The Scariest New Online Threats Nobody’s Talking About (Yet)

The internet’s always had a wild west feel to it. We’ve had better locks, cameras, and alarms (hello firewalls, anti-virus, and two-factor auth), but the threats always keep adapting—often faster than we can catch up. While everyone’s discussing phishing, ransomware, and data breaches, there’s a whole new batch of sinister, silent online threats that haven’t made headlines yet (yet, we think, they should). These threats are insidious, clever, and some are plain weird. Below are some of the creepiest ones that are under the radar.

Online Threats

The Emergence of “Silent” Malware to Watch and Learn

Most of us think of malware as loud and in-your-face—slowing computers, hijacking passwords, perhaps even encrypting files and demanding a ransom. But there’s a new generation of malware that doesn’t do any of those things. At least, not yet.Further, this type of malware lurks in silence in your system, learning all there is to know about your behavior. It looks over which websites you browse, how you enter your passwords, and even how you linger on specific apps. It’s akin to a digital stalker that’s in no hurry. The longer it lurks in the shadows, the better it gets to know how to disguise itself, bypass security mechanisms, and ultimately launch a surprise attack when you are least prepared. The most reliable way to protect yourself is to use the best antivirus out there, from a reputable cybersecurity company like Bitdefender.

Fake personalities that are too convincing

You may have heard of deepfakes—those unsettling videos where one person’s face is superimposed onto the body of another. What’s even more frightening is that we are heading into the world of complete fake identities, crafted wholly by machine learning. They are not mere pilfered photos and aliases. They are credible, engaging, responsive online doppelgangers that can respond in real conversation.

They are using them to gain people’s confidence in the long term, particularly on dating apps and social media. They can operate several “people” all at the same time, each one of which is custom-built to fool a different type of victim. And they’re skilled—very skilled. It’s becoming increasingly difficult to know whether the person contacting you is a flesh-and-blood individual or a very sophisticated bot with a purpose.

Smart Devices Betraying Their Users (Yes, Seriously)

We love smart homes. Smart thermostats that recognize our routines, refrigerators that inform us we’ve run out of milk, even automatic vacuums that operate by themselves. But the catch is: each smart gadget is a small computer that is internet-enabled. And that makes it hackable.

There is increasing evidence that hackers are exploiting these devices, too, not for entertainment, but to spy on, blackmail, or gain entry to other networks. Picture your baby monitor suddenly addressing you in a stranger’s voice. Your smart TV automatically activating and taping your conversation. It’s not fiction anymore. It’s happened—and it’s becoming increasingly prevalent.

The “Synthetic Identity” Explosion

This one is tricky in that it blends authentic and manufactured information. Cybercriminals are now constructing phony identities out of thin air using a valid Social Security number (usually taken from a child or somebody who hardly ever opens credit accounts) and coupling it with phony names, birthdates, and addresses.

These impostors file fraudulently for loans, credit cards, even apartments. And they get away with it, generally, because nothing in the system indicates that they are impostors. Before anyone realizes it, the damage is done—and the true individual attached to that stolen number has to contend with the consequences.

Voice Cloning that Can Fool Your Mom

Those scam calls where a person calls and says, “Grandma, I’m in danger, send money”? They used to be amateurish and hence easy to identify. Not anymore. Because of voice-cloning capabilities using AI, nowadays scammers can convincingly mimic anyone’s voice using a few seconds of voice — like a TikTok video or Instagram post.

They get to call your loved ones posing as you. And the voice is identical. Not similar—identical. It’s happened to families that’ve sent thousands of dollars to assist a “family member” never in harm’s way. This one is frightening in that it takes advantage of the love and the respect people have for each other.

Invisible tracking pixels in emails and docs

Ever get the feeling someone knows a little too much about what you are reading or when? Perhaps it is due to tracking pixels—small, invisible images which are added to emails or shared papers. As soon as you open them, the sender will know.

They were originally designed for marketing use, yet nowadays are used also by cyberstalkers, corporate spies, and invidious partners to identify when and where you’ve accessed or opened up a file. You wouldn’t suspect it was occurring unless you look for it—and usually people don’t. That’s why it’s a good idea to call back on advanced cybersecurity software to protect against such threats.

Neurotech and Privacy Invasion

Yes, this one sounds like it belongs in a movie, but it is true. Firms are working on devices that can “read” signals in one’s mind in order to assist in tasks such as concentration, calming down, or even writing in one’s mind. Cool, you say? Absolutely. But also, really creepy.

What if there’s a commodity of brainwave data? If your smart headset can tell that you’re feeling anxious, can ads suggest products that prey on that? Can your boss use it to keep tabs on how focused you’re staying in the office? Alas, there are hardly any laws governing this type of data yet, and that’s not a good situation.

Shadow Profiles You Didn’t Know Existed

You don’t need to be signed up to be on social media. Even if you’ve never registered, businesses can reconstruct a shadow profile of you using your email address, cell number, and acquaintances. Each time your friends upload their contact lists, they are assisting in completing the blanks on you. That ghost of you can be used to make suggestions, serve ads to you, or perhaps worse—influence what data is displayed to you on the internet. And you’ll never see it or be able to correct it, you see, because you “don’t exist” on the site.

So What Can You Do?

There’s a point where it’s easy to get overwhelmed by it all. The internet is becoming creepier, sneakier, and increasingly sinister in ways that many people are yet to realize. But becoming paranoid is not the response. The answer lies in awareness. Be aware that these threats exist. Stay current on your software, are wary of unfamiliar calls or texts (even if it sounds like the voice is one you know), and begin treating your intelligent devices in the same cautious manner that you do your smartphone or computer.

Popular on OTW Right Now!

Add a Comment

Your email address will not be published. Required fields are marked *