E-book readers are great, right? But are you aware that they also gather data on all of your reading habits? And in the US this information can be used to prosecute individuals. Of course, e-book manufacturers don’t tell you this. And while shops like Amazon talk about protecting privacy, what they do with data from its Kindle e-reader for instance, is buried in thousands of words of legal jargon. It’s certainly not upfront and straightforward. They don’t say ‘we spy on your reading habits, but that is what they do. But you can stop it, if you want to.
CEO stalked by hacker group, company taken down; free BlackBerry devices loaded with snooping software handed out to rival politicians; New York Stock Exchange, United Airlines and Wall Street Journal go offline all within a few hours of each other; unsurprising revelations about the UK police seeking out spying software and more.
Biometrics as a means of unique identification is common place today and it’s going to be even more so as tomorrow becomes today. But how would you feel about having your DNA mapped and your network of veins and capillaries used to identify you? It might sound far-fetched but not as far as you think.
The internet is so huge; no one will attack my computer. This is a common belief. And it’s a myth. Most hacking targets are vulnerable, unpatched computers that can be hijacked and used to launch a thousand attacks and more. Find out why it’s not personal but you’re just as much as a target as the big bank on the corner.
Traffic lights that are hacked, hotel doors prised open with ease and port security systems infiltrated to move millions of dollars of illicit goods are just some of the themes that crop up in the movies. These scenes were often set up in films years ago but today they’re not just fictional elements in a ripping good yarn, they are reality.
Computer passwords; they’re mundane and every day and even the most complex can be cracked – eventually. But that shouldn’t stop you from protecting your digital life with a password that will give hackers headaches until an alternative comes along such as the pill which is activated by stomach acid and sends out an 18-bit ECG-like signal or a RFID chip injected into your body. Sounds crazy but being they’re being worked on as you read this. To find out more and how to set a real tough nut password read on.
As law enforcement ramps up its endeavours against cyber criminals and new mobile payment systems gather steam we can expect to see hackers turn their attentions to developing malware that covers their tracks as well begin probing systems such as Apple Pay and smartphone based payment methods.
We can also expect more of the same in terms of high profile targeted attacks, while low level state-sponsored attacks will become the norm rather than the exception.
As the year draws to a close there has certainly been a spike in criminal cyber activity. In a sense, events this year are no different than previous years except the scale of activity is increasing and the damage more widespread. There’s also the irrevocable sense that the cyber and physical worlds are now so finely entangled that actions in one inevitably echo loud and clear in the other.
There are some great apps out there for kids this Halloween. They make great gifts, provide lots of fun and also offer educational focus for younger children. We’ve put together a list of what we think are some of the most entertaining and accessible apps – but watch out, make sure the spooks don’t get you.
A digital detox is the latest trend in retreats. Communities are actually depriving themselves of decent broadband connections in order to brand themselves as ‘digital-free destinations’ to attract visitors. The Grenadines in the Caribbean have resorts offering digital detox holiday packages. What does this include you ask?