Today’s Reading (20 Nov 2019)

Local-first software: you own your data, in spite of the cloud

On the one-hand we have ‘cloud apps’ which make it easy to access our work from multiple devices and to collaborate online with others (e.g. Google Docs, Trello, …). On the other hand we have good old-fashioned native apps that you install on your operating system (a dying breed? See e.g. Brendan Burns’ recent tweet). Somewhere in the middle, but not-quite perfect, are online (browser-based) apps with offline support.

Personal & Operation security: Oversharing is a risk, one an adversary will capitalize on

Have you actually thought about how much you are tracked on a daily basis? Think about everything you post on social media, what you search, the apps that are generating metadata (with or without your consent), what your phone knows about you. Not forgetting your “voice assistants,” there is a worrying amount of data we generate every day that builds an impressive digital footprint. Reads more in

AI Coverage Best Practices

Interest in Artificial Intelligence (AI) has skyrocketed in recent years, both among the media and the general public. At the same time, media coverage of AI has wildly varied in quality – at one end, tabloid and clickbait media outlets have produced outrageously inaccurate portrayals of AI that reflect science fiction more than reality.  Reads more in

New code for internet-connected devices to stop hackers

Web-connected devices including smart TVs, watches and home speakers will be subject to a new industry code to protect families, businesses and Australia’s national security from cyber hackers.

Home Affairs Minister Peter Dutton will on Tuesday raise the alarm on poor cyber security features in many devices, calling on companies to do more to stamp out cyber crime. Reads more in

The best Christmas gifts for hackers

What do you get a hacker or IT pro for Christmas? In an industry that is not often well-understood by those outside of it, trying to come up with ideas and presents that will prove themselves valuable and appreciated can be difficult. DNet has rounded up some of the most interesting gifts for hackers over Christmas 2019 to suit a range of budgets and abilities. Reads more in

Millions of Android phones may be vulnerable to camera spying vulnerability

Security researchers have uncovered a vulnerability in Android smartphones that could allow an attacker to secretly take photos and record videos without any permissions being granted. And the exploit works even if the phone is locked or the screen turned off, or even during an actual call – all without the knowledge of the user. Reads more in

8 Top Technical Resource Providers for ICS Security Professionals



Categories: dailyread

Tags: , , ,

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.