The revolutionary impact of fast spreading digital and mobile phone technologies underpin an on-going conversation, yet to reach its conclusion. From the perspectives of non-violence and social development, optimists argue that a mass communication infrastructure enables campaigners to challenge the conditions of injustice and oppression.
Of course the PC is not going to be replaced completely in business. But such is the power and flexibility of today's mobile devices, and the willingness of businesses to embrace the often-hyped 'Bring Your Own Device' movement, that means we as users are making more and more use of mobile devices not just to watch funny kitten movies, but also to do our 'normal' business day-to-day.
It's difficult to imagine how cyber warfare could wreak the same havoc as traditional, conventional war. But as former director of national intelligence Mike McConnell once noted, cyber war has the potential to mirror the nuclear challenge - less in the physical sense, but in terms of the potential economic and psychological effects.
It seemed all the world's newswires went into meltdown this week at the exciting news of a pair of new Apple iPhones soon becoming available. But while Apple continues to command a huge share of the growing smart phone market, it is use of Android phones that continues to expand at the biggest rate.
The UK's National Cyber Security Strategy aims to increase the scale and impact of these efforts by building resilience globally and assisting those countries that lack the infrastructure and expertise to protect their cyberspace, while also working to ensure cyberspace supports innovation, economic growth and social benefits.
For most of today's cybercriminals their activities are not a hobby to brag about with mates. What they do is a serious business to them and they employ many of the best 'traditional' business practices mainstream companies use with the goal of making money. Today's cybercriminal gangs are highly professional and motivated.
Most cyber attackers are likely to use the easiest route in. They're lazy. No different from your run-of-the-mill hijacker who will gladly steal the car of someone who leaves the keys in it. In the case of the cyber criminal, he will of course test the 'lowest common denominator' method against the widest range of IP addresses from the same source set of IP addresses.
Security is now a question of trying to think like the attacker and assume that something bad will eventually happen. Today knowing what you are going to do before, during and after the attack is the thing that will make the difference and lessen the embarrassment and damage a breach could ultimately cause.
Drive-by downloads are a common method used to spread malware. Cybercriminals look for insecure web sites and plant a malicious script into HTTP or PHP code on one of the web pages. This script may install malware directly onto the computer of someone who visits the site, or it may take the form of an IFRAME that re-directs the victim to a site controlled by the cybercriminals.
why is it we seem to value physical over digital so much? We often act very much more recklessly in the digital world than the physical. After all how many of us have taken directions from a friend or colleague to visit a certain website without a second thought? Few people take the trouble to check the validity of the website we are visiting before we go there, or even know what to look for.
We need to recognize that the cybercriminals who carry out today's attacks are professionals. They are well funded, well resourced and they bring in the right expertise to do the job they are paid to do. They are often in it for the long game and they will work for days, weeks, months or even years to find a weak link and exploit it.
The problem for the hard pressed banks' Chief Information Security Officers is that today's attacks are not noisy ego driven dares by bored youngsters, rather they are well-funded, highly motivated attacks by criminal gangs using the full power of the internet to resource and carry them out. It is also all about making money rather than fame as the motivation for such hacks and attacks.