The folks behind some of the technology in Siri, the iPhone’s virtual personal assistant, are bringing their voice recognotion technology to customer service applications, including bank, cable and credit card smartphone apps. Nuance Communications (NUAN) last week announced the creation of “Nina,” a natural human language input software that is designed to understand customers’ questions about their… Read more »
Posts Categorized: Security
Canadians Craving Smarter Homes as Trend Gathers Momentum
Description: Connected smart home devices are well on their way to becoming as prevalent as smartphones and tablets. Source: Tech Crunch Date: April 21, 2016 A new study conducted by MARU/VCR&C, and commissioned by Telus, found a significant gap between those that believe that smart home technology will benefit their lives (61 per cent) and those… Read more »
Top 5 social media scams to avoid
Description: Scammers have been worming their way into giant social media networks to trick people into giving over their personal and financial information Source: CNN Money Date: April 22, 2016 1. Fake customer service accounts on Twitter: Online criminals set up fake customer service accounts to phish for bank login and password information and other sensitive… Read more »
Inside the mind of a hacktivist
Description: Some people hack for a cause — it’s known as hacktivism. Laurie Segall speaks to face-to…mask with Anonymous, and speaks with a hacker who fights for justice by attacking racist websites, but finances his operations by selling security flaws. Source: CNN Money Date: March 12, 2016 Questions for discussion: 1. Do you believe the “hacktavist”… Read more »
Apple computers targeted in first ‘ransomware’ attack
Description: Apple computers targeted in first ‘ransomware’ attack Source: CNN Money Date: March 7, 2016 Questions for discussion: 1. Do you believe that the hackers waited until the most opportune moment, when Apple has been must under scrutiny, to release this new malware? 2. If you are an Apple user, was one of the deciding factors… Read more »
Hacker Steals 1.2 Billion Logins
Description: The FBI has linked a hacker to the theft of 1.2 billion internet credentials – the largest heist of its kind. Source: BBC Date: November 25, 2015 A hacker known as “mr.grey” is named in court documents filed by the bureau last year. Previously, “mr.grey” had advertised the credentials to Facebook and Twitter accounts for… Read more »
Technology and the Fight Against Terrorism
Description: Preventing terrorist plots is harder than ever, and technology is both the problem and the solution. Source: CNN Money Date: November 24, 2015 Violent extremists like ISIS meet in the open on Facebook or Twitter. Then they take the conversation private, using technology called encryption to encode their messages. It’s called “going dark”, and it’s one… Read more »
Android Apps Sending Hidden Data
Description: How many of your Android Apps are sending your hidden data? Source: Engadget Date: November 22, 2015 You may already know that Android apps send a lot of data, but you might be surprised at how much of it isn’t really necessary. While the data collected is likely to be harmless, there is always… Read more »
The Hackers Fighting ISIS You’ve Never Heard of
Description: Ghost Security Group, also known as GhostSec, is small hacker army composed of ex-military and ex-Anonymous members fighting ISIS online. Source: CNN Money Date: November 20, 2015 Ghost Security Group is a counter terrorism network that combats extremism on the digital front lines of today using the internet and social media as a weapon. Questions for… Read more »
Kodak’s Latest Live-streaming Camera Offers HD Video for Less
Description: Kodak enters the security camera space. Source: CNET Date: October 10, 2015 Kodak isn’t new to the world of live-streaming cameras, but its $150 Video Monitor CFH-V20, announced this week, boasts the most impressive specs in the brand’s expanding lineup. Read More Questions for discussion: 1. Do you think this is a space Kodak… Read more »