Copyright -The Washington Post/Worldcrunch- Karen Turner
“In sum: Alexa is kinda my new best friend,” writes Rebecca Hanover, an author and blogger on Mommyproof. As a mother of young children, it’s not hard to see why: Hanover details the joys of virtual assistant Amazon Echo, which functions as a kind of combined kitchen helper, child entertainer and DJ. “Is it weird that Alexa feels like my trusty little friend during that six pm witching hour, gently guiding me through dinnertime?” Continue reading
Copyright – Les Echos – Fabien Rech
Hackers have started sending fraudulent emails using QR code technology, masquerading as a national communications provider to get client usernames and passwords.
It is a first in the history of hacking. Vade Retro, a company that specializes in mailbox protection, recently announced it had detected the first use of fraudulent emails using QR codes — two-dimensional barcodes used to store digital information that can be deciphered by a smartphone. Continue reading
Copyright – Les Echos – Fabien Rech
Would you give your house keys to a complete stranger when you are on vacation? Probably not. Human instincts opt for a safer solution.
The question of security is the major constraint preventing more widespread adoption of cloud computing technology. A study by Crowd Research Partners revealed that nine out of 10 professionals worry about safety and security. Data breaches remain the biggest concern for businesses that deploy private cloud servers, software cloud servers (Software as a Service, SaaS), or infrastructure cloud products (Infrastructure as a Service, IaaS). Continue reading
A Blockchain is the data structure that underpins Distributed Ledger Technology. Thanks to its cryptographic process, a Blockchain allows trust-based transactions between any two participants to take place, without physical contact and without either side knowing the other’s identity. Continue reading
According to Gartner, by year 2020, there will be more than 25 billion connected devices. These devices would connect with the cloud (and other devices) without any human intervention.
What used to be dumb machines, devices, sensors, cars etc. would now turn intelligent with added computing and network capabilities. Systems and assets, which used to be isolated from external networks, would get connected to the Internet.
What does this imply in the context of cybersecurity? And public safety? Continue reading
Copyright – The Washington Post – Mai 31 2016 – By Brian Fung
Despite falling out of vogue years ago, MySpace — that old precursor to Facebook — still has details on more user accounts than the United States has people. And now a hefty chunk of those account credentials has been leaked to the entire Internet, in a humbling reminder that the Matchbox Twenty-inspired username you probably made in high school is still worth a heck of a lot to companies and criminals. Continue reading
Copyright – Les Echos / Worldcrunch – April 21 2016 – By Roger-Pol Droit
Try to imagine that an intelligent robot is out to kill you. It remembers all your passwords and has access to all your data. Equipped with facial recognition technology, it can identify you wherever you go, even though you have no idea what it looks like. Continue reading
Copyright – The Telegraph – April 27 2016 – By Cara McGoogan
A vulnerability in Google’s navigation app Waze could let hackers follow your every move. Continue reading
Copyright – The Washington Post – April 22 2016 – By Karen Turner
Schools in Florida are renewing a program that monitors their students’ social media activity for criminal or threatening behavior, although it has caused some controversy since its adoption last year. Continue reading
Copyright – The Telegraph – March 29 2016 – By James Titcomb
Forgetting your passport on the way to the airport is one of the banes of modern travel, but those days could soon be over. Continue reading