On the one-hand we have ‘cloud apps’ which make it easy to access our work from multiple devices and to collaborate online with others (e.g. Google Docs, Trello, …). On the other hand we have good old-fashioned native apps that you install on your operating system (a dying breed? See e.g. Brendan Burns’ recent tweet). Somewhere in the middle, but not-quite perfect, are online (browser-based) apps with offline support.
Have you actually thought about how much you are tracked on a daily basis? Think about everything you post on social media, what you search, the apps that are generating metadata (with or without your consent), what your phone knows about you. Not forgetting your “voice assistants,” there is a worrying amount of data we generate every day that builds an impressive digital footprint. Reads more in
Interest in Artificial Intelligence (AI) has skyrocketed in recent years, both among the media and the general public. At the same time, media coverage of AI has wildly varied in quality – at one end, tabloid and clickbait media outlets have produced outrageously inaccurate portrayals of AI that reflect science fiction more than reality. Reads more in
Web-connected devices including smart TVs, watches and home speakers will be subject to a new industry code to protect families, businesses and Australia’s national security from cyber hackers.
Home Affairs Minister Peter Dutton will on Tuesday raise the alarm on poor cyber security features in many devices, calling on companies to do more to stamp out cyber crime. Reads more in
What do you get a hacker or IT pro for Christmas? In an industry that is not often well-understood by those outside of it, trying to come up with ideas and presents that will prove themselves valuable and appreciated can be difficult. DNet has rounded up some of the most interesting gifts for hackers over Christmas 2019 to suit a range of budgets and abilities. Reads more in
Security researchers have uncovered a vulnerability in Android smartphones that could allow an attacker to secretly take photos and record videos without any permissions being granted. And the exploit works even if the phone is locked or the screen turned off, or even during an actual call – all without the knowledge of the user. Reads more in