Politicians across the world have embraced Twitter as a way to directly connect with the public. It’s common for political offices to have an official account that is passed along to the next official. However, in recent years, we’re seeing a new trend: politicians issuing messages about official duties, but from an “unofficial” account. It might be a personal account that the official had before assuming office, or it might be an account that appeared outside official channels.
With New York and San Francisco ranking as Forbes top two smart cities globally for 2017, ensuring that smart cities are cyber secure is as crucial for national security as preventing malware.
Smart cities are in a race to increase their efficiency and tech capabilities and keep their top spot on the cyber world stage, nonetheless, they should equally be looking at ensuring their cities are as digitally safe as possible.
The university of Michigan recently found that multiple smart apps and devices have far more access than they really need, to perform necessary functions. This is being termed 'overprivileged' and has caught the fervent eyes of the cyber security community. This is largely because of the gaping hole growing in IOT cyber security.
As the world of IoT expands at an exponential rate, cyber security professionals are concerned that safety is playing second fiddle to consumer desires to stockpile smart goodies.
With the growing sophistication of our virtual assets and increasing dependence on IoT products and cloud computing, comes real developments in the Cyber-security landscape.
This has pushed cyber-security issues and hackers into everyday life for almost every type of individual and business.
The level of sophistication of cyber-crime is reminiscent of the shift from street to organized crime.
A huge setback in our web application use is the vulnerability of our data. Traditionally this has been addressed through encryption, more recently 'end-to-end' encryption which by wording alone suggests that we are 'covered' for securing our data.
Well, the wording is misleading because end-to-end encryption has until now, been unable to completely secure data in all conditions.
Although there is no legal guideline, the consensus is that our children don’t really need smart phones, not until they are at least twelve, possibly fourteen, or at least, that's what Bill Gates was saying in 2017.
In the Startup Tech Capital of the World, it seems only fitting that a new cryptocurrency would spark immediate excitement for potential investors. Silicon Valley leads the world in tech projects and blockchain projects yet, until now, VC (Venture Capital) funding has overwhelmingly gone through traditional funding channels.
So, while you are wondering whether you are one of the 87million who had their Facebook information harvested, it's time to let Zuckerberg's Congressional investigation take care of the corporate side and take stock of our own personal responsibility in protecting our data.
By James Azar
I want to start by asking you this very question? When you think of BlockChain what’s the first thing that come to your mind? (Comment Below)
Survey is most likely to say Bitcoin and Crypto Currency. Why? That’s what we know it as. Recent trends I read, speak and discuss with others is BlockChain is also the safest technology out there. Its already safer than the technology out there today and it can’t be hacked.
Let’s analyze this very statement. BlockChain is secure and can’t be hacked.