How to Overcome Cognitive Biases That Threaten Data Security

No one is immune to cognitive biases, but how can IT decision-makers ensure that logical flaws don’t weaken data security? Learn how to overcome these security flaws that exist in our heads.

The post How to Overcome Cognitive Biases That Threaten Data Security appeared first on Security Intelligence.

Continue reading How to Overcome Cognitive Biases That Threaten Data Security

Why You Need New Mobile Security Best Practices for Business Travel

In recent years, the risks associated with passing through an airport have changed dramatically. This demands a complete rethink about mobile security best practices for international travel.

The post Why You Need New Mobile Security Best Practices for Business Travel appeared first on Security Intelligence.

Continue reading Why You Need New Mobile Security Best Practices for Business Travel

Five Surprising Reasons to Invest in Better Security Training

Security training programs should go beyond the basics and address why phishing attacks, social engineering schemes and other insider threats impact employees personally.

The post Five Surprising Reasons to Invest in Better Security Training appeared first on Security Intelligence.

Continue reading Five Surprising Reasons to Invest in Better Security Training

Yes, Apple is building a car

The experts say Apple’s self-driving car project is canceled, delayed or converted into a software play. They’ll also tell you that cars are a weird business for Apple to be in.

The experts have it all wrong.

Apple is going pedal-to-the-metal on building a car and for good reason. Here’s why.

Talk about titans

Steve Jobs wanted Apple to make an “iCar.”

The late Apple founder and CEO wanted more than that, according to J. Crew CEO and chairman Mickey Drexler, who served on the Apple board from 1999 to 2015. Jobs wanted Apple to reinvent the automobile industry.

The idea of an Apple car was considered crazy talk — until word leaked about a secret Apple initiative called “Project Titan,” which reportedly involved more than 1,000 engineers.

To read this article in full or to leave a comment, please click here

Continue reading Yes, Apple is building a car

Posted in Uncategorized

How the Amazon Echo Look improves privacy

Look! A new Amazon Echo!

The Amazon Echo Look is like the original Echo, plus a camera.

The $200 device delivers the Alexa virtual assistant. But the camera is optimized for helping you choose clothing to look your best when you get dressed.

The Echo Look is a camera for your bedroom. As such, it’s being widely slammed as a massive invasion of privacy.

But this view is wrong and based on a provably false assumption.

I’ll tell you exactly how the Echo Look actually improves privacy. But first, let’s take a closer look at the Look.

Alexa as fashion consultant

The Echo Look is shaped like a oversized pill — a cylinder with rounded ends that appears to be about half the size of the original Echo. It sits on a stand or mounts to a wall.

To read this article in full or to leave a comment, please click here

Continue reading How the Amazon Echo Look improves privacy

Posted in Uncategorized

OK, Google, let’s put the new voice ID everywhere

Google Home knows who’s talking.

When each recognized user speaks Home’s wake words — which are “Hey, Google” and “OK, Google” — Home now switches to that person’s account to give personalized information.

This is a huge deal, a technological marvel and a major leap forward in human-machine interaction.

It’s also a cautionary tale about the downside of overzealous concern about privacy.

How Google Home knows you’re you

Google Home is a virtual assistant appliance similar to the Amazon Echo that runs a version of the Google Assistant. Assistant is also available in Google’s Allo messaging app.

Google Home now supports up to six users for a single device.

To read this article in full or to leave a comment, please click here

Continue reading OK, Google, let’s put the new voice ID everywhere

Posted in Uncategorized

Honesty is not the best privacy policy

Digital privacy invasion is more than a theoretical or actual threat to our freedoms. It’s also a huge distraction.

Take MIT genius Steven Smith. He’s recently taken time away from his specialties of radar, sonar, and signal processing at MIT’s Lincoln Laboratory to automate the pollution of his family’s web traffic with thousands of arbitrary searches and sites.

His code essentially lies about internet activity to whomever is listening.

The software is an artful liar. According to a piece in The Atlantic, Smith’s algorithm uses web activity-spoofing software called PhantomJS to conduct searches in a way and on a timeline that mimics normal human online behavior.

To read this article in full or to leave a comment, please click here

Continue reading Honesty is not the best privacy policy

Posted in Uncategorized

The laptop is dead

You may never buy another laptop.

Ten years ago, laptop sales overtook desktop PC sales to become the dominant hardware platform for computing. Now smartphones are about to do to laptops what laptops did to desktops.

But wait, you may ask. What’s wrong with laptops?

Apple has run out of good laptop ideas

For the past decade, Apple has led and dominated the laptop market with design and innovation. The company has been moving toward better quality, so-called “Retina” screens. Apple’s keyboard designs and unibody aluminum construction have been heavily imitated. The company used to dazzle the industry by sweating the small stuff, like the MagSafe power connector and lights that shine through aluminum.

To read this article in full or to leave a comment, please click here

Continue reading The laptop is dead

Posted in Uncategorized