New survey shows majority of Canadians and Americans think about data privacy before shopping with a company  

Posted in Commentary with tags on December 17, 2025 by itnerd

This holiday season, while shoppers search for the perfect gifts and best deals, they’re also navigating countless requests for their personal information. An email address for the receipt? A phone number for delivery updates? According to the latest TELUS Data Trust Survey, Canadian and American shoppers are increasingly pausing to consider their privacy: What am I getting in return? What are you doing with my data? This shift toward intentional data sharing means retailers must demonstrate clear benefits – convenience, savings, or better service – and respect for customers’ data privacy in order to build the trust required for customers to hand over their information and do business with them.

The survey reveals that 78% of Canadians and 80% of Americans are more likely to buy from companies they trust. In fact, 70% of Canadians and 72% of Americans actively consider respect for their data privacy when deciding whether to trust a company. Yet confidence in organizations remains low. Only 39% of Canadians believe Canadian organizations respect data privacy – and just 19% say the same about American organizations. Americans share similar concerns, with only 37% believing that U.S. organizations respect data privacy and 31% saying they believe Canadian organizations respect data privacy. For the two-thirds of consumers who prioritize data privacy and trust over convenience (66% of Canadians and 71% of Americans), trust has become a deal-breaker.

As shoppers navigate deals and digital offers this season, they’re paying close attention to how companies handle their personal information. Here are some questions they can consider before they buy:

Clarity matters

  • Is the privacy policy understandable? 85% of Canadians and 86% of Americans want privacy policies presented in a user-friendly way. Consumers want to clearly understand how a company uses their data.
  • Is the company transparent about what it does with customer information? 90% of Canadians and 91% of Americans want to know how their personal information is used. Shoppers should look for companies that spell it out clearly.

Safety first

  • How does the company handle security? 89% of Canadians and 90% of Americans want companies actively looking for ways to improve data security. Shoppers should look for companies that talk openly about their data practices.
  • What happens if something goes wrong? 91% in both countries want honesty and openness in the event of a data breach. Has the company been transparent about past issues?

Built-in trust

  • Does the company have a data ethics program? 86% of Canadians and 87% of Americans say having data ethics experts on the team makes them more willing to trust a company. Companies serious about privacy make it part of their values and operations.
  • Is the company committed to responsible AI? 85% of Canadians and 86% of Americans want companies to commit to responsible AI use—especially important as AI becomes commonplace.
  • Does the company invest in training its employees? 60% of Canadians and 65% of Americans trust companies that provide data literacy training to their staff more than those that don’t.

Consumers have the power to choose companies that deserve their trust. By asking the right questions about privacy and data practices, shoppers can ensure their personal information is treated with the same respect as their hard-earned money.

Learn about TELUS’ commitment to data and trust by visiting: telus.com/trust.

About the survey

The statistics found in this release are taken from our 2025 AI & Data Trust research study. This study polled 5,487 Canadian members and 6,109 American members of Leger’s online panel from September 2 to 28, 2025. These numbers includes a sample of the population of Canada and America that matches the census in terms of age, gender, and region, with boosts in demographic groups including women, youth (12–18 years old), Indigenous Peoples, Black women, LGBTQ2S+, individuals with disabilities, low-income individuals, seniors, immigrant populations (past five years), and racialized groups historically underrepresented in Canada (e.g., South Asian, Chinese, Black).

Guest Post – Keepit predictions for 2026: From hype-check to hard truths — real protection, real risk, real demand

Posted in Commentary with tags on December 17, 2025 by itnerd

Last year, Keepit predicted that 2025 would be the year SaaS data protection stops being optional and becomes a must-have — as data volume increases, API strain grows, and practical AI solutions start to win over hype.

Now, as we look ahead to 2026, our view sharpens. The growing complexity across cloud, hybrid, compliance and threat landscapes forces us to confront three truths: first, protecting cloud data must become non-negotiable; second, AI should be used deliberately to defend, not just to automate; third, compliance and regulatory pressure are reshaping how and where data lives.

Here are four hard-edged predictions from Keepit’s expert voices — each built on real trends and a clear roadmap, not marketing fluff.

  • AI offense evolves faster than defense — unless leaders demand transparency

Kim Larsen, Chief Information Security Officer

AI-driven attacks will become highly adaptive. By 2026, adversaries will use AI systems that map entire infrastructures in seconds, identify weak links deep in the supply chain, and shift tactics in real time to bypass defenses. Hybrid warfare will amplify this trend as hostile actors blend geopolitical intent with AI-enabled automation at scale.

Defenders will match this only if they adopt AI with intention and transparency. Security teams will use AI to understand exposure, strengthen detection, and model where risk concentrates. But success will depend on knowing how an AI system works, what data it relies on, and how decisions are made. CISOs will demand clarity, control, and accountability. The organizations that win will be those that use AI to enhance—not replace—human judgment.

  • Hybrid is back—and so is the race for skills

Jakob Østergaard, Chief Technology Officer

Hybrid environments will grow faster than anyone expected. After years of cloud-first narratives, companies are re-evaluating what belongs where. Political instability, rising sovereignty requirements, and cost pressures are pushing critical workloads back on-premise. Servers, storage systems, and licensed software are seeing a resurgence because organizations want balance, not absolutism.

This shift exposes the growing skills gap. Demand for deep technical expertise in networking, Linux, and systems engineering is accelerating while talent inflow is shrinking. By 2026, this shortage will influence everything from innovation speed to resilience planning.

Meanwhile, quantum and AI will face a public reckoning. The promise of crypto-breaking quantum machines and near-term AGI will give way to more realistic timelines. Investments will continue, but the narrative will mature as enterprises look for practical, defensible value rather than speculative breakthroughs.

  • AI stays practical in 2026, while modernization remains the real priority

Niels van Ingen, SVP Business Development and Strategy

AI adoption in 2026 will feel familiar. Most enterprises will continue using agentic AI to automate repeatable tasks and augment existing processes, not reinvent them. Only one in 5 organizations report getting meaningful value from their AI tools at the current time with key adoptions challenges being cost and lack of control mechanisms in context of the desired outcomes. Autonomous business intelligence will remain niche because the foundations including infrastructure required are simply not ready: data quality, governance maturity, and organizational skills still lag far behind the ambition.

Modernization efforts will remain the primary focus. Companies will keep working through the practical realities and motions to replace platforms like VMware and Citrix, while using SaaS to accelerate outcomes where it makes sense. At the same time, compliance and regulatory pressure will intensify. Leaders will need a clear understanding of sovereignty requirements, new operating models, and the talent divide between “old way” and “new way” practitioners.

In 2026, CIOs will be planning for what IT must look like in 2030. The problems they solve today will not be the ones they face next and there is a lot of pressure on the IT suite to ensure companies are ready and competitive as the AI  transformation gains momentum.

  • Compliance goes default: NIS2 and DORA will reshape every SaaS RFP

Jan Ursi, VP Global Channels

By 2026, compliance expectations will become embedded in nearly every SaaS data protection RFP. Requirements tied to NIS2 and DORA will shift from “requested” to “assumed,” especially in finance, energy, healthcare, and the public sector. Organizations will insist on local digital sovereignty: data stored in-region, zero sub-processors, and guaranteed access even if the original SaaS platform is unavailable.

Because many companies are still in the early stages of meeting these regulations, demand will rise sharply as deadlines tighten. Local partners will play an essential role. They understand national sovereignty rules, infrastructure constraints, and the operational realities of regulated industries. As a result, the channel will become a core enabler of compliant SaaS adoption, not an afterthought.

About Keepit

Keepit provides a next-level SaaS data protection platform purpose-built for the cloud. Securing data in a vendor-independent cloud safeguards , boosts cyber resilience, and future-proofs data protection. Unique, separate, and immutable data storage with no sub-processors ensures compliance with local regulations and mitigates the impact of ransomware while guaranteeing continuous data access, business continuity, and fast and effective disaster recovery. Headquartered in Copenhagen with offices and data centers worldwide, over 20,000 companies trust Keepit for its ease of use and effortless backup and recovery of cloud data.

Outpost24 Secures New Investment to Scale its Exposure Management and Identity Security Solutions

Posted in Commentary with tags on December 17, 2025 by itnerd

Outpost24 today announced a new investment from Vitruvian Partners to fuel its next phase of global growth. This significant new funding will accelerate innovation across the company’s platform, with a focus on integrating AI capabilities to optimize how security teams identify and neutralize critical vulnerabilities.

The only European vendor recognized as an overall leader in the 2025 KuppingerCole Leadership Compass Report for Attack Surface Management, Outpost24 delivers a distinct approach to cyber defence that empowers security teams to gain a complete understanding of their digital and human risk landscape.

Last week, Outpost24 announced the acquisition of Infinipoint, a specialist in device identity, posture validation, and secure workforce access. The acquisition marks the company’s entry into the Zero Trust Workforce Access market and lays the foundation for its identity security division, Specops, to offer a unified approach that evaluates both the user and the device before access is granted. Through the strategic integration of its solutions — spanning external risk, identity, and device trust — Outpost24 is setting a new standard for cybersecurity. The company’s roadmap is focused on next-generation AI capabilities to catapult businesses forward, enabling them to prioritize the most critical threats and secure their assets.

The recent acquisition followed by today’s funding announcement mark the conclusion of a stellar year for Outpost24. Earlier this year, the company launched CyberFlex, a flexible, next-generation solution that integrates External Attack Surface Management and Penetration Testing as a Service (PTaaS) to help organizations efficiently manage and secure external-facing applications. Built on a pay-as-you-go credit model, CyberFlex embodies the shift toward consumable cybersecurity — giving customers the flexibility to dynamically allocate testing resources, scale coverage, and control costs as their security priorities evolve.

With over two decades of expertise, a strong European foundation, and thousands of customers worldwide, Outpost24 is expertly positioned to help organizations stay ahead of evolving cyber threats. By combining its leading Attack Surface Management platform with Specops’ specialized identity and password security, and the newly added strength of device identity and secure workforce access, Outpost24 delivers a truly comprehensive security picture that moves beyond conventional scanning methods. This empowers security teams to instantly identify, prioritize, and remediate the most critical risks, fundamentally strengthening resilience across both digital and human attack surfaces.

From 2025 to 2026: Identity Security Insights and Priorities 

Posted in Commentary with tags on December 17, 2025 by itnerd

Specops Software analysts have published an analysis on the evolution of identity and password security in 2025, and the outlook for 2026. 

The piece highlights several major shifts seen over the past year:

  • Identity and access management is now being treated as an organization-wide business risk, not just an IT issue
  • Third-party access and supply-chain relationships have emerged as one of the most significant identity threat vectors
  • Regulatory pressure is increasing around MFA and supplier security, particularly in data-heavy sectors like healthcare
  • Passwordless authentication is advancing, but operational realities mean passwords are unlikely to disappear in 2026
  • Cybersecurity culture and user training are increasingly critical as AI-driven social engineering accelerates

For full details, please see the analysis here: https://specopssoft.com/blog/identity-security-insights-priorities-2026/

Samsung Serves Up Some Great Deals For The Holidays

Posted in Commentary with tags on December 17, 2025 by itnerd

As Boxing Week nears, I’m sharing some deals from Samsung that you can shop for before and after the holidays alike. This is a good time to pick up a few favourites at a lower price while they last:

ModelOfferPromo PeriodMain Features
Galaxy Tab S10 LiteSave $180Dec 17 – Jan 8S Pen Included256GB Storage (expandable to 2TB)Galaxy AI (Gemini, Circle to Search, Solve Math, Handwriting Help, Object Eraser, Generative Edit)
Galaxy Z Flip7Save $213Dec 17 – Dec 1200MP cameraSlim designExpansive unfolding screenGalaxy AI (Gemini, Circle to Search, Solve Math, Handwriting Help, Object Eraser, Generative Edit)
Galaxy Z Fold7Save $400Dec 17 – Jan 1200MP cameraSlim designExpansive unfolding screenGalaxy AI (Gemini, Circle to Search, Solve Math, Handwriting Help, Object Eraser, Generative Edit)
Galaxy S25 EdgeSave $279Dec 17 – Jan 1200MP cameraSlim designGalaxy AI (Gemini, Circle to Search, Solve Math, Handwriting Help, Object Eraser, Generative Edit)
Galaxy S25 UltraSave $269Dec 17 – Jan 1S Pen included200MP camera100x space zoomLong lasting batteryGalaxy AI (Gemini, Circle to Search, Solve Math, Handwriting Help, Object Eraser, Generative Edit)
Galaxy S25+Save $239Dec 17 – Jan 1Snapdragon 8 EliteLong lasting batteryGalaxy AI (Gemini, Circle to Search, Solve Math, Handwriting Help, Object Eraser, Generative Edit)
Galaxy S25Save $249Dec 17 – Jan 1200MP cameraSlim designGalaxy AI (Gemini, Circle to Search, Solve Math, Handwriting Help, Object Eraser, Generative Edit)

For the full list of current Samsung deals check out Samsung.com/ca.

Nikon Releases New Firmware Update 5.30 for Z 9 Flagship Professional Mirrorless Camera

Posted in Commentary with tags on December 16, 2025 by itnerd

Today, Nikon Canada Inc. is pleased to announce the release of firmware version 5.3 for the full-frame/FX-format flagship mirrorless camera, the Nikon Z 9. This free firmware is now available for download and adds improvements across the board to further enhance the capabilities of Nikon’s top-of-the-line mirrorless camera.

The new firmware adds multiple focus enhancements, starting with a significant improvement in subject acquisition, tracking and stability for fast-moving subjects such as athletes. The advanced subject detection created with Nikon’s deep learning technology now works in other focus modes, making it easier to track the intended subject reliably in either single point or dynamic AF modes. Subject detection can now quickly be toggled on/off using a custom function button, if desired. The firmware also adds a new in-camera focus limiter, which allows the user to restrict the focus range to specific distances.

Improvements have also been made in the Auto Capture function, with a new AF standby position, and other operability and performance updates like face detection. The Z 9 now gives users the ultimate and most intelligent remote camera setup, without the need for any third-party triggering devices. This offers an extreme advantage for those shooting wildlife or professional sports with limited access.

Firmware version 5.3 adds support for Flexible Colour Picture Control that allows users to easily craft their own unique looks using NX Studio, Nikon’s image browsing, processing, and editing desktop software. This new feature offers greater creative freedom by enabling intuitive adjustments to parameters such as colour hue, brightness, and contrast using tools like Colour Blender and Colour Grading. Settings configured in NX Studio can then be saved to a memory card and loaded onto the camera as Custom Picture Controls for shooting.

These settings are reflected in the live view display, allowing users to preview results in real time, reducing the need for post-processing.

Additional Improvements to Operability and Functionality

  • Focusing is now possible with the maximum aperture in live view.
  • A magnification option of [400%] has been added to [Zoom on/off] available for Custom Settings.
  • Use of an external microphone (wired/wireless) is now possible when recording voice memos.
  • Extended the dimensions of focus areas available with [Wide-area AF (C1)] and [Wide-area AF (C2)] AF-area modes.
  • Added [Flat Monochrome] and [Deep Tone Monochrome] Picture Controls. 
  • Added [USB streaming (UVC/UAC)] to [USB] in the [NETWORK MENU]. 
  • Changed the specifications for uninterrupted video output to HDMI devices such as external monitors when recording ended.
  • The headphone volume level can now be adjusted in the “i” menu during video recording.

Z 9 owners can visit the Nikon download centre to get the new firmware for free. Nikon will continuously meet users’ needs through firmware updates that expand the functionality of its cameras.

New SantaStealer malware steals data from browsers, crypto wallets 

Posted in Commentary with tags on December 16, 2025 by itnerd

Santa apparently doesn’t just bring presents. I say that because a new malware-as-a-service information stealer named SantaStealer is being advertised on Telegram and hacker forums as operating in memory to avoid file-based detection.

Commenting on this is Ensar Seker, CISO at SOCRadar:

“SantaStealer is another reminder of how the threat landscape is evolving into a criminal SaaS economy. What’s particularly concerning is the move toward memory-only operations; this significantly lowers the detection footprint, bypassing traditional AV and EDR tools. The pricing tiers and marketing model mimic legitimate software services, further lowering the barrier to entry for cybercriminals. Attribution to a Russian-speaking developer, rebranding from BluelineStealer, and the use of Telegram for distribution all point to an increasingly professionalized cybercrime ecosystem. Organizations should prioritize behavioral monitoring and memory analysis as part of their defense-in-depth strategy.”

This is yet another case of the bad guys evolving faster than the good guys being able to keep up. That’s something that needs to change, and quickly.

RegScale Donates Open-Source OSCAL Hub to the OSCAL Foundation

Posted in Commentary with tags on December 16, 2025 by itnerd

 RegScale, the leader in Continuous Controls Monitoring (CCM), today launched the OSCAL Hub, an open-source industry platform that will help accelerate the approval of security authorizations (Authority to Operate (ATO) for government regulators, federal agencies, cloud service providers, and other organizations using the Open Security Controls Assessment Language (OSCAL) standardized framework for information systems. The OSCAL Hub was unveiled this week at OSCAL Plugfest, a hands-on event bringing together OSCAL practitioners, industry, regulators, and the broader community to collaborate on real-world technical challenges and workstreams.  

Federal agencies and contractors spend thousands of hours on manual compliance work. As cyber threats to national security escalate in speed and sophistication, the need to automate cybersecurity risk management has become a priority across the public and private sectors to speed innovative technology solutions into production to support government missions and citizen services.  

To meet this mission need, the OSCAL Hub was created as a free, open-source, and comprehensive platform for security compliance teams working with OSCAL documents. It enables government regulators and any Authorizing Officials to review and approve packages, and industry technology providers to submit their Risk Management Framework (RMF) documents in an OSCAL format—resulting in up to 85 percent time savings, due to machine-readable artifacts that can be reviewed and audited with automated approaches. 

RegScale also announced today that it is donating the OSCAL Hub source code as both free and open source to the OSCAL Foundation to advance the use of the application in the community, across both commercial and federal applications.  

The OSCAL Hub features templates and visual tools and can be run as a modern web application for supporting simple, rapid, and robust authorization processes and content sharing.  It can be deployed to Google Cloud, Azure, AWS, locally, or even as a command line tool inside of customer data pipelines. The OSCAL Hub allows: 

  • Federal Agencies to maintain RMF packages and their associated ATOs 
  • Technology vendors to share component definitions for easy ingestion into their OSCAL tooling 
  • Regulators to publish and share OSCAL catalogs and profiles that can serve as a foundation for modern GRC tooling 
  • Security Engineers to validate OSCAL in CI/CD pipelines, convert between formats automatically, and integrate into workflows via REST APIs 
  • AOs to review validated packages and track conditions of approval and Plans of Action and Milestones (POAMs) over time 

Learn more about the OSCAL Hub here or access the Hub in this link.  

ESET Threat Report: AI-driven attacks on the rise; NFC threats increase and evolve in sophistication

Posted in Commentary with tags on December 16, 2025 by itnerd

ESET Research has released its latest Threat Report, which summarizes threat landscape trends seen in ESET telemetry and from the perspective of both ESET threat detection and research experts, from June through November 2025.  AI-powered malware moved from theory to reality in H2 2025, as ESET discovered PromptLock – the first known AI-driven ransomware, capable of generating malicious scripts on the fly. While AI is still mainly used for crafting convincing phishing and scam content, PromptLock – and the handful of other AI-driven threats identified to this day – signal a new era of threats. 

On the ransomware scene, victim numbers surpassed 2024 totals well before year’s end, with ESET Research projections pointing to a 40% year-over-year increase. Akira and Qilin now dominate the ransomware-as-a-service market, while low-profile newcomer Warlock introduced innovative evasion techniques. EDR killers continued to proliferate, highlighting that endpoint detection and response tools remain a significant obstacle for ransomware operators.

On the mobile platform, NFC threats continued to grow in scale and sophistication, with an 87% increase in ESET telemetry and several notable upgrades and campaigns observed in H2 2025. NGate  – a pioneer among NFC threats, first discovered by ESET– received an upgrade in the form of contact stealing, likely laying the groundwork for future attacks. RatOn, entirely new malware on the NFC fraud scene, brought a rare fusion of remote access trojan (RAT) capabilities and NFC relay attacks, showing cybercriminals’ determination to pursue new attack avenues. RatOn was distributed through fake Google Play pages and ads mimicking an adult version of TikTok, and a digital bank ID service.  PhantomCard – new NGate-based malware adapted to the Brazilian market – was seen in multiple campaigns in Brazil in H2 2025.

Furthermore, after its global disruption in May, the Lumma Stealer infostealer managed to briefly resurface – twice – but its glory days are most likely over. Detections plummeted by 86% in H2 2025 compared to the first half of the year, and a significant distribution vector of Lumma Stealer – the HTML/FakeCaptcha trojan, used in ClickFix attacks – nearly vanished from ESET telemetry.

Meanwhile, CloudEyE, also known as GuLoader, surged into prominence, skyrocketing almost thirtyfold according to ESET telemetry. Distributed via malicious email campaigns, this malware-as-a-service downloader and cryptor is used to deploy other malware, including ransomware, as well as infostealer juggernauts such as Rescoms, Formbook, and Agent Tesla. Poland was most affected by this threat, with 32% of CloudEyE attack attempts in H2 2025 detected here.

For more information, check out the ESET Threat Report H2 2025 on WeLiveSecurity.com

Guest Post –  From Autonomous AI to Personal Health Data Snatching: Cyber Threats That Will Define 2026

Posted in Commentary with tags on December 16, 2025 by itnerd

This year, even the biggest corporations and governmental institutions, including the US, were not immune to hacks. According to Cyble’s latest Global Cybersecurity Report 2025, almost 15,000 incidents related to data breaches and leaks were reported.

2026 will be marked with even more breaches, as AI tools enable hackers to target thousands with a single click, cybersecurity experts warn.

​Looking back in 2025, one of the biggest hacks happened to the Australian airline Quantas. Hackers exposed data of 5 million customers, including names, birth dates, email addresses, and a few months ago started selling it on the dark web. There were many more similar cases involving companies like Oracle, Volvo, and SK Telecom, which led to data leaks or frozen business operations.

​In the summer, security researchers uncovered the biggest data breach in history that exposed 16 billion passwords, including those from Apple, Facebook, Google, Telegram, and many more. Some attacks affected governmental institutions, where, recently, the US Congressional Budget Office was hacked. According to Cyble’s report, government institutions were the Top 3 in the overall threat activity.

​Cybercriminals also targeted users directly. Recently, more than 120,000 cameras were hacked for so-called “sexploitation” footage in South Korea.

​According to experts at Planet VPN, a free virtual private network (VPN) provider, this year, a significant portion of attacks were amplified by AI tools. Konstantin Levinzon, co-founder and CEO of the company, says this trend will pose even bigger risks in 2026.

​”Even though AI improves our daily lives and strengthens cybersecurity, it is also widely used by hackers. Now, even those without technical expertise can buy tools on the dark web that target thousands of users with a single click. The rise of AI-powered tools will amplify all kinds of attacks, including phishing scams, ransomware, and exploiting vulnerabilities, and can even create attacks on its own,” Levinzon says.

Prediction 1: AI cybercriminals

Up until now, AI has been just a tool for cybercriminals, allowing them to organise and speed up attacks, he says. However, with rising agentic AI capabilities, AI will inevitably start attacking autonomously.

In its recent report, Anthropic has already described a hacking campaign that carried out around 80-90% part of the operation on its own using the company’s Claude tools.

“AI tools will scan for weaknesses and exploit zero-day flaws – security gaps that are unknown to vendors – without a human touching a keyboard. As our homes, workplaces, and infrastructure are increasingly run by AI, any security gap becomes a potential attack vector. We will almost certainly see such autonomous attacks next year,” Levinzon says.

Prediction 2: Hyper-realistic deepfakes

Deepfakes – AI-generated fake videos, audio files, or images used to impersonate people – are becoming a headache for banks and other businesses, as they allow bypassing online verification. Recently, an insurance company, sensing a lucrative opportunity, even started offering coverage for incidents where AI deepfakes cause reputational harm for companies.

Individual users are also at risk, Levinzon emphasizes. The FBI has recently warned users that criminals are generating fake images of kidnapping and using them for scams. According to Levinzon, the real rising threat is fake video-generated content.

“In 2025, video generators such as OpenAI’s Sora showed how easy it is to create highly realistic videos, and cybercriminals will use them to their advantage. As a result, banks and other financial institutions will likely take precautions to enhance their security measures to protect video verification processes. Regulations will likely follow quickly. For users, this may mean additional steps to confirm their identity,” he says.

Prediction 3: Digital body snatching

​Millions of smartwatches, rings, AI wearables, and even new mattresses come equipped with large amounts of sensors that collect everything – from your location, to heart rate data, and stress levels. As the number of these sensors increases, they become attractive targets for cybercriminals, experts say.

​According to Levinzon, once hackers get access to a smartwatch or any device, they can exfiltrate data easily, especially if the devices are not purely secured. Such data can also be gathered via cloud or app data leaks, exploiting Bluetooth attacks, and more.

​”Potential wearable hacks, deepfakes, and autonomous AI systems mean that next year, users will need to take extra steps and security measures. Aside from staying vigilant, we also recommend enabling two-factor authentication, updating software regularly, and using a VPN, which adds an essential layer of defence against hackers,” Levinzon says.