Despite the fact that the latest round of the decades-old Crypto Wars has been relatively silent for a few months, there’s still much doubt over how the future of data privacy will unfold. Government agencies continue to push for more “transparency” on the part of tech firms, which boils down to baking backdoors into their products that would allow the feds to pry into encrypted communication. Continue reading
Guest Post by Beata Green
Beata Green discusses the difference between what customers and specialists think about IoT security, the vulnerabilities, and why is it so important to sustain IoT security?
One will never know when a cyber hacker decides to attack that fashionable smartwatch to compromise a person’s most sensitive data or take advantage of that inconspicuous smart coffee machine to effectively violate a company and its employees’ privacy. A security gap in a smart lock may even lead a cybercriminal to unlock an entire office’s security system. Continue reading
Self-driving cars have been among human fantasies since vehicles entered our lives. But we read a lot these days about how the dream is fast becoming reality and will revolutionize the transportation industry. According to estimates, there will be 10 million autonomous vehicles on U.S. roads by 2020, and human-driven cars will one day become extinct.
Some see the future of cars as what we’ve seen in the movie The Minority Report, where a stream of tight-packed, self-driven vehicles are autonomously navigating the winding streets of modern cities toward destinations designated by their passengers. Others, like Eric Spiegelman, the president of the Los Angeles Taxi Commission, envision a future twenty years from now where automated taxicabs have revolutionized urban commuting. Continue reading
Since the industrial revolution, machines have gradually replaced humans in physically-demanding jobs. We have become used to seeing mindless and tireless machines accomplish tasks that otherwise needed tremendous and exhaustive manpower and were prone to causing injuries and fatalities. For decades, the bulk of the work in mining, manufacturing and construction industries has been carried out by machinery and robotics, and humans are pushed toward carrying out the more sensitive tasks or overseeing the jobs done by robots.
While robots and machines continued to invade the blue-collar industries, laid-off workers had to go on and find some other job to make ends meet. The smart ones would find some white-collar job and be sure they would have nothing to worry about. After all, how can a robot ever replace a writer or a doctor or lawyer? Continue reading
The huge benefit that the Internet of Things (IoT) brings to different industries and domains is driving its growth and adoption at an unrelenting pace. Soon billions of connected devices will be spread across smart homes and cities, harvesting data, sending it to huge repositories for analysis and processing, and carrying out commands sent from smart apps and machine-learning-based systems.
While larger numbers of smart devices will unlock bigger opportunities for efficiency, energy and cost saving and revenue increase, they’ll also trail along some serious challenges and difficulties, some which are notably not addressable with current technological and communication infrastructure. Continue reading
Guest post by Ken Tola
There are many definitions in our lives that appear to be commonsense but are difficult to define when inspected a little bit closer. Self-consciousness is a great one, as is being successful. In the IT world, by far the hardest concept to define is “security.”
Security means safety. But what does that mean? Well, safety translates into protection, but protection from what? The answer lies in with the concerns of the person requiring security. For instance, running high-end encryption and next-generation network intrusion protection does little to help the person worrying about physical theft of their equipment. Continue reading
Databases are one of the most valuable assets in any form of online business or activity. Depending on the purpose they’re used for, databases can withhold user credentials (possibly unencrypted), social security numbers, credit card information, login history, and tons of other valuable information that can be used in malicious ways. Therefore, finding your way into a victim’s database can be on par with breaking into a bank’s safe. Continue reading