It's official - digitisation has taken over our lives. With there now being more mobile devices than humans on earth and even fridges and kettles being connected to the internet, it's sadly inevitable that malicious organisations will attempt to access our data.
At the moment, any company can get hacked at any time. So it is moot whether moral or legal responsibility to protect data ultimately lies with a business. Once your data has been stolen, there's little recourse - it's going to be very inconvenient for you.
This behaviour, now illegal in the UK and across 23 states in the US, has spawned an entire industry. Revenge porn websites generate upwards of $50,000 in advertising revenue each month, with some even charging victims a fee to remove photos.
The digital age of the automobile is approaching fast, and it's lead to a tense relationship between the carmakers who've been churning out mechanical objects and the tech giants who see cars as the next battleground for consumers' hearts and minds.
If the illegal download of eBooks were one day to become a widespread activity, we could end up with the current authors being the last generation of authors making a living out of their work.
It's great that tech companies are at least talking about privacy, but they shouldn't be seen as the sole, compliant arbiter of anonymity online. Consumers use countless online services and gadgets - we should be demanding that anonymity and privacy should be baked in at the core.
There is a strong case that artists, proponents of the emotional, fantastical, connective and not immediately economically useful, are being squeezed out by the overwhelming corporate pressures governing everything technological.
We all know that tech has the potential to change lives for millions of people living with a disability. In recent years we have seen a couple of big breakthroughs that have opened up the arena for designers and developers. Namely 3D printing, the Internet of Things and Big Data are all huge areas of potential aid that hasn't yet been fully unlocked.
An R&D hack-a-thon might look like a jumble of circuit boards and wires, mixed up with the back room of a keyboard repair shop, but what I found going on was a profound statement about the equal value of all human beings. In amongst the smell of solder and the crackle of new code being written was a desire to see everyone have the chance to let their soul sing.
As the lines between the professional and social use of technology continue to blur, it is vital that we start to really recognise the significance of these attacks, how likely they are and how damaging they can be.
As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.
What shocked me about this story was not that this happens, but that people are surprised it has and we have failed to take even the most basic security steps like setting a password when connecting cameras and monitors to the Internet.
In the Oxford English Dictionary the word private is defined in several ways: 'kept or removed from public view or knowledge, not within the cognizanc...
Leaked. Over and over, the same phrase is being employed. The photographs were leaked... Did the photos of these women suddenly find themselves on the internet in an unfortunate accident, brought about through the laws of physics and a defective containment system? Or was there something else at work here?
A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses... Nowadays hackers actually get more value out of personal information as opposed to credit card details. In fact, one article even points out that Twitter account information is of more worth to a hacker than their credit card.
Connecting a computer to the internet without a virus protection program is as reckless as leaving your property in the street. It's an open invitation to hackers... they wrangle these herds of infected computers into massive botnets that can bring down whole websites and web-accessed systems at the touch of a button.