Seismic shock waves are still juddering through the US establishment and flights are grounded in Poland. At the same time the revelations about the extent of NSA/GCHQ spying are still spilling out and the latest batch of documents reveal how GCHQ attempted to undermine consumer security software. And the humble plain pitta bread could find itself thrust into the annals of international cyber skulduggery… and more including a serious Samsung Galaxy vulnerability
The US government recently revealed details of a hack in which up to 4 million records of current and former employees were scooped in a hack. Fingers were pointed at the Chinese who have track record when it comes to this sort of attack. But no one is entirely clean and certainly the US has created its fair share of silent and devastating malware platforms that are still out there. And this sort of thing has actually been going on for years.
Password management company LastPass hacked, but it’s safe; inside the mind of a teenage ransomware creator; Iran is rampant in its cyber-attacks across the Middle East; Israeli hackers break into Foxconn and more devilish doings in the world of cyber space
There have been some spectacular advances in technology propelling the human race onwards and upwards. Of course, we naturally and correctly celebrate these successes. But there have also been some significant fails, but we don’t talk about them, do we? But others failures should be embraced as a way of saying welcome to the human race. And in that spirit here are some tech fails that will probably make you feel better about your own trips, stumbles and occasional headlong plunges into the abyss.
The mobile payment arena is characterised by lots of payment platforms and proprietary digital wallets, and not a lot of retailers accepting them. Apple has changed the game with Apple Pay, its astute partnerships with banks and retailers, and its security. But are mobile payments set to become commonplace?
As a parent all you want to do is make sure the kids are safe online. It sounds easy enough but without stepping all over the children’s privacy it’s certainly not simple. Communication is central and ladles of diplomacy are often required too. Today’s teens are the true digital generation and they’re well versed in all the important apps used by their peer groups. But are they aware of the dangers and are you? To bring you up to speed, below is a run-down of the most popular apps/sites used by today’s teens.
The craze for wearable tech is just building up ahead of steam. But when interconnected wearables become common, today’s smart watches will seem like yesterday’s clunky grey box PCs. The enticing thing about wearable devices connecting with each other is the amazing potential but with great opportunity comes great risk and unless security is nailed down from the beginning we could see wearables becoming just as hackable as today’s computers.
Stuxnet is being used by North Korea with the aim of destroying cities and killing people. It was used to infiltrate North Korean networks with the intent of destroying physical infrastructure. It has been discovered on the International Space Station. It allegedly wrecked part of a Russian nuclear plant. Is there anything Stuxnet can’t do? We know it tore apart centrifuges at an Iranian uranium enriching plant over five years ago. But is it as lethal and ubiquitous as it’s claimed or has it simply gained mythical status because it was the world’s first cyber weapon?
The release of new Apple product is always greeted with near hysteria and the Apple Watch is no different. The ability to buy goods by waving your wrist at a terminal is one of the features proudly touted by Apple, as is the technically tough security of its Apple Pay system. And certainly these are achievements to be acknowledged. But just how secure is it and how long will it be before some hacks it?
Biometrics as a means of unique identification is common place today and it’s going to be even more so as tomorrow becomes today. But how would you feel about having your DNA mapped and your network of veins and capillaries used to identify you? It might sound far-fetched but not as far as you think.