Canadians Craving Smarter Homes as Trend Gathers Momentum

Posted by & filed under app, Artificial intelligence, Green Tech, Hardware, innovation, Security, Smart Home, smartphones, Software.

Description: Connected smart home devices are well on their way to becoming as prevalent as smartphones and tablets. Source: Tech Crunch Date: April 21, 2016 A new study conducted by MARU/VCR&C, and commissioned by Telus, found a significant gap between those that believe that smart home technology will benefit their lives (61 per cent) and those… Read more »

Top 5 social media scams to avoid

Posted by & filed under Advertisement, Android, app, Apple, Banking, encryption, hackers, Privacy, Security, Social Media.

Description: Scammers have been worming their way into giant social media networks to trick people into giving over their personal and financial information Source: CNN Money Date: April 22, 2016 1. Fake customer service accounts on Twitter: Online criminals set up fake customer service accounts to phish for bank login and password information and other sensitive… Read more »

Inside the mind of a hacktivist

Posted by & filed under Anonymous, hackers, Security.

Description: Some people hack for a cause — it’s known as hacktivism. Laurie Segall speaks to face-to…mask with Anonymous, and speaks with a hacker who fights for justice by attacking racist websites, but finances his operations by selling security flaws. Source: CNN Money Date: March 12, 2016 Questions for discussion: 1. Do you believe the “hacktavist”… Read more »

Apple computers targeted in first ‘ransomware’ attack

Posted by & filed under Apple, hackers, malware, ransomware, Security.

Description: Apple computers targeted in first ‘ransomware’ attack Source: CNN Money Date: March 7, 2016 Questions for discussion: 1. Do you believe that the hackers waited until the most opportune moment, when Apple has been must under scrutiny, to release this new malware? 2. If you are an Apple user, was one of the deciding factors… Read more »

Hacker Steals 1.2 Billion Logins

Posted by & filed under fraud, hackers, Privacy, Security.

Description: The FBI has linked a hacker to the theft of 1.2 billion internet credentials – the largest heist of its kind. Source: BBC Date: November 25, 2015 A hacker known as “mr.grey” is named in court documents filed by the bureau last year. Previously, “mr.grey” had advertised the credentials to Facebook and Twitter accounts for… Read more »

Technology and the Fight Against Terrorism

Posted by & filed under cyber terroism, free speech, hackers, Internet, politics, Privacy, Security, Social Media.

Description: Preventing terrorist plots is harder than ever, and technology is both the problem and the solution. Source: CNN Money Date: November 24, 2015 Violent extremists like ISIS meet in the open on Facebook or Twitter. Then they take the conversation private, using technology called encryption to encode their messages. It’s called “going dark”, and it’s one… Read more »

Android Apps Sending Hidden Data

Posted by & filed under Analytics, Android, app, data analytics, data mining, Digital Policy, Privacy, Security, Social Media.

Description: How many of your Android Apps are sending your hidden data? Source: Engadget Date: November 22, 2015   You may already know that Android apps send a lot of data, but you might be surprised at how much of it isn’t really necessary. While the data collected is likely to be harmless, there is always… Read more »

The Hackers Fighting ISIS You’ve Never Heard of

Posted by & filed under cyber terroism, cyber war, Digital Policy, ethics, hackers, Privacy, Security.

Description: Ghost Security Group, also known as GhostSec, is small hacker army composed of ex-military and ex-Anonymous members fighting ISIS online. Source: CNN Money Date: November 20, 2015 Ghost Security Group is a counter terrorism network that combats extremism on the digital front lines of today using the internet and social media as a weapon. Questions for… Read more »

Kodak’s Latest Live-streaming Camera Offers HD Video for Less

Posted by & filed under Hardware, industry analysis, market intelligence, Privacy, Security, streaming video.

Description: Kodak enters the security camera space. Source: CNET Date: October 10, 2015   Kodak isn’t new to the world of live-streaming cameras, but its $150 Video Monitor CFH-V20, announced this week, boasts the most impressive specs in the brand’s expanding lineup. Read More Questions for discussion: 1.  Do you think this is a space Kodak… Read more »

The Blockchain Might Be The Next Disruptive Technology

Posted by & filed under disruptive technology, e-payment, Ecommerce, Functional Information Systems, industry analysis, Security, System development.

Description: A new development in asset exchange transactions. Source: TechCrunch Date: October 3, 2015   To process a transaction, you need first to make sure the sender owns the asset he wants to transfer, and make sure he will not trade it twice. In the blockchain, information is stored in blocks that record all transactions ever done… Read more »