Skip to main content

Posts

Showing posts from 2015

Security Nightmare of Driverless Cars

Security Nightmare of Driverless Cars The fear of malicious actors taking control of glaring flaws in smart cars is on the rise. This threat is therefore considered to be one of the major technical challenges confronting the automotive industry today. CAR MANUFACTURERS Initially, car manufacturers were not very familiar with the cyber security community. From a hacker’s perspective, as more and more cars are connecting to the internet, the attack surface area increases drastically.  Remote access to vehicles could be gained through vulnerabilities in the connected ecosystem. With the series of controlled hacking demonstrations on autonomous vehicles leading to discovery of fundamental flaws, companies are starting to notice the potential security threats.  “Such incidents could demolish public confidence in autonomous vehicles overnight and undo years of costly research and development,” says Jan Mohr, who co-authored a research report on driverless cars. For complete article visit: 

Digital Footprints and Privacy Concerns

“ It is too difficult to give exact statistics on the amount of data people leave, but confirmed every time we perform an online action, we are contributing to our digital footprint. Out digital footprint are more public than we would ever imagine. ” – Rob Livingstone, IT Consultant Digital footprints (aka  cyber shadow  or  digital shadow ) are the trail and traces on the Internet that we leave behind us as a result of our Web activities. Web sites collect information as you use them, with or without the knowledge of the user. Anytime a user visits and enters data into a Web site they should be aware that the data they enter could be stored, shared or used by the Web site. The data can be anything from surfing Webpages, phone calls, online shopping, updates and uploads on Facebook, Twitter, emails, to word searches on search engines such as Google, Bing and Yahoo. In the cyber world, everything we do, places we visit, and online contents that we read and write are in some way st

Digital Dark Age: Information Explosion and Data Risks

“Old formats of documents that we’ve created or presentations may not be readable by the latest version of the software because backwards compatibility is not always guaranteed,” says Vint Cerf, Google’s Vice President and one the fathers of the Internet. Digital dark age  describes the belief that the rapid evolution of technology will eventually make storage formats obsolete, and data will not be accessible to generations to come. It’s easy to assume that the data we store will somehow be preserved forever. Vint Cerf calls this phenomenon as ‘ bit rot ‘. Evolution of Digital Storage Magnetic tape was the first storage medium that revolutionized the digital industry. It was first introduced in the year 1928. Over the years, magnetic tape can suffer from deterioration called  sticky-shed syndrome , caused by absorption of moisture into the binder of the tape, rendering the tape unusable. Storage of 1024 bits of information was successfully implemented in 1948 using electrostati