- By Bill Kovarik
In 1915, Gabrielle Darley killed a New Orleans man who had tricked her into a life of prostitution. She was tried, acquitted of murder and within a few years was living a new life under her married name, Melvin.
Who owns your face? Of course, a silly question … right? But what about the data generated from your face? And what does it mean to have your face become data?
In recent years, the most popular gadgets sold on Amazon have included a variety of smartphones, wearable tech, tablets, laptops and digital assistants such as Amazon’s Echo Dot. But any device connected to the internet (including almost all of the above) exposes our personal data to a host of threats.
As the ongoing pandemic has a larger segment of the population working from home — with all of its attendant distractions — and the setting is ripe for exploitation. The humble home router has become the surface attack...
Facebook has responded to Netflix documentary The Social Dilemma, saying it “buries the substance in sensationalism”.
Drones of all sizes are being used by environmental advocates to monitor deforestation, by conservationists to track poachers, and by journalists and activists to document large protests.
A famous 1990s New Yorker cartoon showed two dogs at a computer and a caption that read “On the Internet, nobody knows you’re a dog.”
The commodification of the internet in the early 1990s brought western societies into the digital age and has changed the way consumers interact with commercial enterprises.
US police forces have been turning to technology to track down Black Lives Matter protestors.
Passwords have been used for thousands of years as a means of identifying ourselves to others and in more recent times, to computers.
From internet-connected televisions, toys, fridges, ovens, security cameras, door locks, fitness trackers and lights, the so-called “Internet of Things” (IoT) promises to revolutionise our homes.
- By Uri Gal
The recent questioning of the heads of Amazon, Facebook, Google and Apple in the US Congress has highlighted the threat their practices pose to our privacy and democracy.
As survey results pile, it’s becoming clear Australians are sceptical about how their online data is tracked and used. But one question worth asking is: are our fears founded?
Many people look for more privacy when they browse the web by using their browsers in privacy-protecting modes, called “Private Browsing” in Mozilla Firefox, Opera and Apple Safari; “Incognito” in Google Chrome; and “InPrivate” in Microsoft Edge.
In case 2020 wasn’t dystopian enough, hackers on July 15 hijacked the Twitter accounts of former President Barack Obama, presidential hopeful Joe Biden, Elon Musk, Jeff Bezos, Kim Kardashian and Apple, among others.
Anyone familiar with George Orwell’s novel 1984 will relate to the menace of Big Brother watching their every keystroke and mouse click.
- By Aaron Mauro
If you are a front-line worker or working from home, you must also consider how these adaptations will present opportunities for criminals wanting to exploit this crisis.
The biggest threat to an organisation’s cyber-security comes from within, according to a growing body of evidence.
While most of the world is trying to deal with the COVID-19 pandemic, it seems hackers are not on lockdown.
- By Alan Greene
National constitutions and international human rights treaties often contain clauses that allow governments to temporarily suspend their obligations in a time of crisis.
- By Jason Nurse
Remote working can be a blessing. More time with family, less commuting, and meetings from the comfort of your living room.
The UK is currently witnessing a tug of war over facial recognition. On the streets of London and in South Wales, live systems have been deployed by the police,
- By Ritesh Chugh
Cybercriminals are on the prowl to infect your mobile devices such as smartphones and tablet computers and access your personal data, or install malware while you charge them.