A simple USB stick can wreak havoc on your business’ IT systems.
People are way too overconfident that they won’t fall victims to cybercrime, report says.
You’ve probably heard some of the headlines: eBay hacked; Apple hacked etc. It’s infuriating when your private records, which you shared with a company you trust, get breached. But it’s often easy to lose sight of the fact that nowadays it’s not only companies that get hacked – it’s normal, nine to five, credit card holding individuals that get hacked too. Cybercriminals use all sorts of methods to spoof millions of twitter or facebook accounts and extract private information they can later use to steal your identity, extort you or hack other accounts. As such, we should all be a lot more responsible. Here’s a brief infographic made by the Digital Guardian which shows how oversharing on social media can be harmful and some practical tips on how to protect your data.
Combining machine learning and data analytics, Siri – the personal assistant for millions of Apple users – is a very powerful tool. Simply by voicing commands, Siri listens and obeys, whether you want to know how many calories are in your soda can or how many planes are flying above your head this very instant. But what if someone commanded Siri without your permission? A group of ethical French hackers recently showed it’s possible to hijack Siri from up to 16 feet away using hardware that can fit in a backpack and satisfy any whim.
What image does the word ‘hacker’ conjure up? University geeks creating online chaos for their own amusement? A criminal gang stealing millions from non-savvy tech users? Or an anti-capitalist anti-hero wreaking havoc on multinational corporations? Throughout the history of tech, the hacker has been all of these things, and more. Here’s a quick look at how the image of hackers
Does flicking a dice really render a random face? The answer would be no. The dice is governed by large-scale conventional physics and its motion, and thus final position can be determined. You can’t tell where it lands just by looking at it thwirl, of course, but the fact remains it’s not random, and neither is any current computing system