Articles
Ransomware: One click can allow hackers to hold a city hostage
Technology is the newest weapon used by both law enforcement and criminals. It’s a high-tech game of cat and mouse, with information floating throughout the world wide web as chunks of megabytes and megapixels that can be retrieved for either good or bad intentions. For four weeks, we will look…
Read More »Three Years of Misery Inside Google, The Happiest Company In Tech
ON A BRIGHT Monday in January 2017, at 2:30 in the afternoon, about a thousand Google employees—horrified, alarmed, and a little giddy—began pouring out of the company’s offices in Mountain View, California. They packed themselves into a cheerful courtyard outside the main campus café, a parklike area dotted with picnic tables and a…
Read More »Mistaken Identity
Over the past week, numerous excited stories have covered a talk given by James Pavur, an Oxford University researcher and Rhodes Scholar, at the Blackhat Convention in Las Vegas. With his girlfriend’s consent, Pavur made 150 subject access requests in her name. In what the BBC called a ‘privacy hack’ until they…
Read More »IoT Stats and Facts
Although a revolution in and of itself, the internet has also birthed a large number of other technology revolutions. From smartphones to Wikipedia, the Internet as a medium has resulted in a complete and total transformation of societies worldwide. Among the most recent developments owing its existence to the internet…
Read More »PwC will have to work to rebuild trust after shock GDPR fine
The corporate world has gotten a shock of its recently when the data protection enforcement body of Greece has imposed a fine on one of the Big 4. PwC’s Greek holdings, “PRICEWATERHOUSECOOPERS BUSINESS SOLUTIONS SA”, has received a fine under Article 83 of the GDPR amounting to 150 000 EUR. In…
Read More »No Logo at 20: have we lost the battle against the total branding of our lives?
Some political books capture the zeitgeist with such precision that they seem to blur the lines between the page and the real world and become part of the urgent, rapidly unfolding changes they are describing. On 30 November 1999, mere days before the publication of Naomi Klein’s debut, No Logo, the…
Read More »Talk about unintended consequences: GDPR is an identity thief’s dream ticket to Europeans’ data
Black Hat When Europe introduced the General Data Protection Regulation (GDPR) it was supposed to be a major step forward in data safety, but sloppy implementation and a little social engineering can make it heaven for identity thieves. In a presentation at the Black Hat security conference in Las Vegas James Pavur, a…
Read More »Why Education Is the Next Frontier for Brand Marketers
Have you heard of microlearning? There’s a movement afoot in all areas of education towards instruction and learning programs that are shorter, more focused and attached to credentials issued by market experts in industries across the board. The term “microlearning” refers to educational material that is delivered as bite-sized nuggets…
Read More »TWITTER DROPS THIRD-PARTY DATA PROVIDERS
Twitter announced Wednesday that it would be banishing third-party data providers from the ad platform, pushing advertisers to buy their own consumer information outside its walls if they want it for targeting ads. On Wednesday, Twitter said it would stop integrating with third-party data providers, like Acxiom, Oracle Data Cloud, Epsilon…
Read More »Artificial Intelligence Policies in East Asia: An Overview from the Canadian Perspective
Artificial Intelligence Policies in East Asia: An Overview from the Canadian Perspectiveprovides an overview of policies on artificial intelligence (AI) from three East Asian countries – China, Japan, and South Korea. This new report focuses on government policies, talent management, and ethical, legal, and social implications of AI, tomorrow’s leading…
Read More »











