Tech

5G could pose a huge cybersecurity risk: Ruchir Shukla, MD, SafeHouse Tech


Ruchir Shukla is the Managing Director at Safe house Tech, an Indo-Israeli cybersecurity company. Over the past 5 years, he has played a key role in driving the company’s growth and building sustainable sales and operating channels for SafeHouse in India, expanding the company’s reach. to actively sell in over 700 cities of India and record over 100 crore worth of product sales in less than 2 years. Ruchir holds a Bachelor & Master degree from IIT Kharagpur. In an interaction with Times of India Tech-Gadgets Now, Shah talked about the security risks that 5G pose and what smartphone users as well as businesses can do.
Q. What is the biggest danger that 5G poses?
With the launch of 5G network in India, internet speed will be significantly faster with low latency leading to more and more people accessing the internet. However, it will also give rise to some serious security vulnerabilities in the form of cyber threats like Denial of Service, large-scale botnet attacks, etc. Considering that 5G architecture is a step new development in the industry, it can bring countless cyber attacks to us. may not be aware.
We are excited to experience high speed internet, cybercriminals will also use the high speed of 5G to innovate and carry out larger cyber attacks and spread malware faster. ever. Another aspect here is our growing reliance on IoT devices, starting from smartwatches to home appliances like refrigerators and air conditioners, we have turned to using smart devices without knowing the potential risks and security holes that attackers/cybercriminals can access. While 5G will be an important change in IoT as more and more devices are connected, it also leads to more security breaches. The advent of 5G could pose a cybersecurity risk as there is no encryption in the network connection that leads to the disclosure of device details and allows hackers to easily intercept data for centralized attacks. into device-specific IoT. 5G security cumbersome, it will require protection at the main network, endpoints, and devices connected to the network. Therefore, it is paramount for companies to develop different approaches to end-to-end security not only for businesses but also for individual users.
Another danger that I foresee is that attackers can use 5G-related offers or services to perform OTP scams or scams by sending fake emails or messages claiming offers an upgrade from 4G to 5G. These messages may use fake logos and trademarks to appear legitimate, and may include links or attachments designed to trick victims into providing sensitive information or installing malware. .
Q. What do you think telecom companies need to do to protect users?
While advanced connectivity and new architectures will drive IoT in telecommunications, telecom companies will also face risks and vulnerabilities that they may not know how to address. 5G will create more security concerns causing telecom companies to change their strategies to ensure maximum network security for consumers. These concerns will require a transition to more automated security processes, orchestration, security-centric approaches, and flexible security services. These companies should also think about a different security-focused approach with more innovations than 4G while planning the transition to 5G. It goes without saying that 5G networks will introduce new security requirements and to deal with these, telecom companies will need to step up and will have to support policymakers when required. bridge.
Another important aspect for telecom companies is to leverage DevSecOps with more dynamics in terms of operability and security. This will help telecom companies to come up with more secure IT concepts and software development methods. In addition, telecom companies can also work with governments and other organizations to develop and implement industry-wide standards and best practices for 5G security. This can help ensure that all companies are taking steps to protect against potential threats and secure the entire 5G ecosystem.
Overall, protect against 5G threat will require a combination of technical measures, industry collaboration and ongoing vigilance to ensure that the benefits of 5G technology can be realized without risking data and privacy. user’s privacy.
Q. What do you think users should and shouldn’t do?
Keep your device and software up to date: Don’t ignore device updates. Run updates in a timely manner to ensure that you have the latest feature and security patches, which can help protect you from known vulnerabilities.
Use a reputable security solution: This will help protect your device from malware, block malicious websites for you, identify potentially suspicious or potentially harmful apps and give warning before you download. In addition, it will provide you with a safe browsing experience and protect you from phishing and other online threats. Be cautious when clicking on links and installing software or apps: Don’t click on links or download files, apps, and software from sources you don’t trust, as they can be malicious. There is a chance that your device may be infected with malware and cause many problems like damaging your device and stealing your personal data.
Do not use public WiFi networks without protection: Public WiFi networks are often not secure, so it is important to use a VPN or other security measures when accessing them. A VPN-enabled encrypted connection will protect your data from being intercepted by hackers.
Use longer passwords: Avoid using weak or easy-to-guess passwords for your accounts and devices as they can be easily hacked. Instead, use a strong password with a combination of letters, numbers, and special characters. Avoid using obvious things like your name, date of birth, or common words that can be easily guessed.
Don’t fall for ‘too good to be true’ offers: Be wary of offers that seem unbelievable. If someone offers you a free 5G upgrade or a great offer for 5G service, make sure to verify the offer before giving them any personal information or money.
Q. What kind of threats do you see related to 5G connectivity?
As 5G networks are expected to be faster and more efficient than previous generations of mobile technologies, they will enable new applications and services that were not possible before. This means that 5G networks will likely be a target for cyber attackers looking to exploit vulnerabilities in the technology.
Some of the potential threats and challenges associated with 5G networks include
Malware and Ransomware Attacks: As 5G networks become more widely adopted, they are likely to become targets of malware and ransomware attacks. These attacks can compromise the security of networks and users, leading to data breaches and other security problems. With 5G, cybercriminals can access a large number of compromised devices (such as smartphones or smart home devices) to quickly spread malware or ransomware across the network, ultimately The same allows attackers to infect a large number of devices in a short period of time, potentially causing widespread disruption and damage.
DDoS Attacks: 5G technology has the potential to significantly increase the speed and capacity of wireless networks. This increased speed and capacity could make it easier for attackers to launch larger-scale DDoS attacks. For instance, with 5G, an attacker can use a large number of connected devices (such as smartphones or smart home devices) to generate large amounts of traffic and overwhelm a network of devices. website or online service. This can make it difficult for the targeted website or service to function properly and potentially cause significant disruption. Capable attackers can use advanced techniques to bypass security measures and launch attacks that are harder to detect and resist.
Man-in-the-middle attacks: With 5G, attackers can use new techniques to intercept and manipulate data being transmitted over the network. This could allow an attacker to read, modify, or even impersonate one of the parties to the communication, potentially leading to theft of sensitive information or compromise of systems and networks. Additionally, the increased speed and capacity of 5G networks could also make it easier for attackers to perform more sophisticated MitM attacks.
Q. How do you see the cybersecurity landscape in the country?
Cybercrime incidents in general are on the rise and the arrival of 5G in India will increase the cases as the structure of 5G is relatively new in India and it will open the door for attacks network public. As we are inventing, cybercriminals are also innovating new ways to access our data, and the launch of 5G is a golden opportunity for them because 5G will connect everything — people, machines. machinery and equipment.
Currently, India has 658 million internet users and 600 million smartphone users, this number is expected to grow exponentially in the coming years making mobile security a necessity for all. everyone. Mobile security apps have many features that help keep your phone data secure, including sensitive information and other data stored in it. One of the main benefits of installing a mobile protection app is real-time protection and digital safety against mobile security risks.

news5s

News5s: Update the world's latest breaking news online of the day, breaking news, politics, society today, international mainstream news .Updated news 24/7: Entertainment, Sports...at the World everyday world. Hot news, images, video clips that are updated quickly and reliably

Related Articles

Back to top button