The Internet of Things has a child privacy problem

The Internet of Things has a child privacy problem

Copyright -The Washington Post/Worldcrunch- Karen Turner

“In sum: Alexa is kinda my new best friend,” writes Rebecca Hanover, an author and blogger on Mommyproof. As a mother of young children, it’s not hard to see why: Hanover details the joys of virtual assistant Amazon Echo, which functions as a kind of combined kitchen helper, child entertainer and DJ. “Is it weird that Alexa feels like my trusty little friend during that six pm witching hour, gently guiding me through dinnertime?” Continue reading

Hackers Now Use QR Codes To Ensnare Users

Hackers Now Use QR Codes To Ensnare Users

Copyright – Les Echos – Fabien Rech

Hackers have started sending fraudulent emails using QR code technology, masquerading as a national communications provider to get client usernames and passwords.

It is a first in the history of hacking. Vade Retro, a company that specializes in mailbox protection, recently announced it had detected the first use of fraudulent emails using QR codes — two-dimensional barcodes used to store digital information that can be deciphered by a smartphone. Continue reading

The Coming Security Storm Over The Digital Cloud

Copyright – Les Echos – Fabien Rech

Would you give your house keys to a complete stranger when you are on vacation? Probably not. Human instincts opt for a safer solution.

The question of security is the major constraint preventing more widespread adoption of cloud computing technology. A study by Crowd Research Partners revealed that nine out of 10 professionals worry about safety and security. Data breaches remain the biggest concern for businesses that deploy private cloud servers, software cloud servers (Software as a Service, SaaS), or infrastructure cloud products (Infrastructure as a Service, IaaS). Continue reading

The Security of Things in a Connected World

The Security of Things in a Connected World

According to Gartner, by year 2020, there will be more than 25 billion connected devices. These devices would connect with the cloud (and other devices) without any human intervention.

What used to be dumb machines, devices, sensors, cars etc. would now turn intelligent with added computing and network capabilities. Systems and assets, which used to be isolated from external networks, would get connected to the Internet.

What does this imply in the context of cybersecurity? And public safety? Continue reading

Why you should delete the online accounts you don’t use anymore — right now

Copyright – The Washington Post – Mai 31 2016 – By Brian Fung

Despite falling out of vogue years ago, MySpace — that old precursor to Facebook — still has details on more user accounts than the United States has people. And now a hefty chunk of those account credentials has been leaked to the entire Internet, in a humbling reminder that the Matchbox Twenty-inspired username you probably made in high school is still worth a heck of a lot to companies and criminals. Continue reading

Explaining Human Nature To Robots

Copyright – Les Echos / Worldcrunch – April 21 2016 – By Roger-Pol Droit

Try to imagine that an intelligent robot is out to kill you. It remembers all your passwords and has access to all your data. Equipped with facial recognition technology, it can identify you wherever you go, even though you have no idea what it looks like. Continue reading