• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Uncategorized  /  Are we ready for Amazon’s automated grocery store?
27 February 2018

Are we ready for Amazon’s automated grocery store?

Written by Sanjay Katkar
Sanjay Katkar
Uncategorized
  • 17
    Shares
Estimated reading time: 3 minutes

Welcome to the future, ladies and gentlemen.

On January 22nd, on 2131, 7th Avenue in Seattle, Washington, the world got a taste of what the future could be like. The address saw the opening of the first Amazon Go store, a grocery store operated by online giant Amazon. But there is a slight twist: this is the world’s first check-out grocery store. That’s right, there are no lines or cash registers.

How does it work? A user needs to have the Amazon Go app on their smartphone and scan it on the turnstile when they enter the store. Once they enter, they can pick up any item they want and leave…as simple as that. The customers will be billed on their credit card. This store relies on various kinds of futuristic technology – computer vision, deep learning algorithms and sensor fusion which tracks every item a customer takes from the shelf or puts back and adds it to a virtual cart. When a customer leaves, the cart is checked out and the credit card is billed.

Technology of the future

It is an incredible concept and has caught the attention everywhere. Most publications, while reporting on this store, mentioned about the revolution it could bring to the brick-and-mortar retail industry. While these are still early days, it could bring about sweeping changes in the way the world operates.

But before getting too ahead of itself, Amazon Go must also ensure that they deliver on the basics: a safe, secure environment for customers to shop. Now that the entire payment process is automated and online, this brings about the latent risk of cybersecurity. Retail outlets already face a significant threat of cyber attacks –a report in 2017 found that cyber attacks on online retailers had doubled. As per a Verizon 2015 report, of all the data breaches caused by cyber attacks, 28.5% have been on POS which are directly linked with the retail and hospitality industry. And Amazon has been no exception to this.

Only in 2016, the company suffered a security breach with 80,000 login credentials leaked. In 2017, Amazon’s third party sellers were hit by hackers who changed bank deposit information to steal thousands of dollars. And then the company’s Whole Foods Market was also hit by a credit card data hack in September 2017.

The security aspect

It’s quite clear then that Amazon is a high-risk target for cyber fraud and this new Amazon Go store will be on the crosshairs of malicious hackers. Hence, the company will need to ensure that they have all bases covered. For starters, Amazon Go will need to ensure that they keep their user’s credit card details as secure as possible because this is an environment ripe for credit card fraud. Since only a phone is needed to access the store, any possibility of malicious use, say by using a stolen fraud, must be eliminated.

There is also the question of privacy in this Amazon Go store. The futuristic technologies like computer vision, deep learning algorithms and sensor fusion that enable this automated experience also capture a huge amount of customer data. Users may not be willing to share such personal data if they are not convinced about its security and in this regard, Amazon must ensure it does enough to assure its customers of the measures they have taken with advanced security solutions.

Ultimately, a completely automated shopping experience is an exciting, revolutionary idea and the fact that it is happening in reality is thrilling. However, every revolution has its own pitfalls. If Amazon can ensure a safe, secure experience in their Amazon Go stores, their new product can properly realize its latent potential.

 Previous PostState-sponsored cyber attacks: New-age warfare
Next Post  What not to do if your business is the victim of a cyber attack
Sanjay Katkar
About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University...

Articles by Sanjay Katkar »

Related Posts

  • Gorgon APT fractures India’s Industrial Backbone

    Gorgon APT targeting MSME sector in India

    August 10, 2020
  • Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

    May 21, 2020
  • The-need-for-businesses-to-empower-the-CISO

    Why do boards need to empower their CISO?

    October 22, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.