Technology

As Edge Computing Gains Steam, We Must Balance Benefits With Security Risks

The overriding premise behind setting up a business is to make handsome ROI and this occasions cutting unnecessary costs. Edge computing comes on this basis to shift focus more to the source of data as a way of improving response times and saving bandwidth. Since you have to move closer to the source of data, there is always a high probability of jettisoning your otherwise well-articulated security measures. What most businesses fail to put into consideration is the absolute need to balance the accruable benefits with the potent security risks. If you are involved in the ongoing back and forth between centralized and decentralized IT, you must have begun to see the limitations of a centralized IT. You probably have also started questioning the rationale behind having hundreds or thousands of industry-standard servers running a host of applications in consolidated data centers.  This is not helped by having new types of workloads and distributed computing. If you sum up all of these with the fast pace of IoT, you definitely have a good cause for the observable rise in edge computing. The new realization now is that processing at the edge brings compute closer to data accumulation and hence the…

Continue Reading

Technology

Backdoor Encryption, An assault on Privacy

Facebook has certainly had its fair share of problems over the years, right from the Cambridge Analytica scandals to a host of other privacy issue related problems, which led to a lot of people deleting their accounts from the platform. Now that they have come up with a beautiful one, the end-to-end encryption that everybody should applaud, it’s a huge surprise that there is a concerted effort to stab privacy in the back through backdoor encryption. Salvos have been coming from all corners at end-to-end encryption. The surprising aspect of the whole thing is that these reactions are coming from largely unexpected quarters, that is those you thought would be very happy to fight cybercrime to a standstill.  The U.S. Attorney General William Barr in a reaction to the technology world says, “If the cops and Feds can’t read people’s encrypted messages, you will install backdoors for us, regardless of the security hit.” FBI head honcho Christopher Wray is not left out in the call for a backdoor, saying that the cops and Feds should be able to spy on end-to-end encrypted chats and the like. Also noteworthy is the fact that UK home secretary Priti Patel, US attorney general…

Continue Reading

Technology

Steps You Must Take to be Free From Botnets

Botnets have for a very long time been known as the workhorses of the Internet. You definitely have been using them to as connected computer to enhance the performance of a whole lot of repetitive tasks to keep your websites going.  A lot of businesses use them in connection with Internet Relay Chat. Undoubtedly, when used in this manner, botnets are absolutely legal and overwhelmingly beneficial to maintaining a smooth user experience on the Internet. The story is, however, changing more than you can think of and devastatingly so. Botnets are presently being devised to gain access to your machine through some piece of malicious coding. The resultant effect in this kind of scenario is that your machine is directly hacked. When this is not the case, a “spider” (a program that crawls the Internet looking for holes in security to exploit) is made to do the hacking automatically. This is a very serious situation that you need to take care of. Taking into consideration that the internet of things (IoT) will mark the next major revolution for mankind, it becomes of utmost importance that we don’t allow anything that will jeopardize the lives of the greater majority of people.…

Continue Reading

Nature, Technology

Area 51: A Proof That The World is in Danger

The internet has always succeeded in keeping us abreast of latest happenings around the world and that was the case of a Facebook event entitled “Storm Area 51, They Can’t Stop All of Us” that went viral. Even Twitter and Reddit went agog with the trend.  The Facebook event proposes that people should come out on September 20th to stage a joint invasion of the military base and finally “see them, aliens.” This to an extent may sound funny and a sort of joke but the way Americans have reacted shows that there is more than meets the eye about Area 51. The apt question at this point is, what is Area 51? As much as you may wish it to be a fairy tale, the interesting thing is that Area 51 actually exists and not just recently. For decades, the U.S. has been running a military installation that is located approximately 100 miles (161 kilometers) north of Las Vegas.  People knew but nobody dared approach the site. It actually had been one of the worst-kept secrets on the planet.  Area 51, as it’s commonly known to UFO conspiracy theorists and aviation buffs who have been able to piece together…

Continue Reading

Technology

Facial Recognition Could be The Next Access Point For Hackers

Facial recognition, a form of biometric technology is a biological measurement — or physical characteristic — that can be used to identify individuals. Researchers claim the shape of an ear, the way someone sits and walks, unique body odors, the veins in one’s hands, and even facial contortions are other unique identifiers. Because physical characteristics are relatively fixed and individualized — even in the case of twins — they are being used to replace or at least augment password systems for computers, phones, and restricted access rooms and buildings. Biometrics scanners are becoming increasingly sophisticated. For example, Apple’s iPhone X  which operates on the facial recognition technology incidents 30,000 infrared dots onto a user’s face in order to create a sequence of reflections which produce information about the 3D shape of the face, substantiating the user by pattern matching. The chance of mistaken identity is one in a million, according to Apple. This technological advancement should be a thing of joy as it’s supposed to go a long way in easing us of the constant worries of having to remember our passwords and also being very careful not to mistakenly drop them for cybercriminals. It is on record that in…

Continue Reading