As the lines between the professional and social use of technology continue to blur, it is vital that we start to really recognise the significance of these attacks, how likely they are and how damaging they can be.
As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.
What shocked me about this story was not that this happens, but that people are surprised it has and we have failed to take even the most basic security steps like setting a password when connecting cameras and monitors to the Internet.
In the Oxford English Dictionary the word private is defined in several ways: 'kept or removed from public view or knowledge, not within the cognizanc...
Leaked. Over and over, the same phrase is being employed. The photographs were leaked... Did the photos of these women suddenly find themselves on the internet in an unfortunate accident, brought about through the laws of physics and a defective containment system? Or was there something else at work here?
A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses... Nowadays hackers actually get more value out of personal information as opposed to credit card details. In fact, one article even points out that Twitter account information is of more worth to a hacker than their credit card.
Connecting a computer to the internet without a virus protection program is as reckless as leaving your property in the street. It's an open invitation to hackers... they wrangle these herds of infected computers into massive botnets that can bring down whole websites and web-accessed systems at the touch of a button.
DDoS attacks are nothing new, with many high-profile attacks dominating the media over the last 12 months, but with well-known brands continuing to publicly feel the impact of attacks, they also show no sign of losing popularity with cyber criminals.
In Watch_Dogs, this system is called the Central Operating System (CTOS) - and it controls almost every piece of the city's technology and holds key information on all of the city's residents.
With over than 10 years of experience in the game industry, he has worked on many successful franchises, including Army of Two, before joining Ubisoft's team in 2010. He's currently Lead Game Designer on Watch Dogs where his expertise is pushed to new heights.
All it takes is the swipe of a finger. We connect with friends. We buy the latest gadgets and gear. We find out what's happening in the world. But with that same simple swipe, we cast an increasingly expansive shadow.
I'll leave it to biometrics companies to defend fingerprints in general (there are arguments on grounds of reliability, cost etc that carry some weight) and save my own opinions on biometrics as credentials for another day.
Coaching your employees on data protection just isn't enough. In the video, Holman speaks to this point, explaining "You could buy the most high-tech security software, then the admin guy whacks a generic password on it ... and you're sunk".
Data aggregators and directories are important roles in the ecosystem. There is so much data out there, that it's hard to keep up with what is available. Additionally, you want to ensure that the data feeds you want can be integrated with your existing data with minimal effort.
Keep your security software updated - Don't be tempted to put it off till later. Most updates are improvements by a software company, patching up security threats and fixing bugs - if you don't update, you are creating vulnerabilities in your systems which could be utilised by hackers.
In a bygone age, the Artful Dodger and his duplicitous pals would steal silk handkerchiefs and purses from unwitting members of the public.