Category: Opinion
-
How are developers using ChatGPT preparing for the risk of poisoned code?
As AI technology rapidly advances, an increasing number of developers are utilizing AI tools like ChatGPT to write code. While AI-based coding assistants make programming more efficient, the growing risk of data poisoning attacks embedded in such code has raised serious security concerns. Data poisoning is an attack method that manipulates the data AI learns…
-
[Series] Quantum Computing③, How Quantum Will Change Our Space and Time
On the 3rd (local time), Microsoft (MS) co-founder Bill Gates recently stated in an interview that “the commercialization of quantum computers is progressing faster than expected” and predicted that “it is highly likely to become a reality within 3 to 5 years.” This implies that the timeline for quantum computer commercialization, which was previously expected…
-
Voice Phishing: Now Even the Voice is Fake. AI Voice Cloning and Voice Phishing.
With the recent advancement of artificial intelligence (AI) technology, voice cloning has become a reality, raising concerns about its misuse in voice phishing crimes. AI voice cloning can accurately mimic a specific person’s voice with just a few seconds of audio samples, even replicating emotional expressions. While this technology was originally developed for positive applications…
-
[Series] Quantum Computing②: Quantum Technology Will Become a Government Welfare Service in the Future.
Quantum computers have the capability to break existing encryption systems, and this is not just an assumption but an imminent threat. Then, how are governments and businesses responding to this threat? What technological and policy efforts are needed to prepare for this new era? Most security systems we use today are built on mathematically complex…
-
[Series] Quantum Computing①: Innovation or Threat?
“A quantum computer can crack your password.” This statement is not merely a hypothesis. Quantum computers have the potential to render existing encryption systems obsolete, and as of 2024, this possibility is becoming increasingly real. Quantum computing technology goes beyond scientific curiosity, signaling powerful transformations in industries, national security, financial systems, and AI research. At…
-
K-ESG Management, Can Sustainability Be Discussed Without Security?
K-ESG Management: Can Sustainability Be Discussed Without Security? Recently, companies have been focusing their ESG (Environment, Social, Governance) strategies primarily on environmental (E) factors, such as carbon neutrality, eco-friendly businesses, and renewable energy adoption. Given the importance of climate change response and sustainable management, it is natural for attention to be concentrated in this area.…
-
Practical Advice for CEOs Hesitant About Security Investment – The Economic Value of Cybersecurity
As the digital environment rapidly evolves, the importance of cybersecurity is becoming increasingly prominent. However, some corporate CEOs still take a cautious stance on security investments and often lack confidence in their necessity. The uncertainty over whether security investment can lead to tangible business outcomes or merely result in increased costs is a major concern.…
-
AI Technology Support for Military Operations and Human Rights Controversy
According to The Washington Post, Google moved swiftly to provide AI tools to the Israeli military following Hamas’ attack. Through Project Nimbus, Google has supported the Israeli military in conducting data analysis and intelligence gathering more quickly and efficiently. Concerns have grown as AI-based analysis tools could be used to assess battlefield situations and identify…
-
Surge in Cybercrimes Targeting Lunar New Year Holiday… Strengthened Security to Prevent
With the upcoming Lunar New Year holiday, security experts are cautioning against a potential surge in cybercrimes such as hacking and voice phishing. The increase in holiday-specific activities like gift exchanges, money transfers, and parcel deliveries provides more opportunities for criminals to exploit, requiring heightened vigilance. The holiday season often sees a spike in large-scale…