstart Guide To: AngolaThe Startup's Quickstart Guide To: Angola
The Startup's Quickstart Guide To: Angola
 
The Startup's Quickstart Guide To: Andorra
The Startup's Quickstart Guide To: AndorraThe Startup's Quickstart Guide To: Andorra
The Startup's Quickstart Guide To: Andorra
 
The Startup's Quickstart Guide To: Algeria
The Startup's Quickstart Guide To: AlgeriaThe Startup's Quickstart Guide To: Algeria
The Startup's Quickstart Guide To: Algeria
 
The Startup's Quickstart Guide To: Albania
The Startup's Quickstart Guide To: AlbaniaThe Startup's Quickstart Guide To: Albania
The Startup's Quickstart Guide To: Albania
 
The Startup's Quickstart Guide To: Afghanistan
The Startup's Quickstart Guide To: AfghanistanThe Startup's Quickstart Guide To: Afghanistan
The Startup's Quickstart Guide To: Afghanistan
 
How To Get Press Coverage - One Person's Opinion
How To Get Press Coverage - One Person's OpinionHow To Get Press Coverage - One Person's Opinion
How To Get Press Coverage - One Person's Opinion
 

Recently uploaded

Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 

Recently uploaded (20)

Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 

The Next Cyber Warfare Wave: AR and VR Worlds

  • 1. The Next Cyber Warfare Wave: AR and VR Worlds Robert Fine Editor VR Voice July 5, 2018
  • 2. A little bit about me… • 20+ years of engineering and IT • Early days in telecom and wireless • Popular website in dot.com days (‘99-’01) • The Cool WAP Site of the Day.com • M.S. and ABD in Env. Science & Policy • Global IT Director for Conversation Int’l – 10 yrs • Started Cool Blue Media in 2009
  • 3. 3
  • 4. 4 Publications 100K+ Email Subscribers 60K+ Uniques Monthly 250K+ Social Media Followers 3000+ articles COOL BLUE MEDIA
  • 5. The Next Cyber Warfare Wave: AR and VR Worlds Robert Fine Editor VR Voice June 16, 2018
  • 6. It’s all VR, AR, MR, XR and roses……. ……or is it? Right now…
  • 7. What do we have to worry about? Or who do we have to worry about? This guy? Or whom do we have to worry about?
  • 8.
  • 9. What concerns should we have in terms of cyber security in VR and AR? The illegal recording and theft of user behavioral data. Possibly leading to a ransomware attack. The use of misleading information to entice users to take a certain action. Perhaps giving up personal and/or credit card information.
  • 10. What concerns should we have in terms of cyber security in VR and AR? During critical maneuvers. Is the individual(s) you’re interacting with who you think they are? VR/AR devices being taken over remotely in the workplace? Avatar impersonations. In defense. In medicine.
  • 11. Is this the future of the six o’clock news? Is this news we can trust?
  • 12. Do we need to be concerned about a Cambridge Analytics situation on steroids?
  • 13.
  • 14. Hyperlinked Worlds in VR Web 4.0?
  • 15. Whether it’s in AR or VR, or whatever R….. How do we know it’s safe when we traverse worlds?
  • 16.
  • 18.
  • 19.
  • 20.
  • 21. Possible ways to implement cyber security within VR and AR systems.1 1. https://www.antuit.com/blog/virtual-and-augmented-reality-cyber-security-challenges/ Implement secure messaging between VR/AR devices. Use proper identity and authentication mechanisms between agents (VR/AR). Secure VR/AR applications and firmware residing on devices. Validate the integrity and relevancy of VR/AR content. Oculus recently bricked all rifts w/ firmware update.
  • 22. Possible ways to implement cyber security within VR and AR systems.1 Monitor for abnormal behavior of the VR/AR device, application and ecosystem. 1. https://www.antuit.com/blog/virtual-and-augmented-reality-cyber-security-challenges/ Implement tamper detection. Force authentication of communication between VR/AR devices.
  • 23. 3/4 of respondents (74%) say the presence of VR tools increases their likelihood of pursuing cybersecurity careers.2 72% said it would increase their efficiency. 2. https://www.prnewswire.com/news-releases/virtual-reality-and-immersive-technology-are-game-changers-for-cybersecurity-job-growth-300541719.html But, it’s not all bad… 77% said they would get more enjoyment from VR based tools compared to desktop based tools. 74% said VR would increase their ease of use.
  • 24. Closing Thoughts on VR and Blockchain - Recently attended an all day conference in NYC on Blockchain - Represented by Fortune 500 brands and enterprise - Lots of head scratching PLEASE!!! I Want To Be Corrected!
  • 25. My skepticism and summation: Blockchain is not a panacea. The accounting rules of any particular ledger are defined by the individual(s) or company(s) establishing that ledger. Those rules can be modified, updated, deleted or nullified by said individual(s) or company(s) at anytime. Closing Thoughts on VR and Blockchain
  • 26. The Blockchain and Ledger are only as good/valid/secure as the actors involved participating in good faith. When humans are involved…. ….good faith can be questionable. Closing Thoughts on VR and Blockchain
  • 28. Plug #2 2nd Annual Global Virtual Reality Day.org A day of education about VR and AR to the public. Free to attend. Last year – 8 cities globally participated This year – 50 city goal! Saturday, November 17, 2018
  • 29. Contact Info: Robert Fine Editor VR Voice Email: bob@coolbluemedia.net Tel: +1-202-746-9125 @bobfine @thevrvoice http://vrvoice.co Questions?