You might delay it, but you can’t stop it. The age of Internet of Things (IoT), where anything and everything becomes a computer connected to the internet, is approaching at an accelerating pace. By many accounts, it’s already here. In a foreseeable future, you’ll be hard-pressed to find a home appliance that isn’t connected to the internet.
While these smart appliances will enhance your home with their interesting (and sometimes useless) features, they will also trail along a host of vulnerabilities and security issues that can do more damage than good. In the past year, the abysmal state of insecurity in IoT devices has caused concern among experts, lawmakers and government officials.
Eventually, gone will be the days where all you had to do was to install and update an antivirus software on your computer to secure your home network. Soon, your home will be loaded with dozens of computers, each ready to be hacked and used against you and others.
Several cybersecurity companies have risen to the challenge of securing smart homes, where security resources are scarce and threats aplenty. One of these companies is Dojo Labs, an Israeli startup acquired by UK security firm Bullguard last year. Dojo is one of a handful of companies that offer smart firewalls, a new breed of home network security solutions that specialize in protecting connected devices against the many cyber threats that lurk out there. Continue reading
By Raul Harman, Technivizors
Business intelligence (BI) has become a frequent topic of discussion amongst progressive business people. However, we are often unsure what business intelligence is really about and why should anyone consider it. We find ourselves excited by what BI tools should offer, without knowing what BI can actually do.
Business intelligence leverages various business intelligence software solutions to convert data into actionable intelligence that directs a company’s tactical and strategic business decisions. BI doesn’t tell business leaders what to do. Neither is it only about generating reports. BI offers a way for them to examine data in order to derive valuable insights into current trends. BI tools enable users to access and analyze data sets and provide findings in summaries, reports, charts, and graphs to provide them with detailed intelligence about the state of their business. Continue reading
If you’re like most people, you store a lot of sensitive information on your Android device, whether it’s a smartphone or a tablet. This can be critical business information, banking and payment apps, or personal data, messages and photos that you don’t want the public to see.
And as with anything of value, Android devices become an attractive target for malicious actors that want to earn a few bucks or harm you financially, personally, or any other possible way. Software vendors and hardware manufacturers go to great lengths to make their products secure, and Android devices are no exception. However, some things will ultimately depend on users, and unless you don’t take the necessary measures and precautions, you’ll eventually fall victim to an irreparable hack.
Here are basic measures that aren’t very demanding, but can make a huge difference
if when your Android device becomes the target of an attack. Continue reading
Image Credit: Pushish Images / Shutterstock
Blockchain has almost become a buzzword these days. Everyone wants to do a new “X on blockchain,” whether it’s a decentralized Dropbox, a crypto-Amazon, Upwork with insignificant commission rates, or a Facebook where you own the data, and rake in millions of dollars in Initial Coin Offerings (ICO).
Blockchain reduces transaction fees, promotes transparency, prevents cyberattacks, and puts control and ownership of data back into the hands of users. However, one of the less-discussed benefits of blockchain is the way it can reshape online services, industries and organizations.
And on that front, there’s a lot that needs to be done. Continue reading
By Carl Sautereau, Talent Deck
Recruiting the best tech talent for your business can be difficult at the best of times.
Whether you go it alone or bring in a recruiter, the process of recruiting can be arduous and expensive, with no guarantee the ‘perfect candidate’ will walk through the door.
However, technology companies are increasingly finding it ever more difficult to attract the best talent, with a severe and growing skills gap meaning there are many more jobs than skilled workers to fill them.
By the end of 2016, one in 10 of all UK job adverts came from the technology and digital sectors.
As tech companies continue to benefit from an influx of investment, the biggest challenge they now face is making themselves stand out and attract the best tech talent to continue their growth.
Our research has found that 45% of developers are currently looking for a new job, while 22% would consider a new opportunity if it presented itself, so the opportunity to recruit new talent is there.
But, with so much competition, how can they put themselves at the front of the line in a jobs market where talent is freer, and more willing, to hop from role to role and talent continues to adapt what is important to them in their work? Continue reading
The internet is a shadow of its former self, and it sucks because it’s too centralized, Pirate Bay cofounder Peter Sunde said at the Brain Bar Budapest tech festival a few months ago. And he’s not alone. An increasing number of thought leaders, visionaries and technologists are worried about the centralized state of the internet and are exploring ways to bring it back to its days of glory, when it was decentralized.
Among them are Sir Tim Berners-Lee, the father of the World Wide Web, an army of blockchain experts and startups, and Richard Henricks, the fictional protagonist of HBO’s Silicon Valley.
But isn’t the internet decentralized already, and if it isn’t what’s wrong with it? Continue reading
Credits: Reuters/Stephen Lam
In its latest product event, with the launch of FaceID, Apple made it clear that it’s transitioning toward making face recognition the principal method to unlock phones, and it will be ditching fingerprint authentication in its favor. Other manufacturers are making similar moves, including Samsung and Qualcomm, the smartphone chipmaker.
There’s a clear benefit to using your face to identify yourself: It’s fast and convenient. All you need to do is show your face to your phone’s camera to unlock it. In the case of Apple’s new flagship phone, you don’t even need to press a button; it will automatically detect your face as soon as you’re within the selfie camera frame.
Face recognition spares you remembering yet another passcode, and it’s certainly easier to use than pressing your thumb against the fingerprint sensor. However, more convenient does not necessarily mean more secure and private. In fact, in most cases, there’s a tradeoff between ease of use and security. Continue reading