Mobile augmented reality is a relatively young technology, but it has already attracted a great deal of hype and scepticism in equal measure. Overlaying digital information onto the real world, viewed through a cameraphone, is technically impressive, but the business models and usage patterns are still evolving. A mobile augmented reality application (MARA) is a type of mobile application that incorporates and complements built-in components in a mobile phone and provides a specialized application to deliver reality-based services and functions.
Primary factors driving growth of the global mobile augmented reality market are rising demand and adoption of smartphones and tablets, and increased penetration of internet. In addition to these factors technological advancements in mobile augmented reality is further expected to drive market growth significantly during forecast period.
Augmented reality mobile applications are designed to equip mobile phone users with rich services, applications and functionality, which are applied on top of physical reality. Such applications use the phone’s camera, GPS, touch screen elements and other sensory and motion detectors to integrate real images, videos or scenarios within them. Augmented reality (AR) has long sounded like a wild, futuristic concept, but the technology has been around for years. AR is all about superimposing computer-generated images on top of your view of reality, thus creating a composite view that augments the real world.
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.