Switchin’ to glide: manual control a must in self-driving cars

The cars of the future will remove the human component, driving more safely and efficiently – until something goes wrong

Switchin’ to glide: manual control a must in self-driving carsAuto technology has steadily taken more control from drivers and the cars of the future are almost here. So it's time to talk about how that future should be shaped and managed. And how humans must maintain ultimate control. One hundred years ago, we started cars with a hand crank. Fifty years ago, we manually…

Voice-activated assistants vulnerable to hackers

Voice-activated assistants like Amazon Alexa, Google Home and Apple’s Siri are prime targets for sabotage, big and small

Voice-activated assistants vulnerable to hackersBy Brennen Schmidt ALEUS Technology Group and Allan Bonner Troy Media columnist Whether listening to the radio in its digital or analogue form, fans will know the rush associated with contests. A station’s telephone lines can soon become jammed with requests from callers hoping to be “lucky caller number five.” While this may sound innocent,…

A twisted path brings the Cambridge Analytica scandal home to Canada

The links between Christopher Wylie, Victoria-based AggregateIQ and the Liberal Party of Canada must be probed

A twisted path brings the Cambridge Analytica scandal home to CanadaIt’s the biggest political scandal in the world. And it involves a bunch of Canadians. For some time, it’s been known that Vladimir Putin’s Russia and assorted other outlaw states, like North Korea, have been engaged in acts of cyber war against democracies around the globe. Long before special counsel Robert Mueller was hired to…

The Internet provides ‘a boundless supply of victims’

So why don't we pay attention to the detail necessary to secure our information?

The Internet provides ‘a boundless supply of victims’By Brennen Schmidt ALEUS Technology Group and Allan Bonner Troy Media columnist Cops have a pretty good set of rules and responses. They look for the good and bad actors. They question everything and have a response for most eventualities. “Move along buddy” solves a lot of problems, for example. It turns out that Det.…

Beware the botnet, the 21st century’s horror story

The Internet of things has made us all vulnerable to the malicious work of web warriors, who are intent on upending the computer-controlled world

Beware the botnet, the 21st century’s horror storyBy Brennen Schmidt ALEUS Technology Group and Allan Bonner Troy Media columnist In old TV comedies, soap bubbles from the washing machine rise up the basement stairs and fill the living room, or the oven keeps baking until the cake occupies the whole kitchen. This was funny before the Internet of things (IoT) meant that…

When the cyber attack comes, will you be prepared?

Now, before any attack occurs, get your messaging in place. Set up third-party advocacy, get legal advice and insurance, and prepare a due diligence defence

When the cyber attack comes, will you be prepared?By Brennen Schmidt ALEUS Technology Group and Allan Bonner Troy Media columnist You need a HOT group to manage a cyber-security breach. That doesn’t mean they need to be dressed well or good-looking. HOT stands for hour one team. Work in this area began long before widespread fears of cyber attacks. It began in the…

Avast ye swabbies: CRTC asked to crack down on Internet pirates

How do you crack down on internet piracy while preserving net neutrality, the cherished principle of a free and open web?

Avast ye swabbies: CRTC asked to crack down on Internet piratesLast weekend while the National Hockey League all-star extravaganza was taking place in Tampa Bay, hundreds of thousands of people there with no interest whatsoever in hockey partied hard at the Gasparilla Pirate Festival. It doesn’t really matter that throughout history, high seas pirates – who continue to flourish – are most often psychopathic mass…

Locking down your precious data

Hardware-encrypted, PIN-authenticated diskAshur2 drives keep data secure

Locking down your precious dataWe keep our computers on lockdown, encrypt our data and secure them from prying eyes and online predators. But what about our backups and those external drives? United Kingdom-based iStorage has created diskAshur2, an updated line of virtually bulletproof PIN-authenticated and hardware-encrypted hard drives. Even if the drive was stolen, your data is fully protected. The…

Unsecure mobile devices a hazard to municipal security

A local official’s smartphone may be the master key that nefarious people seek. Who knows what can be unlocked and what calamity can follow?

Unsecure mobile devices a hazard to municipal securityBy Brennen Schmidt ALEUS Technology Group and Allan Bonner Troy Media columnist One of the great honours for any citizen is to be presented with a key to the city. In today’s digital context, that key might just be in the hand or pocket of your local mayor – and up for grabs for anyone…

Cybercriminals lurk around every high-tech corner

Industrial security in the cyber age must include more than an outdated line of concrete, fences, guns and guards

Cybercriminals lurk around every high-tech cornerBy Brennen Schmidt ALEUS Technology Group and Allan Bonner Troy Media columnist In the same way that shopping online is convenient, terrorism and sabotage are becoming easier. A terrorist, hacker-for-hire or deranged person can gain remote control of power grids, water works, hospitals, industrial operations, self-driving cars and traffic lights. The Internet of things (IoT)…
1 2 3