We all know that tech has the potential to change lives for millions of people living with a disability. In recent years we have seen a couple of big breakthroughs that have opened up the arena for designers and developers. Namely 3D printing, the Internet of Things and Big Data are all huge areas of potential aid that hasn't yet been fully unlocked.
An R&D hack-a-thon might look like a jumble of circuit boards and wires, mixed up with the back room of a keyboard repair shop, but what I found going on was a profound statement about the equal value of all human beings. In amongst the smell of solder and the crackle of new code being written was a desire to see everyone have the chance to let their soul sing.
As the lines between the professional and social use of technology continue to blur, it is vital that we start to really recognise the significance of these attacks, how likely they are and how damaging they can be.
As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.
What shocked me about this story was not that this happens, but that people are surprised it has and we have failed to take even the most basic security steps like setting a password when connecting cameras and monitors to the Internet.
In the Oxford English Dictionary the word private is defined in several ways: 'kept or removed from public view or knowledge, not within the cognizanc...
Leaked. Over and over, the same phrase is being employed. The photographs were leaked... Did the photos of these women suddenly find themselves on the internet in an unfortunate accident, brought about through the laws of physics and a defective containment system? Or was there something else at work here?
A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses... Nowadays hackers actually get more value out of personal information as opposed to credit card details. In fact, one article even points out that Twitter account information is of more worth to a hacker than their credit card.
Connecting a computer to the internet without a virus protection program is as reckless as leaving your property in the street. It's an open invitation to hackers... they wrangle these herds of infected computers into massive botnets that can bring down whole websites and web-accessed systems at the touch of a button.
DDoS attacks are nothing new, with many high-profile attacks dominating the media over the last 12 months, but with well-known brands continuing to publicly feel the impact of attacks, they also show no sign of losing popularity with cyber criminals.
In Watch_Dogs, this system is called the Central Operating System (CTOS) - and it controls almost every piece of the city's technology and holds key information on all of the city's residents.
With over than 10 years of experience in the game industry, he has worked on many successful franchises, including Army of Two, before joining Ubisoft's team in 2010. He's currently Lead Game Designer on Watch Dogs where his expertise is pushed to new heights.
All it takes is the swipe of a finger. We connect with friends. We buy the latest gadgets and gear. We find out what's happening in the world. But with that same simple swipe, we cast an increasingly expansive shadow.
I'll leave it to biometrics companies to defend fingerprints in general (there are arguments on grounds of reliability, cost etc that carry some weight) and save my own opinions on biometrics as credentials for another day.
Coaching your employees on data protection just isn't enough. In the video, Holman speaks to this point, explaining "You could buy the most high-tech security software, then the admin guy whacks a generic password on it ... and you're sunk".
Data aggregators and directories are important roles in the ecosystem. There is so much data out there, that it's hard to keep up with what is available. Additionally, you want to ensure that the data feeds you want can be integrated with your existing data with minimal effort.