As 2023 draws to a close, is there anything we can learn from a cyber security perspective? Once the dust settles on the year and figures emerge, which is usually in the first quarter of the following year, it will likely show that familiar trends continue. As you read on we’ll document the biggest and most famous cyber attacks of 2023 as they happen. We’ll offer some technical analysis, insight and, where possible, explore lessons that can be learned.
Smart clothes or spy clothes? It's not enough that we collect data about our phones, computers, routers, medical histories, license plates, financial IDs and school systems. Now clothing companies and the US government are investing resources in developing "smart clothing". Learn more here.
For some time now, a phenomenon has been appearing in squares and public places in Argentina and other Latin American cities: long queues of people waiting to have their irises scanned with a silver-coloured ball on a tripod. This is the Worldcoin project, an initiative by Sam Altman, the owner of OpenAI, the company that developed ChatGPT, which gives out money (cryptocurrencies or dollars) in exchange for having your eye scanned.
Since the 1950s, the Space Surveillance Network has been working to collect electro-optical, passive radio frequency (RF) and radar sensors that can monitor citizens around the world using satellite information and a variety of methods and technologies. Now they are new players in space, working with governments to track you more than ever. Find out how here.
My personal rule is to never scan a QR code, but QR codes are everywhere and while they are super convenient, they can also pose a threat to cyber security. Here's why you should be vigilant.
Social digital points are not only being introduced in China. Governments around the world are using mechanisms to collect private and personal data from their citizens to decide which public services they should and should not receive.
Big tech platforms are now as important as the postal service, bank loans, telephony and other essential services that businesses build their operations around. Here I explain what big tech dependency means, but also how to get out of the rabbit hole. Why? Since the last decade, many content-driven businesses have gone fully digital. This shift has inevitably tied them to platforms managed by tech companies or made them dependent on big tech companies.
That can only mean one thing: No more anonymity. Many countries are considering age controls for internet use. This is to ensure that children are protected from the wild things on the internet. But is this really about protecting children or collecting data?
Hundreds of Linkedln users have reported on social media platforms that their account has been hacked. Here you can find out how to protect your account.
In an age where our smartphones store a wealth of sensitive information, ensuring your privacy and security is of paramount importance. Embark on a journey of digital empowerment as we explain 8 essential privacy strategies tailored specifically to your mobile phone.