Last weekend’s reports about the New Zealand rugby team’s discovery of a listening device sewn in to a hotel meeting room chair, have illustrated just how much spying technology has advanced in recent years. These days, you don’t need to sit outside in a van with your headphones on, listening to static for an hour… Read more »
Posts Categorized: Cybersecurity
Counter-counter hacking
Posted by David Firth & filed under Business Intelligence, Civil Liberties, Cybersecurity.
The whistleblower Edward Snowden believes Russia is behind a leak of malware allegedly belonging to the US National Security Agency (NSA). Hackers calling themselves Shadow Brokers started an auction for the malware last week. The malware is used by the NSA to attack or counter-attack in cyberspace. Source: BBC Technology Date: August 17th, 2016 Link: http://www.bbc.com/news/technology-37104745 Discussion… Read more »
Leading Titles
Introduction to Information Systems, 3rd Canadian Binder Ready Version Update Edition
R. Kelly Rainer, Casey G. Cegielski, Ingrid Splettstoesser-Hogeterp, Cristobal Sanchez-Rodriguez
ISBN: 978-1-119-13385-8
August 2015, © 2016
CDN $98.95; CDN $114.95
Recent Posts
Categories
- 3D Printing (7)
- 5G (2)
- addiction (11)
- Advertisement (36)
- Amazon (49)
- Analytics (62)
- Android (7)
- Anonymous (1)
- app (90)
- App Economy (64)
- Apple (100)
- Artificial intelligence (113)
- Augmented Reality (15)
- Automation (23)
- Autonomous Vehicles (8)
- bandwidth (21)
- Banking (4)
- Big Data (17)
- Biometrics (31)
- Biomimicry (1)
- bitcoin (18)
- Blackberry (18)
- blockchain (12)
- blogging (7)
- Bluetooth (1)
- bots (8)
- brainwave technology (11)
- branding (65)
- browser (1)
- Business Analytics (1)
- Business Intelligence (107)
- business models (167)
- Careers (58)
- Censorship (9)
- Chatbots (1)
- China (18)
- Civil Liberties (38)
- Cloud Computing (58)
- cloud services (9)
- Collaborative filtering (10)
- Competitive advantage (72)
- Consumer Technology (71)
- Copyright (13)
- Crypto currency (13)
- Cuba (2)
- Cyber attack (7)
- cyber bullying (6)
- cyber terroism (15)
- cyber war (15)
- Cyberforensics (16)
- Cybersecurity (82)
- Dashboards (1)
- data analytics (57)
- Data center (3)
- data mining (23)
- Data storage (19)
- Database (1)
- Deepfake videos (1)
- Denial of service (7)
- Digital Detox (1)
- digital divide (17)
- Digital Policy (41)
- disintermediation (5)
- disruptive technology (36)
- domains (1)
- Drones (5)
- e-currency (1)
- e-payment (40)
- eathlete (1)
- ebook (1)
- Ecommerce (98)
- education (41)
- election (4)
- Electric vehicle (1)
- Electronic Surveillance (8)
- email (1)
- Emerging Economies (7)
- Emerging Technologies (85)
- emojis (4)
- encryption (3)
- Entertainment (14)
- Entrepreneurship (21)
- ERP (1)
- eSports (1)
- Ethereum (1)
- Ethical Issues (134)
- ethics (52)
- EXAM ARTICLE (28)
- exam2012A (23)
- FaceBook (91)
- Facial Recognition (1)
- Fake News (5)
- FBI (2)
- fibre optics (3)
- Firefox (1)
- Food delivery (1)
- Ford (2)
- Fortnite (1)
- foursquare (5)
- fraud (14)
- free speech (10)
- freemium (2)
- Functional Information Systems (13)
- Future of Work (3)
- Gaming (17)
- GDPR (General Data Protection Regulation) (1)
- global networking (4)
- godaddy (1)
- Google (71)
- google music (1)
- Google Play Store (1)
- Green Computing (2)
- Green Tech (11)
- hackers (24)
- Hardware (77)
- health (25)
- healthcare (16)
- History of IT and IS (1)
- Huawei (3)
- Human Resources (26)
- IBM (2)
- India (1)
- industry analysis (139)
- innovation (4)
- Innovator's Dilemma (3)
- Instagram (4)
- Intelligent Assistants (1)
- Internet (19)
- internet explorer (1)
- Internet of Things (10)
- internet protocols (2)
- IP addresses (1)
- iPad (26)
- iphone (23)
- IS ethics (29)
- ISPs (6)
- IT and History (8)
- IT and Politics (41)
- IT and Sport (1)
- IT and the law (24)
- IT Infrastructure (10)
- IT Trends (29)
- itunes (2)
- LinkedIn (1)
- M-commerce (47)
- malware (1)
- market intelligence (48)
- marketing (30)
- media (29)
- medicine (2)
- messenger (2)
- microsoft (20)
- millennials (2)
- MMO (1)
- money (5)
- music (8)
- MySpace (1)
- nano technology (1)
- NASA (1)
- national culture (51)
- Net Neutrality (3)
- Netflix (11)
- networking (5)
- newspapers on-line (3)
- Nike (1)
- Nintendo (1)
- Obama (3)
- obesity (2)
- online advertising (14)
- online business (10)
- online dating (6)
- online education (12)
- online gaming (3)
- Open Source (1)
- operating system (14)
- oracle (1)
- outsourcing (8)
- PaaS (Platform as a Service) (1)
- PayPal (2)
- peer file sharing (10)
- personal freedom (1)
- Personalization (20)
- Phablet (2)
- Pinterest (2)
- politics (12)
- pornography (4)
- Presidential Campaign 2012 (1)
- Presidential Debates (1)
- Privacy (63)
- programming (8)
- proxy (1)
- publishing (3)
- QR codes (1)
- Quantum Computing (1)
- ransomware (2)
- Reddit (2)
- Regulation (1)
- Remote working (1)
- Research (1)
- revenue model (42)
- rideshare (1)
- RIM (7)
- Risks and Controls (1)
- Robotic Process Automation (RPA) (1)
- robotics (28)
- Romney (2)
- SaaS (5)
- Samsung (7)
- satellites (2)
- Search (7)
- Security (48)
- self driving cars (19)
- Self driving vehicles (6)
- Sentiment Analysis (22)
- SEO (4)
- Shazam (1)
- siri (4)
- Skype (1)
- Smart Home (2)
- smartphones (74)
- smart phones (8)
- Snapchat (2)
- social impacts (60)
- Social Media (85)
- social tv (10)
- Software (30)
- Solar Energy (1)
- Sony (3)
- space (2)
- Space-based internet (1)
- spotify (1)
- SQL (1)
- squarespace (1)
- startup (1)
- STEM (1)
- streaming (2)
- streaming music (8)
- streaming video (34)
- Stripe (1)
- Super Bowl (2)
- Supply Chain Management (10)
- Sustainability (1)
- System development (27)
- T-mobile (1)
- Tableau (1)
- Tech Transfer (1)
- Tech-savvy (1)
- technology (47)
- technology-centric classroom (6)
- telecomunications (38)
- television (8)
- Tesla (1)
- texting (8)
- throttling (1)
- Tim Cook (3)
- Trump (1)
- Twitter (25)
- Uber (14)
- Uncategorized (50)
- User Experience (UX) (1)
- user habits (28)
- video (24)
- Virtual goods (2)
- Virtual Reality (4)
- virtualization (24)
- voice recognition (8)
- wearable technology (7)
- WhatsApp (1)
- white-collar (2)
- WI-Fi (17)
- wifi (2)
- wireless networks (24)
- Women in Tech (5)
- YouTube (16)