|By Peter Silva||
|October 8, 2014 12:00 PM EDT||
Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day we’ll be referring to periods of time by the breach that occurred. ‘What? You don’t remember the Target breach of ’13! Much smaller than the Insert Company Here Breach of 2019!’ Or almost like battles of a long war. ‘The Breach of 2013 was a turning point in the fight against online crime,’ or some other silly notion.
On top of that, a number of celebrity’s private photos, stored in the cloud (of course), were privately stolen. I’m sorry but if you are going to take private pictures of yourself with something other than a classic Polaroid, someone else will eventually see them.
Almost everything seems breach’able these days. Last year, the first toilet was breached. The one place you’d think you would have some privacy has also been soiled. Add to that televisions, thermostats, refrigerators and automobiles. And a person’s info with a dangerous hug. Companies are sprouting up all over to offer connected homes where owners can control their water, temperature, doors, windows, lights and practically any other item, as long as it has a sensor. Won’t be long until we see sensational headlines including ‘West Coast Fridges Hacked…Food Spoiling All Over!’ or ‘All Eastern Televisions Hacked to Broadcast old Gilligan’s Island Episodes!’
As more things get connected, the risks of a breach obviously increase. The more I thought about it, I felt it was time to resurrect this dandy from 2012: Radio Killed the Privacy Star for those who may have missed it the first time. Armed with a mic and a midi, I belt out, karaoke style, my music video ‘Radio Killed the Privacy Star.’ Lyrics can be found at Radio Killed the Privacy Star.
- The Internet of Sports
- Is IoT Hype For Real?
- Internet of Things OWASP Top 10
- Uncle DDoS’d, Talking TVs and a Hug
- Welcome to the The Phygital World
- The DNS of Things
|Connect with Peter:||Connect with F5:|
Aug. 26, 2016 10:45 PM EDT Reads: 2,051
Aug. 26, 2016 10:00 PM EDT Reads: 1,837
Aug. 26, 2016 09:15 PM EDT Reads: 1,424
Aug. 26, 2016 07:15 PM EDT Reads: 390
Aug. 26, 2016 07:00 PM EDT Reads: 690
Aug. 26, 2016 07:00 PM EDT Reads: 649
Aug. 26, 2016 06:00 PM EDT Reads: 1,919
Aug. 26, 2016 05:00 PM EDT Reads: 665
Aug. 26, 2016 04:45 PM EDT Reads: 1,529
Aug. 26, 2016 04:30 PM EDT Reads: 2,305
Aug. 26, 2016 04:00 PM EDT Reads: 3,930
Aug. 26, 2016 03:45 PM EDT Reads: 557
Aug. 26, 2016 03:15 PM EDT Reads: 427
Aug. 26, 2016 01:30 PM EDT Reads: 3,418
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Aug. 26, 2016 01:00 PM EDT Reads: 1,978