In the Oxford English Dictionary the word private is defined in several ways: 'kept or removed from public view or knowledge, not within the cognizanc...
Leaked. Over and over, the same phrase is being employed. The photographs were leaked... Did the photos of these women suddenly find themselves on the internet in an unfortunate accident, brought about through the laws of physics and a defective containment system? Or was there something else at work here?
A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses... Nowadays hackers actually get more value out of personal information as opposed to credit card details. In fact, one article even points out that Twitter account information is of more worth to a hacker than their credit card.
Connecting a computer to the internet without a virus protection program is as reckless as leaving your property in the street. It's an open invitation to hackers... they wrangle these herds of infected computers into massive botnets that can bring down whole websites and web-accessed systems at the touch of a button.
DDoS attacks are nothing new, with many high-profile attacks dominating the media over the last 12 months, but with well-known brands continuing to publicly feel the impact of attacks, they also show no sign of losing popularity with cyber criminals.
In Watch_Dogs, this system is called the Central Operating System (CTOS) - and it controls almost every piece of the city's technology and holds key information on all of the city's residents.
With over than 10 years of experience in the game industry, he has worked on many successful franchises, including Army of Two, before joining Ubisoft's team in 2010. He's currently Lead Game Designer on Watch Dogs where his expertise is pushed to new heights.
All it takes is the swipe of a finger. We connect with friends. We buy the latest gadgets and gear. We find out what's happening in the world. But with that same simple swipe, we cast an increasingly expansive shadow.
I'll leave it to biometrics companies to defend fingerprints in general (there are arguments on grounds of reliability, cost etc that carry some weight) and save my own opinions on biometrics as credentials for another day.
Coaching your employees on data protection just isn't enough. In the video, Holman speaks to this point, explaining "You could buy the most high-tech security software, then the admin guy whacks a generic password on it ... and you're sunk".
Data aggregators and directories are important roles in the ecosystem. There is so much data out there, that it's hard to keep up with what is available. Additionally, you want to ensure that the data feeds you want can be integrated with your existing data with minimal effort.
Keep your security software updated - Don't be tempted to put it off till later. Most updates are improvements by a software company, patching up security threats and fixing bugs - if you don't update, you are creating vulnerabilities in your systems which could be utilised by hackers.
In a bygone age, the Artful Dodger and his duplicitous pals would steal silk handkerchiefs and purses from unwitting members of the public.
110 developers rocked up to One Canada Square, Canary Wharf recently for the London-leg of the PayPal search to find the best hackers across ten of the world's coolest cities.
"White hats" or white hat hackers whom are equally interested in researching weaknesses in computer security systems but for more altruistic purposes. They may be employed by tech companies, computer security companies, universities or individuals.
Earlier in the year, I highlighted the importance of using unique, complex passwords for securing our online identities. This is especially true for mobile devices. Many of us today use our phones for the bulk of our online activities. This is very convenient, of course. But it does mean that our online life lies behind a single password.