Jan 🐝 Barbosa

hace 6 años · 3 min. de lectura · ~10 ·

Blogging
>
Blog de Jan 🐝
>
Can The Internet Of Things Survive Amidst A Pandemic Of Hacking? By Jan Barbosa And Featuring Katie King, MBA

Can The Internet Of Things Survive Amidst A Pandemic Of Hacking? By Jan Barbosa And Featuring Katie King, MBA

9dc0923c.jpg

a0ab573e.pngWe are living in the age of the Internet Of Things , the age when an ever-expanding list of our devices collects and exchanges vast amounts of data (our very own personal data) that is willingly (or unknowingly) shared to the cloud where it is analyzed to our benefit, so that we can know how many steps we took during the day, how long we drive every day or from which locations we connect across the city.

Yet, there lies a danger beneath the commodity of storing and giving away our information across networks, the dreaded HACK.

Hacking attacks have been in a frenzy lately, the Sony Hack, PlayStation Network Hack, Icloud leaks of celebrity photos and even the wearable health-oriented device "Fitbit" have been hacked providing information on the wearer daily habits.

Cybersecurity evolves rapidly to foil these daily attempts to erase, steal or ransom data every day, but sometimes the hackers win and precious information becomes part of the open markets. So here goes the question, if the biggest names in the business like Microsoft, Sony and Apple can be hacked, how secure can I be? More so when our common devices like cars, televisions, and refrigerators are becoming "smart"?

To the question of "Can We Survive An IOT Christmas Amidst A Pandemic Of Hacking ?", Artificial Intelligence expert and TedX speaker Katie King, MBA responds: We are living in the age of the Internet Of Things , the age when an ever-expanding list of our devices collects and exchanges vast amounts of data (our very own personal data) that is willingly (or unknowingly) shared to the cloud where it is analyzed to our benefit, so that we can know how many steps we took during the day, how long we drive every day or from which locations we connect across the city. Yet, there lies a danger beneath the commodity of storing and giving away our information across networks, the dreaded HACK. Hacking attacks have been in a frenzy lately, the Sony Hack, PlayStation Network Hack, Icloud leaks of celebrity photos and even the wearable health-oriented device "Fitbit" have been hacked providing information on the wearer daily habits. Cybersecurity evolves rapidly to foil these daily attempts to erase, steal or ransom data every day, but sometimes the hackers win and precious information becomes part of the open markets. So here goes the question, if the biggest names in the business like Microsoft, Sony and Apple can be hacked, how secure can I be? More so when our common devices like cars, televisions, and refrigerators are becoming "smart"? To the question of "Can We Survive An IOT Christmas Amidst A Pandemic Of Hacking ?", Artificial Intelligence expert and TedX speaker Katie King, MBA responds:

Can We Survive An IOT Christmas Amidst A Pandemic Of Hacking? Featuring Katie King, MBA

By Jan Barbosa

7a9234ba.jpgBack in 1984, novelist George Orwell’s ominously portrayed a “telescreen” - a TV which constantly monitors its viewers, warning that governments would use technology to cross the threshold into our private world. According to confidential documents published by WikiLeaks earlier this year, the CIA has created its own 21st century telescreen by hacking into smart TVs.

Furthermore, a recent study by the University of Edinburgh has revealed that the increasingly popular Fitbit device, which can calculate steps, calories and sleep patterns, is vulnerable to hackers. Despite its end-to-end encryption, where messages are scrambled and ultimately deciphered, the research team were able to access personal information from the devices as it was sent to the cloud.

With the Christmas season around the corner, there will no doubt be demand for innovative messaging kettles; rice cookers controlled by smartphones, and shoe insoles connected to map applications which vibrate to direct you.

But the implications for security breaches like this are very serious. For example, hackers could falsify activity records, steal personal data and use it to blackmail users. Worrying examples include hackers who attacked the electronic key card system of a hotel in the Austrian Alps. They have resorted to old-fashioned locks after being forced to pay €1,500 to allow guests back into their rooms. Similarly, last Christmas, hackers used ransomware to take over an American family’s TV, disabling it for four days.

IoT developments such as wearables are exciting but the issue seems to be that the security and privacy lag badly behind. As the Financial Times reported: “The basic vulnerabilities inherent in the internet of things — one of the biggest concepts being pursued in the technology industry — have been known for some time. Samsung even warned customers in 2015 that “if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of voice recognition”.”

The best advice to date is to update everything and unplug things when they are not in use.



cc2e1cbf.jpg

Katie King is a TedX speaker and expert on the subject of Artificial Intelligence. Founder of @Zoodikles and @AlinFM, also a consultant for @DigitalLeadersA and @PRCA_UK. As of now she is writing a book on Artificial Intelligence.

Katie King have delivered two TEDx talks, and is a regular commentator on BBC TV and radio.  She is therefore regarded as an expert in the social business, PR and digital sphere, and also a regular speaker on the international circuit at both conferences and Gala dinners.





14428f1e.png

Jan Barbosa Is a global brand ambassador for beBEE.com, also an Onalytica 2016 Top One Hundred  Augmented Reality Influencer and Interested in Social Media, Influencer Marketing & Artificial Intelligence. 

As a technology advocate, he strongly participates in areas as Artificial Intelligence, Augmented Reality, Virtual Reality, and Cyber Security.

All articles are initially published in beBEE.com using the superb beBEE Producer tool.

"""""
Comentarios

Jan 🐝 Barbosa

hace 6 años #3

#3
True Story !!!! Kevin Baker

Jan 🐝 Barbosa

hace 6 años #1

Gary Farmer

Artículos de Jan 🐝 Barbosa

Ver blog
hace 6 años · 1 min. de lectura

As the world of technology progresses into every aspect of our lives, the data we produce expands wi ...

hace 5 años · 1 min. de lectura

As the world of technology progresses, · Artificial Intelligence becomes more intertwined · with eve ...

hace 6 años · 2 min. de lectura

There is a reason why corporations (and hackers) are trying to gather as much of your data as possib ...

Puede que te interesen estos puestos de trabajo

  • Unitec De Pr

    Oficial De Colocaciones

    Encontrado en: Buscojobs PR C2 - hace 5 días


    Unitec De Pr Aguadilla, Puerto Rico

    Asistir al estudiante el en proceso de búsqueda de empleoOfrecerá orientación a los estudiantes sobre el mercado de empleosResponsable del proceso de obtención de licenciasMantener la organización de los expedientes de los egresados ofreciéndole seguimiento de 30, 90,180 y 360Se ...

  • HR Works

    Industrial Engineer

    Encontrado en: Talent PR C2 - hace 1 día


    HR Works Dorado, Puerto Rico Contract

    Position Overview: · We are seeking a highly skilled and experienced Industrial Engineer with specialized expertise in time studies to join our dynamic team in a medical device manufacturing plant. The ideal candidate will possess a deep understanding of industrial engineering pr ...

  • Hr Remarkable Talent

    Gerente De Proyectos

    Encontrado en: Buscojobs PR C2 - hace 23 horas


    Hr Remarkable Talent San Juan, Puerto Rico

    Estamos en la búsqueda de un Gerente de Proyectos con enfoque en informática y tecnología en salud. Esta posición es crucial para la coordinación y supervisión de proyectos, asegurando el cumplimiento y la eficiencia organizacional.Actividades clave:-Desarrollar y ejecutar el pla ...