WHY IT MATTERS: Digital Transformation
215.0K views | +8 today
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tag: 'Security'. Clear
Scooped by Farid Mheir
Scoop.it!

Great #IoT example: Tesla cars Over-the-Air Repairs Are the Way Forward via MIT @TechReview

Great #IoT example: Tesla cars Over-the-Air Repairs Are the Way Forward via MIT @TechReview | WHY IT MATTERS: Digital Transformation | Scoop.it
Tesla and GM have both issued fire-related recalls, but Tesla’s fix doesn’t require owners to bring their cars in.
Farid Mheir's insight:

Benefits of having an Internet connected device - here a car - is that it can be remotely updated to fix issues or tune performance. Convenience and fast improvements.


Remember that this means it can also be remotely monitored, both for good and bad reasons, which may also raise security and privacy concerns.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Scary thought: the next "Polytechnique" shooting may be live-streamed on Facebook #ces2014 @ars

Scary thought: the next "Polytechnique" shooting may be live-streamed on Facebook #ces2014 @ars | WHY IT MATTERS: Digital Transformation | Scoop.it

Hutchinson got his first taste of Tracking Point at last year’s CES. His feature about the company’s rifle, which assists the shooter with sighting a target, received massive attention from Ars readers as well as from other sites. The controversy of gun ownership played no small role in the wide readership, but the empirical importance and innovation is difficult to deny: a bevy of sensors come together to allow an inexperienced marksman to nail a target at 1,000 yards.

Farid Mheir's insight:

Very scary thought came over me as I watched over the video in this posting: the next crazy shooter now has everything he needs to live-stream his killing on Facebook, YouTube or other. 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Resolutions for a Digital New Year via @PasswordBox @wsj

This year, safeguarding your digital life with PasswordBox is one of the easier resolutions you make. Read on for tips on how to improve your security now
Farid Mheir's insight:

We should always follow these 4 steps

  1. have a pin code lock on phone
  2. update passwords
  3. use complex passwords

Now the concept of digital legacy and digital benificary are also worth considering.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Tools for a Safer PC via @BrianKrebs

Tools for a Safer PC via @BrianKrebs | WHY IT MATTERS: Digital Transformation | Scoop.it

An important aspect of securing any system is the concept of “defense-in-depth,” or having multiple layers of security and not depending on any one approach or technology to block all attacks. Here are some links to tools and approaches that I have found useful in stopping malware from invading a PC. 

Farid Mheir's insight:

This is a fairly technical post that applies mostly to windows users.


A great complement to

The Scrap Value of a Hacked PC @BrianKrebs http://sco.lt/9Hiw8v

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Scrap Value of a Hacked PC @BrianKrebs

The Scrap Value of a Hacked PC @BrianKrebs | WHY IT MATTERS: Digital Transformation | Scoop.it
Farid Mheir's insight:

Look at the diagram and read the post then follow the last link.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Information Security 2013 year in review - China, Snowden & others via @BlackHatEvents @Thinkst

Information Security 2013 year in review - China, Snowden & others via @BlackHatEvents @Thinkst | WHY IT MATTERS: Digital Transformation | Scoop.it

Whichever metrics you choose to employ, 2013 was a bumper year for the information security industry: An unholy mix of awesome research, APT drama and and the (almost expected) comedy of errors. "Cyberwar" started the year strong but lost ground to "opsec" as the years most overused (but least understood) terms.

Dozens of leaked documents, hundreds of conferences, thousands of talks and about a squillion inane tweets: we braved them all and carefully picked the most notable to give you a healthy summary, in under an hour**.

If you are keen to see which topics dominated the zeitgeist, which topics managed to escape the headlines despite being eminently profound and which topics we believe will be biting us soon, then join us. Give us an hour, we will give you 2013.

Farid Mheir's insight:

The webcast is very interesting although the resulting slide deck is cryptic. It provides very useful link list at the end for anyone looking to followup on the infoSec 2013 year in review.


Pretty scary if you ask me, the final word goes to Dan Geer saying "We are expanding the society-wide attack surface faster than we are expanding our (protection)"

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Sources: Target Investigating Data Breach — Krebs on Security

Sources: Target Investigating Data Breach — Krebs on Security | WHY IT MATTERS: Digital Transformation | Scoop.it

Target released a statement this morning confirming a breach, saying that 40 million credit and debit card accounts may have been impacted between Nov. 27 and Dec. 15, 2013.


According to sources at two different top 10 credit card issuers, the breach extends to nearly all Target locations nationwide, and involves the theft of data stored on the magnetic stripe of cards used at the stores.

Farid Mheir's insight:

What is interesting comes from the fact that the breach is not from eCommerce or online but rather in stores.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

NSA collects nearly five billion cellphone location records per day

NSA collects nearly five billion cellphone location records per day | WHY IT MATTERS: Digital Transformation | Scoop.it
Washington Post report (based on Snowden leaks) reveals a possible 27 TB database.
Farid Mheir's insight:

If you carry a cell phone, then you are being tracked.


Along the same lines:


NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say via @washingtonpost http://sco.lt/5z0Es5


Astonishing Graphic Shows What You Can Learn From 6 Months Of Someone's Phone Metadata http://sco.lt/7shPsH

No comment yet.
Scooped by Farid Mheir
Scoop.it!

@Defcon: Remotely Hacking Tire Pressure Monitors- how to control your car from its tires via @securityjh

@Defcon: Remotely Hacking Tire Pressure Monitors- how to control your car from its tires via @securityjh | WHY IT MATTERS: Digital Transformation | Scoop.it

A new vector for hacking a cars computer wirelessly.


I attended an interesting talk at Defcon today that revealed a potential security vulnerability that I never would have thought of in a million years. Yep, hacking the tire pressure monitoring system in your car. The talk called "Letting the Air out of tire pressure monitoring systems" was by Mike Metzger. Turns out the attack surface for such an attack is huge. In the U.S. the Tread Act mandated that every car built after 2007 must have a tire pressure monitoring system built-in. It also turns out that car tire pressure monitors (TPMSS) use unencrypted RF for the communication between the tire and the receiver. TPMS sensor alarms are what turn on that annoying low pressure light we are all familiar with on your dash console.

Farid Mheir's insight:

I had read about this back in 2010 and use this examples in my presentations regarding security and the future of digital transformations. Everything digital should be design with protection in mind because it will be hacked.


Also see other posts you may have missed:

  • Flying hacker contraption hunts other drones to control them- proof we are in a "digital far west era" via @ars http://sco.lt/8v5ATB
  • How your movements create a GPS 'fingerprint'- anonymous data is not enough to ensure privacy http://sco.lt/5KfaiX
  • Hacker Shows How To Attack An Airplane's Systems--Using A Phone http://sco.lt/97hSPx
  • NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say via @washingtonpost http://sco.lt/5z0Es5


No comment yet.
Scooped by Farid Mheir
Scoop.it!

Flying hacker contraption hunts other drones to control them- proof we are in a "digital far west era" via @ars

Flying hacker contraption hunts other drones to control them- proof we are in a "digital far west era" via @ars | WHY IT MATTERS: Digital Transformation | Scoop.it

SkyJack works by monitoring the media access control (MAC) addresses of all Wi-Fi devices within radio range. When it finds a MAC address belonging to a block of addresses used by Parrot AR.Drone vehicles, SkyJack uses the open-source Aircrack-ng app for Wi-Fi hacking to issue a command that disconnects the vehicle from the iOS or Android device currently being used to control and monitor it. Operators of the flying hacker drone are then able to use their own smart device to control the altitude, speed, and direction of the hijacked drone and to view its live video feeds.

Farid Mheir's insight:

This new system would not have gotten much publicity had it not been the perfect timing to come out at the same time that Amazon starts speaking of sending deliveries in 30min via flying drones.


Nevertheless it is a clear demonstration that we live in a "digital far west era": no rules, open country, first to come and set its flag into an area becomes owner, and the right to bear arm, to defend yourself, because there is no implicit or explicit community protection. It is every man for itself. That is the digital era we live in and it let's the best and the worst come out.


This "drone hack" is a kind reminder that, as developers, engineers, software developers or any digital field expert, you must assume that your device or application will be

  1. internet connected
  2. open for attack by hackers

I am sure that this was far from the minds of the Parrot developers, back in 2007-8-9-10 when they were designing their drones in labs. Never would they have imagined that their design would be distributed in 500K+ volume and thus become target of those hacks. Well, they should have.


Same applies to designers of the tire pressure sensors in cars. Should they have conceived their system to prevent hacking, as they were designed in an era where the Internet was in full use (circa 2005)? The answer is maybe.


But today, the answer must be YES for all and any new device or solution.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Protecting Your Company from Identity Thieves and Hackers in a Digital World- 3 areas to address via @stratandbiz

Protecting Your Company from Identity Thieves and Hackers in a Digital World- 3 areas to address via @stratandbiz | WHY IT MATTERS: Digital Transformation | Scoop.it
Recent events have shown that companies are always vulnerable to internal and external attacks on their digital data. They need a holistic plan to protect themselves.
Farid Mheir's insight:

I find the critical areas they highlight interesting.

Here is my take on it:

  1. Data security must become a board topic: security and privacy should be board topics, with data being one aspect of it. Or sliced the other way around, digital technologies should be a board topic, data being one aspect of it. No matter, this should be an area of focus that is tracked by internal auditors.
  2. Data security must be handled holistically across functions: absolutely. Where I come from (capgemini enterprise architecture), security was like governance and spawned across business, data, applications and technology domains.
  3. Data security should be thought of as leveraging a risk-based approach: I agree, you must understand and evaluate security risks to mitigate them
No comment yet.
Scooped by Farid Mheir
Scoop.it!

New survey of teens indicate concerns about fraud, security and Identity Theft

New survey of teens indicate concerns about fraud, security and Identity Theft | WHY IT MATTERS: Digital Transformation | Scoop.it
The Family Online Safety Institute works to make the online world safer for kids and their families by identifying and promoting best practice, tools and methods in the field of online safety, that also respect free expression.
Farid Mheir's insight:

Very useful survey of teens usage of Internet, social media and other digital technologies. They are, after all, digital natives, and looking at their behaviour may  show a little of what the future holds. Full of useful stats.


Thank you Diane Nault for the link!

No comment yet.
Scooped by Farid Mheir
Scoop.it!

NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say via @washingtonpost

NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say via @washingtonpost | WHY IT MATTERS: Digital Transformation | Scoop.it
Agency positioned itself to collect from among millions of accounts, many belonging to Americans.
Farid Mheir's insight:

This article shows very clearly how NSA and other government agencies have tapped into unencrypted links within companies (here Google but I expect they also did at other major providers. If they do it in the States, then they do it in other countries too. Fact of life.


I am a digital optimist. I think that we will be OK with both a) regulation to control information privacy as well as b) strong encryption for all data both in transit as well as in storage. Won't solve all issues but certainly will get us closer to safety and privacy we expect. I don't bellieve we should fall into the pessimistic view and stop using the cloud...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

10,000 Top Passwords

10,000 Top Passwords | WHY IT MATTERS: Digital Transformation | Scoop.it

Since then I have collected a large number of new passwords bringing my current list to about 6,000,000 unique username/password combos, including many of those that have been recently made public.

While many people have improved the security and strength of their passwords, there are still a huge number of people who pick from a very small list of common passwords. In fact, 91% of all user passwords sampled all appear on the list of just the top 1,000 passwords.

Farid Mheir's insight:

I continue to be amazed by the lack of proper passwords being used by people in general.


This study is recent but I assume things may change quite rapidly and solutions such as lastpass or password box are helping change this trend.


Also I assume this applies well to the USA but may be different in Canada, Quebec and elsewhere due to differences in language and culture.

No comment yet.
Rescooped by Farid Mheir from BIG data, Data Mining, Predictive Modeling, Visualization
Scoop.it!

Why privacy matters (bis)- Picture of your face is good enough to infer your Social Security Number via @AnalyticsInnova @TED

The line between public and private has blurred in the past decade, both online and in real life, and Alessandro Acquisti is here to explain what this means and why it matters.

Via AnalyticsInnovations
Farid Mheir's insight:

Another great talk about ways in which personal sensitive information can be extracted from a simple picture of your face, using public data on Facebook and elsewhere. 


Also read: 

Why privacy matters- why it is Paramount even if you’re “not doing anything you need to hide" via @TED http://sco.lt/8uDaLJ

Scooped by Farid Mheir
Scoop.it!

How to Bury Negative Google Results - Online Reputation Management via @bzimmatore

How to Bury Negative Google Results - Online Reputation Management via @bzimmatore | WHY IT MATTERS: Digital Transformation | Scoop.it

Here is a quick guide for marketing departments, techies or individuals to assist in burying negative search results on Google. Do keep in mind that the effectiveness of these actions will be determined by 1. the effort you are able to put into it and 2. The SEO and value of the site hosting the negative content.

Farid Mheir's insight:

Part of the new reality of the digital life, is how to manage the good and the bad. Here a very practical (if not easy) approach.

Jean-Marie Grange's curator insight, September 23, 2013 10:14 AM

Simple approach to manage online reputation.

Scooped by Farid Mheir
Scoop.it!

What is behavioural tracking? @gary_kovacs explains in 9min video: Tracking our online trackers via @TED #mustsee

As you surf the Web, information is being collected about you. Web tracking is not 100% evil -- personal data can make your browsing more efficient; cookies can help your favorite websites stay in business.
Farid Mheir's insight:

I've been following collusion addon since its inception and I use it on a regular basis to remember all the digital breadcrums I leave behind as I roam around on the Internet.


This is an awakening video but unfortunately the collusion software fail to offer us paths to minimize what behavioural tracking - aside from blocking all ads.

Farid Mheir's curator insight, January 28, 2017 4:48 PM

If you don't know what behavioral tracking is about, this may be an "awakening" video: be prepared.

 

 

WHY THIS IS IMPORTANT

I've been following the Firefox "collusion" add-on since its inception (it is now called "lightbeam" and you can find it here: https://www.mozilla.org/en-US/lightbeam/). I use it on a regular basis to remember the digital breadcrumbs I leave behind as I roam around on the Internet. Unfortunately, the lightbeam software add-on can only help by blocking the digital ads that track us and cannot minimize the behavioral tracking itself.

 

On this Data Privacy Day 2017, we must use this opportunity to raise our knowledge of the digital tracking that occurs in both the virtual world and the physical world. It is now a reality that we are being tracked as much in the physical world because we carry in our pockets smartphones that track our every moves - literally. Be aware, and be careful.

Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

Behavioral #tracking explained in 9min #video by @gary_kovacs via @TED #mustsee #PrivacyAware @dataPrivacyDay  

As you surf the Web, information is being collected about you. Web tracking is not 100% evil -- personal data can make your browsing more efficient; cookies can help your favorite websites stay in business.
Farid Mheir's insight:

If you don't know what behavioral tracking is about, this may be an "awakening" video: be prepared.

 

 

WHY THIS IS IMPORTANT

I've been following the Firefox "collusion" add-on since its inception (it is now called "lightbeam" and you can find it here: https://www.mozilla.org/en-US/lightbeam/). I use it on a regular basis to remember the digital breadcrumbs I leave behind as I roam around on the Internet. Unfortunately, the lightbeam software add-on can only help by blocking the digital ads that track us and cannot minimize the behavioral tracking itself.

 

On this Data Privacy Day 2017, we must use this opportunity to raise our knowledge of the digital tracking that occurs in both the virtual world and the physical world. It is now a reality that we are being tracked as much in the physical world because we carry in our pockets smartphones that track our every moves - literally. Be aware, and be careful.

Farid Mheir's curator insight, September 14, 2013 12:02 PM

I've been following collusion addon since its inception and I use it on a regular basis to remember all the digital breadcrums I leave behind as I roam around on the Internet.


This is an awakening video but unfortunately the collusion software fail to offer us paths to minimize what behavioural tracking - aside from blocking all ads.

Scooped by Farid Mheir
Scoop.it!

Google analytics for real world - Euclid taps smartphone Wi-Fi for in-store retail analytics via @ventureBeat

Google analytics for real world - Euclid taps smartphone Wi-Fi for in-store retail analytics via @ventureBeat | WHY IT MATTERS: Digital Transformation | Scoop.it
Euclid furthers its quest to become the Google Analytics for the real world.


Euclid collects aggregated data on shoppers, including their visit duration and engagement rate, and presents it in an online dashboard for retailers. The company’s technology can grab information about a shopper even if they never connect to an in-store Wi-Fi network. Just like online metrics, Euclid’s data could help store owners learn useful details about their customers. For example, it could let a retailer know if something about their store is causing a significant amount of customers to leave quickly.

Like most companies that collect consumer data, Euclid claims all of its data is grabbed anonymously, and consumers can opt out as well.

Farid Mheir's insight:

This is related to a recent post on trash can that track users using their mobile wifi, a solution that is also being deployed in stores to detect and track shoppers and their behaviour.


Great thing here (as in the post on security cameras doing face detection), the solution leverages existing WIFI access point equipment in the stores. It simply analyzes the data in a new way. Low cost, easy to deploy.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Security cameras face recognition tracks visitors to report realtime in-store shopper behaviour via @3VR @NRF

Security cameras face recognition tracks visitors to report realtime in-store shopper behaviour via @3VR @NRF | WHY IT MATTERS: Digital Transformation | Scoop.it
Learn how retail video analytics can help transform your brick-and-mortar store into The Intelligent Store. Now
Farid Mheir's insight:

If you have an operate stores, knowing more about your customer behaviour is possible. Video and image recognition is now so advanced that retailers may soon use their old video cameras to not only record store videos for security purposes but also use them for shopper behaviour analytics.

At NRF conference in NYC this year, the company 3VR that specializes in video security equipments is demoing a system that analyzes video feeds in real-time to recognize the gender of its shoppers  and report in real-time on such things as

  • shopper interest on certain product displays
  • cash register queue line length average, per time of day
  • even individual shopper card, with picture
  • mood analysis to determine shopper intent to buy


The same system can of course be leveraged for security purposes, often its original purpose
  • loss prevention
  • theft detection
  • security recording
Retailers with multiple stores or multiple brands could even analyze the feeds across stores to determine individual shopper behaviour. Linked to CRM systems, this can prove very powerful, building shopping profiles of individual customers. Of course will raise privacy concerns.
At the same time, this is exactly the type of information that online retailers have access to and leverage to segment and profile their customers on their website and between different websites.
No comment yet.
Scooped by Farid Mheir
Scoop.it!

A world where everything is hackable via @Strata @acroll

A world where everything is hackable via @Strata @acroll | WHY IT MATTERS: Digital Transformation | Scoop.it

Let’s say you fancy a fast car. Flavio Garcia, a University of Birmingham computer scientist, discovered the algorithim that verifies the ignition key for luxury cars like Porsches, Audis, Bentleys, and Lamborghinis. He was slapped with an injunction to ban him from disclosing his findings at the Usenix Security Symposium in order to prevent sophisticated criminal gangs from having the analytics tools for widespread car theft.

You might need Garcia’s algorithm to steal a car, but soon, with an entirely different algorithm, you may be able to crash one into a tree or disable its brakes from a distance. Or maybe it’s a fast boat you’re after. Mess with its GPS, and you can steer it where you want without the crew noticing.

Farid Mheir's insight:

This post is full of very relevant and useful links. Building on what is in this piece, I suggest the following to get a feel for the evil side of these hacks. 


Listen to the 60 minutes report on the stuxnet and the flame viruses, which were recently used to attack nuclear facilities in Iran. Also read an interesting report during a recent security conference of simulated attacks on an oil rig or another post on potential security concerns with airplanes.


Digital transformations ultimately will mean everything will be digital - corporations, things, and most of what people see and do. And when you get to 100% digital and 100% connected, some of what Alistair is describing will become common place.



Farid Mheir's curator insight, November 13, 2016 1:59 PM

This post is full of very relevant and useful links. Building on what is in this piece, I suggest the following to get a feel for the evil side of these hacks. 

 

Listen to the 60 minutes report on the stuxnet and the flame viruses, which were recently used to attack nuclear facilities in Iran. Also read an interesting report during a recent security conference of simulated attacks on an oil rig or another post on potential security concerns with airplanes.

 

WHY THIS IS IMPORTANT

Digital transformations ultimately will mean everything will be digital - corporations, things, and most of what people see and do. And when you get to 100% digital and 100% connected, some of what Alistair is describing will become common place.

Felix Cheang's curator insight, November 13, 2016 7:36 PM

As long as there is a chip inside, anything is hackable....

Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

A world where everything is hackable via @Strata @acroll

A world where everything is hackable via @Strata @acroll | WHY IT MATTERS: Digital Transformation | Scoop.it

Let’s say you fancy a fast car. Flavio Garcia, a University of Birmingham computer scientist, discovered the algorithm that verifies the ignition key for luxury cars like Porsches, Audis, Bentleys, and Lamborghinis. He was slapped with an injunction to ban him from disclosing his findings at the Usenix Security Symposium in order to prevent sophisticated criminal gangs from having the analytics tools for widespread car theft.

You might need Garcia’s algorithm to steal a car, but soon, with an entirely different algorithm, you may be able to crash one into a tree or disable its brakes from a distance. Or maybe it’s a fast boat you’re after. Mess with its GPS, and you can steer it where you want without the crew noticing.

Farid Mheir's insight:

This post is full of very relevant and useful links. Building on what is in this piece, I suggest the following to get a feel for the evil side of these hacks. 

 

Listen to the 60 minutes report on the stuxnet and the flame viruses, which were recently used to attack nuclear facilities in Iran. Also read an interesting report during a recent security conference of simulated attacks on an oil rig or another post on potential security concerns with airplanes.

 

WHY THIS IS IMPORTANT

Digital transformations ultimately will mean everything will be digital - corporations, things, and most of what people see and do. And when you get to 100% digital and 100% connected, some of what Alistair is describing will become common place.

Farid Mheir's curator insight, August 30, 2013 10:01 AM

This post is full of very relevant and useful links. Building on what is in this piece, I suggest the following to get a feel for the evil side of these hacks. 


Listen to the 60 minutes report on the stuxnet and the flame viruses, which were recently used to attack nuclear facilities in Iran. Also read an interesting report during a recent security conference of simulated attacks on an oil rig or another post on potential security concerns with airplanes.


Digital transformations ultimately will mean everything will be digital - corporations, things, and most of what people see and do. And when you get to 100% digital and 100% connected, some of what Alistair is describing will become common place.



Felix Cheang's curator insight, November 13, 2016 7:36 PM

As long as there is a chip inside, anything is hackable....

Scooped by Farid Mheir
Scoop.it!

Erase Yourself From the Internet With JustDelete.me via @mashable

Erase Yourself From the Internet With JustDelete.me via @mashable | WHY IT MATTERS: Digital Transformation | Scoop.it

Deleting yourself from the Internet is hard work. First, you have to decide where exactly you want to disappear — from social media sites to retailer databases — and then you have to figure out how you're going to do all that.

So attention, web users. This is something you'll want to bookmark.

A new site called JustDelete.me makes vanishing from the web much, much easier. Created by U.K.-based developer Robb Lewis, JustDelete.me is a directory of urls that highlights links to pages you may want to remove yourself from, so you don't have to jump through hoops to do so. This includes sites like Facebook, Foursquare, Dropbox.

Farid Mheir's insight:

This is just a list of links but still worth the effort to have a single location with all the links. Would be useful to automate the work though.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Hacker Shows How To Attack An Airplane's Systems--Using A Phone

Hacker Shows How To Attack An Airplane's Systems--Using A Phone | WHY IT MATTERS: Digital Transformation | Scoop.it
Weak aircraft security systems seem vulnerable to mobile hacks.
Farid Mheir's insight:
At hacking conferences, hacks have been demonstrated that are specific to attacking and hijacking planes. It leverages communication systems between the plane and the control tower, but also within the plane itself. The solutions require an industry consensus but manufacturers will have to be ready to provide security and updates that are more akin to managing software than building wings and landing gears. To an enterprise architect like I am, it raises questions about software updates on planes, remote monitoring, enhanced security, etc. and the coordination of IT within the engineering process.
Hacker uses an Android to remotely attack and hijack an airplane (2013)
Hacker + Airplanes = No Good Can Come Of This (2012)
DEFCON 2012 video (long, 1hr, but worth listening as it explains the concepts quite well)
No comment yet.
Scooped by Farid Mheir
Scoop.it!

trash can is stalking you: using wifi to track people in the real world via @ars

trash can is stalking you: using wifi to track people in the real world via @ars | WHY IT MATTERS: Digital Transformation | Scoop.it
Smartphone-monitoring bins in London track places of work, past behavior, and more.
Farid Mheir's insight:
This article makes me think of the collusion website that shows all your online activities based on the ads you view in web pages. I could see a future where google analytics not only shows your online website activities but your physical stores as well.
No comment yet.
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/