• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Cybersecurity Tips  /  Are we ready for Amazon’s automated grocery store?
Are we ready for Amazon’s automated grocery store?
27 February 2018

Are we ready for Amazon’s automated grocery store?

Written by Sanjay Katkar
Sanjay Katkar
Cybersecurity, Cybersecurity Tips
17
Shares

Welcome to the future, ladies and gentlemen.

On January 22nd, on 2131, 7th Avenue in Seattle, Washington, the world got a taste of what the future could be like. The address saw the opening of the first Amazon Go store, a grocery store operated by online giant Amazon. But there is a slight twist: this is the world’s first check-out grocery store. That’s right, there are no lines or cash registers.

How does it work? A user needs to have the Amazon Go app on their smartphone and scan it on the turnstile when they enter the store. Once they enter, they can pick up any item they want and leave…as simple as that. The customers will be billed on their credit card. This store relies on various kinds of futuristic technology – computer vision, deep learning algorithms and sensor fusion which tracks every item a customer takes from the shelf or puts back and adds it to a virtual cart. When a customer leaves, the cart is checked out and the credit card is billed.

Technology of the future

It is an incredible concept and has caught the attention everywhere. Most publications, while reporting on this store, mentioned about the revolution it could bring to the brick-and-mortar retail industry. While these are still early days, it could bring about sweeping changes in the way the world operates.

But before getting too ahead of itself, Amazon Go must also ensure that they deliver on the basics: a safe, secure environment for customers to shop. Now that the entire payment process is automated and online, this brings about the latent risk of cybersecurity. Retail outlets already face a significant threat of cyber attacks –a report in 2017 found that cyber attacks on online retailers had doubled. As per a Verizon 2015 report, of all the data breaches caused by cyber attacks, 28.5% have been on POS which are directly linked with the retail and hospitality industry. And Amazon has been no exception to this.

Only in 2016, the company suffered a security breach with 80,000 login credentials leaked. In 2017, Amazon’s third party sellers were hit by hackers who changed bank deposit information to steal thousands of dollars. And then the company’s Whole Foods Market was also hit by a credit card data hack in September 2017.

The security aspect

It’s quite clear then that Amazon is a high-risk target for cyber fraud and this new Amazon Go store will be on the crosshairs of malicious hackers. Hence, the company will need to ensure that they have all bases covered. For starters, Amazon Go will need to ensure that they keep their user’s credit card details as secure as possible because this is an environment ripe for credit card fraud. Since only a phone is needed to access the store, any possibility of malicious use, say by using a stolen fraud, must be eliminated.

There is also the question of privacy in this Amazon Go store. The futuristic technologies like computer vision, deep learning algorithms and sensor fusion that enable this automated experience also capture a huge amount of customer data. Users may not be willing to share such personal data if they are not convinced about its security and in this regard, Amazon must ensure it does enough to assure its customers of the measures they have taken with advanced security solutions.

Ultimately, a completely automated shopping experience is an exciting, revolutionary idea and the fact that it is happening in reality is thrilling. However, every revolution has its own pitfalls. If Amazon can ensure a safe, secure experience in their Amazon Go stores, their new product can properly realize its latent potential.

 Previous PostState-sponsored cyber attacks: New-age warfare
Next Post  What not to do if your business is the victim of a cyber attack
Sanjay Katkar

About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University of Pune, India. Sanjay has...

Articles by Sanjay Katkar »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies