Lies, lies and lies

Lies, lies and lies

There are many types of lies that can be told. In the simplest forms, there’s harmless lies that ease social situations: “little white lies”. A dinner guest compliments a dish that’s actually disliked, rather than risk offending the friend who made it, or a partner saying they like a hair-cut they otherwise might not care …

+ Read More

Slavery in tech

Slavery in tech

Slavery – the idea of a human owning another human – is such a morally repellent concept that freedom from slavery is enshrined in the Universal Declaration of Human Rights: No one shall be held in slavery or servitude; slavery and the slave trade shall be prohibited in all their forms. Despite the efforts of …

+ Read More

Who dies?

Who dies?

The concept of ‘driverless cars’ is currently a tech and motoring obsession. The level of technology being embedded in cars – sensors, CPUs, software, etc. – is phenomenal. With any new technology that inspires, there’s hype, as well as reality. With driverless cars, the line between hype and reality is broad and blurred, not razor-sharp. …

+ Read More

I spy with my little eye…

I spy with my little eye…

In June 2016, Mark Zuckerberg, head of Facebook, posed with a photo-frame prop to celebrate Instagram growing to 500 million monthly users. While the photo itself was largely unremarkable, many tech users – followed by a number of journalists, noticed that Zuckerberg had a reasonably standard IT security approach of covering his laptop’s webcam with …

+ Read More

What happens when justice is blind to technology?

What happens when justice is blind to technology?

It is not uncommon to worry about what happens when law enforcement has access to too much technology. There are, of course, benefits to ethical, politically neutral, and responsible use of technology within law enforcement – though where the line is drawn between adequate capability and too much capability is also a common concern. (For example, …

+ Read More

Data breaches: an über-headache

Data breaches: an über-headache

In November 2017, a raft of news agencies reported of a scandal at the ride-sharing company, Uber. Per ABC Australia: According to the company’s account, two individuals downloaded data from a third-party cloud server used by Uber, which contained names, email addresses and mobile phone numbers of 57 million users around the world. They also …

+ Read More

The curated garden problem

The curated garden problem

When Apple first enabled third party applications on the iPhone, they were accused by many of violating user freedoms by creating a walled garden, that being the requirement that all applications installed on the platform must be installed via their iOS App store. Apple promoted this as allowing application vetting for performance and security: particularly …

+ Read More

Social engineering and the role of business

Social engineering and the role of business

In the context of security, social engineering refers to the act of tricking a person into handing over financial, sensitive or security details by impersonating someone the victim might normally expect to deal with. This differs from identity theft, in that the goal is to get the victim to handover useful information that might be used …

+ Read More

Do some parents engage in identify theft?

Do some parents engage in identify theft?

It’s something you’ll see from time to time on Facebook and other forms of social media. Little Sally suddenly has a Facebook profile and is friends with her mummy and daddy, her aunts and uncles, her grandparents and other close family friends. Except, Little Sally isn’t 13 years old, the legal age at which point …

+ Read More

Peek-a-boo, your boss might be tracking you

Peek-a-boo, your boss might be tracking you

Background On Friday, 24 April 1992, Brian Kush reported to the RISKS List: Yesterday while driving through GA, my Cellular Phone rang. Since I was roaming I was not expecting a call. When I answered it, it was a recording welcoming me to Bell South Mobility and offered instructions on using there [sic] service. I …

+ Read More

%d bloggers like this: