Tag: Featured

  • Ethical hacking

    Ethical hacking

    Maybe you should encourage your kids to become hackers. When you open Twitter handles and Linkedin profiles, it’s not unlikely that you’ll find people listing hacking as a skill.

    Parents used to tell their kids to become doctors, lawyers, and accountants. Later, they advised them to learn about computers. These kids have now grown to become hardware specialists and then software specialists today.

    In the past 10 to twelve years, we have seen ourselves thrown into the fourth industrial revolution. In it, technology affects our lives through social media and augmented reality.

    We share a lot of our personal information with more people, companies, and institutions every day, willingly and are often blasé about it. This has tempted people to steal this information by hacking it. 

    Hacking background

    Since the advent of personal computers in the 1980s hackers have become prolific, initially in ‘first-world’ countries that had an advanced infrastructure. There were numerous cases in the US but as computer technology permeated the world, hackers followed suit. 

    A hacking group called MOD, Masters of Deception, in the 1980s allegedly stole passwords and technical data from Nynex, and other telephone companies as well as several big credit agencies and two major universities.

    The damage caused was extensive and one company, Southwestern Bell said it suffered losses of $370,000 alone. These days the damages, though not always publically announced, can run into a few millions of dollars.

    READ MORE about the Online Threats hackers use here

    All this has paved the way for a special information technology (IT) vocation. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system and networks. They break into systems they aren’t authorized to, and tend to break seamlessly into email and banking systems.

    Advertisment

    Hacking as a career

    Ben Wilson works as an ethical hacker. He has more than ten years of experience and worked in London where he received on-the-job training. He now works remotely in South Africa servicing UK clients.

    “I test websites for clients and look for vulnerabilities in the systems. I have done a lot of work for banks lately but my work is across industries.” 

    “Energy companies are using my services more and more,” he says.

    Wilson says he worked in a permanent position for six years. Right now he contracts for five clients regularly.

    Ethical hackers are the knights who test how permeable these systems are.

     

    “The majority of my work is for British clients. The UK pound is strong and I like to earn pounds. I’d say the best computer security consultants in the world are in the UK. The US is strong too but the UK consultants are sophisticated and the best.”

    Vulnerabilities

    The most common way in which people hack information is through email contacts; especially personal Gmail accounts.

    People think that their information is safe because it sits with one of the largest companies in the world. But this is exactly why it isn’t safe.

    Gmail and other third-party free email accounts are regularly hacked. If you want to protect especially valuable information you should either upgrade it to the business/enterprise level, use a different email service, or perhaps the one connected to your employer. 

    Nowadays companies use services to protect themselves against hacks and unauthorized access. These monthly or annual service providers might employ ethical hackers to check the companies’ systems.

    Hacking, however, isn’t just something that happens to big companies or in blockbuster movies. Here are some reality checks:

    • All websites are under threat;
    • So are applications (Apps) on your phone;
    • People can also program artificial intelligence (AI) to hack into systems. This has become a big concern and theme for security experts.

    Ways to proactively prevent a hack 

    Fortunately, there are several ways of protecting yourself and your information from hacking; starting with your emails. Be wary of “phishing” emails asking you to update your information, especially for bogus databases that you have never heard of.

    Use a spam filter – Avoid opening attachments from senders you don’t know – Update your passwords regularly – It helps to have authentication methods, such as a smartphone-linked and email-linked authentication (2FA) or security keys like Yubico – Do not click on any ad – period! Back up your files regularly – it’s always a good idea – Don’t allow ransomware bullies to bully you.

    • If you get sent communication saying that people have your files and want money or they’ll release the files; ignore them.
    • They can’t threaten you forever and might eventually move onto another target especially if your information loses its value over time.

    Anti-hacking software

    As a business, use tools like those from cybersecurity experts Acunetix. More than 4 000 companies protect their web applications from vulnerabilities using its powerful web scanner.

    Its penetration testing software prevents potential attacks by identifying holes in your websites’ coding. This is where hackers usually plant their complex code which allows them to extract data such as contact details, credit card details, and in worse cases, company-sensitive data like patents and blueprints.

    Naturally, it also scans networks to find gateway loopholes that could lead to crashes and downtime-related losses. A bank’s website going down for a few hours can cost it several thousand or even millions in lost revenue.

    Despite having firewalls, VPNs, and other Internet security systems in place, your websites and apps being developed are still vulnerable to cyber-attacks or a hack.

    The most commonly known hack used is a DDoS attack. Basically, it works like a traffic jam clogging up a highway, preventing regular traffic from arriving at its desired destination. Incidentally, only a few days ago, Amazon was hit by a DDoS Attack.

    So, how would you know or find out if you are vulnerable?  By conducting regular scans on your websites and apps to see where vulnerabilities lie.

    Avoiding a hack requires common sense

    Be aware and don’t fall into scams. It’s unlikely you’ve won 120-million Euros in a lottery. You should know by now that you are not the descendant of a king!

    In addition, if someone says they have a sex tape with you in it and they want your salary, unless you know you made a sex tape, they’re probably lying.

    Unless of course, a scorned lover of yours tricked you – but you can’t blame technology or a hacker for that.

     

  • The latest cloud computing trends in 2019

    The latest cloud computing trends in 2019

    It’s 2019, and the Cloud is everywhere—from the apps we use every day to the infrastructure of global tech giants.

    According to researchers at Gartner, revenue generated from public cloud services is projected to grow 17.5 percent in 2019. This amounts to a total of $214.3 billion, up from $182.4 billion in 2018.

    More than a third of organizations surveyed by Gartner saw cloud investments as a top three investment priority. With this kind of growth, tech organizations are racing to get on board with cloud-only software and platforms.

    Here are some of the trends to look out for this year:

    Hybrid Cloud, Multi-Cloud and Mergers

    IBM announced its purchase of Red Hat last October, calling it the “most significant tech acquisition of 2018.” This combined Red Hat’s extensive network of open-source clouds with IBM’s Hybrid Cloud team.

    Mergers like these are likely to become a trend this year, as companies see the benefit of using multiple clouds across all sectors of their organization.

    Furthermore, this system will dominate in the future, as businesses find public clouds inadequate to meet every one of their requirements.

    As a more flexible and functional solution, many organizations will shift to a network of multiple private, public and hybrid clouds in the future.

    Serverless Cloud

    Serverless computing is a young market in technology, but it will continue growing in 2019. It isn’t actually “serverless.” Instead, it is a cloud-computing model in which the cloud provider itself runs the server on a dynamic, as-used basis (FaaS).

    Rather than buying server space, developers can use a back-end cloud service to code. They will only then pay for the server space they actually use.

    As this relatively new technology develops, we can expect to see more companies providing and expanding their “serverless” offerings.

    Artificial Intelligence

    Although cloud technologies are growing exponentially, artificial intelligence (AI) could prove an even greater economic driving force. According to Accenture, the impact of AI could double economic growth rates by 2035 in developed countries. 

    Around 80 percent of large companies have adopted some form of AI, according to the Harvard Business Review.

    Amazon, Twilio and Nvidia, to name a few, are thus, incorporating AI with cloud computing, next-gen GPUs and the Internet of Things (IoT). This has led to the developing of applications with “smart assistants,” and voice-to-text technologies.

    Such a combination of AI and the cloud provides an extremely powerful and unconstrained computing network.

    Security

    Digital transformation is already underway, with Gartner also projecting that 83 percent of all workloads will shift to the cloud by 2020. However, this movement presents issues of cybersecurity.

    Many businesses have not properly secured their cloud-stored data. For example, marketing and data aggregation firm Exactis left around 340 million records exposed on its cloud servers. This was uncovered in a data breach last year.

    Mitigating factors

    The implementation of the General Data Practice Regulations (GDPR) makes this even trickier. It affects cloud security, and IT companies will likely struggle to comply with these new laws while protecting sensitive information.

    Cloud computing services are progressing exponentially, as are their new developments. The year 2019 will surely be filled with businesses pouring investment into enterprise solutions. This while expanding, securing, and implementing cloud technologies to their fullest extent.

    Bridget is a freelance writer and editor, and the founder of Lost Bridge Blog, where she writes about traveling as a Millennial woman on a budget. When not writing, you can find her traveling, drinking inhuman amounts of caffeine and scrolling through the latest tech & political news.
    N26 Bank
  • A digital address for everything

    A digital address for everything

    The ‘Internet of Things’ (IoT) as the name suggests is basically connecting as many devices online for them to communicate with each other.

    If you think that is a far-fetched concept it is nothing new. We have been using it since the advent of GSM, Infrared, GPS, GPRS, Bluetooth, Wi-Fi, and other wireless connections.

    To put the concept into further context, your Smartphone/watch, Bluetooth headset, wireless printer, or smart fridge are all components of the ‘Internet of Things’. They all require a sensor or chip to connect or collaborate with each other.

    Origins

    The term was supposedly coined about a decade ago. This when a company executive discussed an idea which sounded bizarrely unnecessary and over-futuristic at the time.

    He advocated for the need for a chip for every electronic device. The initially requirement was for supply chain and automation in the retail industry.

    Fast forward to today, and this has indeed come to fruition. We now have smart cars, smart homes and even tracking chips inserted into pets!

    So, each component or part of the object is equipped with an individual chip (small processor) with a unique IP address.

    The very same IP address used to identify your home modem or Office server.

    IoT application

    Why would you want that you might ask? Wouldn’t it be useful for devices and machines to work things out by themselves – to solve complex problems before you even become aware of them?

    This is in fact how the devices communicate with the central server to relate pertinent information.  An example is the use of fuzzy logic: to regulate the temperature in the fridge (to avoid food getting moldy).

    It can be used, in addition, to check the amount of water used in a washing cycle in your washing machine. 

    Another practical use would be to check car tyres pressure and temperature (to avoid overheating and bursting).

    Can you then imagine the number of chips that are required for the typical household?  For the car, security alarm, fridge, microwave, tumble dryer, TVs, Radios, computers/tablets, lighting, and heating/cooling system? Each would require a unique IP address

    IP address shortage

    Talks about IoT highlighted the need for more IP addresses and a need to track or generate them. This as it is evident we are running out of ‘normal’ IP addresses known as IP4: 4 denotes the number of billion IP addresses available.

    At the birth of the Internet age in the 1980s, no one ever envisioned a time when the world would need more than four million IP addresses. But with the need as mentioned above for the internet of things – that has come to pass.

    Without getting too technical, the issue is being resolved with the development of a newer IP system known as the IP6.

    The main difference between the two but it is merely that one is on 32-bit system while the newer on 128-bit and that influences merely the length of the addresses.

    Again, the technicalities would only matter to the now growing IoT industry and would not affect us as individuals.

    Practical uses of IOT

    Large companies that need to manufacture a lot of parts for their devices would need to insert an IP address on each piece. From items as trivial as the car side-mirror; to more serious parts like the helmet of a sportsperson engaging in the heavy contact sport.

    From an education perspective, the IoT can make learning a lot more fun for kids and young adults. Toy-maker Sphero, for example, has been long making wireless operated toys like its SPRK+(pictured).

    The idea is to fuse physical (programmable) robotic toys with digital apps.

    This would simultaneously provide entertainment experiences while inspiring tomorrow’s leaders in maths, engineering, and science.

    There are discussions to extend this connectedness to human beings. Much like was prophesied in many sci-fi books and George Orwell’s 1984. If there was a ‘rise of the machines’, and Artificial Intelligence was to take over the control of all our devices, we would not stand a chance!

    There are also a few new decentralized systems that are even advocating for a fragmented Internet for that very reason (security and privacy). This would enable you to control your little space within the “interconnected” web.

    You can thus run a (private) local area network (LAN) within the Internet domain – if that makes any sense.

    Blockchain advocates and companies like IOTA and Chinese-based Crypto-firm Tron are pushing the IoT narrative hard. They also want the decentralization of the whole Internet.

    It is only a matter of time before this becomes the norm. Companies are now queuing to get the IP6s and have incorporated adding them to the manufacturing processes.

    Once the security and privacy issues have been adequately planned and implemented. The pros of the full adoption of IoT will outweigh the cons.

  • 3D Copy and Print

    3D Copy and Print

    The bizarre-sounding copying phenomena called 3D-printing have been mulling around from the past.  Recently, it has been in the limelight; specifically in the press for the wrong reasons.

    In 2013, a University of Texas law student, Cody Wilson created a blueprint for a single-shot 3D-printed handgun, named ‘The Liberator’.


    However, guns have posed a serious threat to peaceful living when in the wrong hands. But what if you could hastily manufacture them unsupervised,  from the comfort of your home?


    His company Defense Distributed, had been distributing downloadable weapons plans for free. This would be great if it was planned to enable you to build something more useful to society.


    The point is, with this new device, you can literally make a 3D copy of any imaginable object – even your food!


    3D printing builds parts (mostly out of plastic) based on the central concept: using a digital model like your CAD drawing (Computer Assisted Drawing).


    This is then turned into a physical three-dimensional object by adding material a layer at a time. This is where the formal name for 3D printing, Additive Manufacturing arises. They are no bigger than a normal Deskjet or heavy-duty paper printer and are quite a marvel to watch in action.

    3D printing is a fundamentally different way of producing parts compared to traditional subtractive (CNC machining) or formative manufacturing technologies.

    The brands

    Some top 3D printing brands include MakerBot, XYZprinting, Formlabs, and LulzBot. You can pick them up from as little as $200 to $4000.

    These prices naturally depend on your end product size, material, complexity, and level of detail you need.

    The most expensive one, if you are into heavy-duty manufacturing would set you back a cool $2,500,000. That is the price tag for Imprimere’s Model 2156.

    Some of the advantages of using 3D printers include:

    • Speed: You can upload complex designs from a CAD model and print in a matter of hours.
    • You have more design freedom. It gives you complete customization of designs.
    • It is more eco-friendly: Additive manufacturing methods use only the material you need to build a component. You can recycle and re-use the raw materials.
    • Costs: Compared to traditional manufacturing, the labour costs for a 3D printer are almost zero.
    visual§DPrinting
    Image source: 3DHubs

    Application in the world

    Since its uptake in as far back as 2010, a lot of the products we use are manufactured using 3D printing.  You will find its application mostly in the medical and dental industry and used for custom prosthetics, implants, and dental aids.


    They are used to manufacture high-level sporting gear that is tailored to fit you perfectly. Naturally, you can also ‘print’ your own customized fashion accessories. This would give you more flexibility when it comes to your specific style, colour, and material.

    For a more comprehensive comparison of 3D Printers available to you, look at the 3D Printing index on the resources page.

    Here is a list of cool things you can create with a 3D printer. If you are looking for great ideas for Xmas or birthdays – this might just be it!

  • 3D Copy and Paste!

    3D Copy and Paste!

    The bizarre-sounding digital printing phenomena called 3D-Printing has been mulling around from the past.  Recently,  has been in the limelight; specifically in the press for the wrong reasons. In 2013, a University of Texas law student, Cody Wilson created a blueprint for a single-shot 3D-printed handgun, named “The Liberator”.

    Of recent, guns have posed a serious threat to peaceful living when in the wrong hands. But what if anyone could hastily manufacture them unsupervised,  from the comfort of their homes?

    Defense Distributed, Wilson’s company had been distributing downloadable weapons plans for free. This would be great if it was planned for building something useful for engineering and something practical rather than destructive. Point is, with this new device, you can literally make a 3D copy of any imaginable object –  even food!

    3D printing builds parts (mostly out of plastic or other synthetics) based on the central concept: a digital model e.g. a CAD drawing (Computer Assisted Drawing) This is turned into a physical three-dimensional object by adding material a layer at a time. This is where the formal name for 3D printing, Additive Manufacturing comes from.  The actual printing device is no bigger than a normal Deskjet or heavy duty paper printer and is quite a marvel to watch in action.

    3D printing is a fundamentally different way of producing parts compared to traditional subtractive (CNC machining) or formative (Injection moulding) manufacturing technologies.

    Some of the top 3D printing brands include MakerBot, XYZprinting, Formlabs and LulzBot and are priced from as little as $200 to $4000 (for high-end small business-level) depending on the product size, material, complexity and level of detail required. The most expensive if you are into heavy-duty manufacturing would, therefore, set you back a cool $2,500,000  for the Imprimere’s Model 2156.

     

    N26_banner-320x50-ENSince its uptake in as far back as 2010, you will now discover that a lot of the products already in use are manufactured via 3D printing.  It is prevalent in the medical and dental industry and used for custom prosthetics, implants, and dental aids.

    They are also used in the manufacture of high-level sporting gear that can be tailored to fit athletes perfectly. There is then, of course, the ability to ‘print’ fashion accessories which generally, would be designed to fit your specific style, colour and fabric/material.

    Some of the advantages of using these machines include:

    • Speed: The ability to upload complex designs from a CAD model and print in a matter of hours.
    • It facilitates more design freedom; it also allows complete customization of designs.
    • It is more eco-friendly: Additive manufacturing methods use only the material needed to build a part. The raw materials that can be recycled and re-used.
    • Costs: compared to traditional manufacturing, where highly skilled machinists and operators are typically required, the labour costs for a 3D printer are almost zero

     

    visual§DPrinting
    Image source: 3DHubs

    For a more comprehensive comparison of 3DPrinters available depending on what you want to do with one (hopefully not to build weapons), look at the 3D Printing index on our resources page under technology.

    Here is a list of cool things to create with a 3D printer if you are looking for great ideas for Xmas or birthdays – this might just be it!

     

     

  • Get more organised digitally!

    Get more organised digitally!

    We often hear the phrase “technology is your friend” To what extent this friendliness is, to help you to cope with your daily activities or business plans depends on how you embrace it.

    Life can be chaotic. Which so much to do it is easy to frequently miss important appointments. Delays often come from having to wait till you get to a PC to respond or not remembering contact details. The worst is having to ask someone repeatedly for their number or business cards.


    If you often experience that, you are getting it all wrong and definitely need this friend!

    The need for emails

    Emails are on a progressive, disruptive path to eliminate postal services. They even facilitate and encourage the acceptance of digitally signed documents.
    Most financial companies and legal institutions in many developed countries already accept digitally signed documents.

    Your digital signature confirms that the information originated from you and has not been altered through encryption. This makes it legally binding.

    Naturally, you need special software or Adobe Sign, to digitally sign and attach as a PDF to an email.

    N26_banner-160x600-EN

    Thanks to emails, we can now also easily store and get in touch with our contacts. It could be in the office, lounging around a park, watching your children play; even onboard/at the underground train station.

    Additional email tools

    Calendar and contacts syncing is a simple tool which is not offered entirely by all domain host providers. It works wonders along with your calendar and scheduler.


    If you need a simple CRM tool to just help with email contacts and plug into an existing sales app, you can do so with a useful add-on like Outlook Customer Manager.


    There are certainly advantages of decluttering your emails. This helps to alleviate the frustration of unimportant mails getting in the way of the ones you need to access frequently. For that, there is a clutter service offered by Office 365.


    Additionally, to avoid retaining important attachments, and clogging up space on your mailbox, you can with a click, save large file attachments directly to your cloud storage.


    With all that relevance of emails, it is critical that you source the best one – even if it costs a bit more than the (free) webmail services provided by Outlook (Hotmail), Gmail and Yahoo.


    Naturally, with a paid service, you will almost be freed from the scourge of spam and malicious items embedded in documents. In some cases, they are screened even before landing in your mailbox.

    More advanced features


    Other perks like a ‘catch-all service’, data loss prevention, in place-hold (compliance features), and advanced threat protection. You can add them as essential services to give you an even more peaceful emailing experience.


    You can, for instance, use In-Place Hold (Litigation Hold) to place user mailboxes ‘on hold’ and preserve mailbox items permanently.

    This feature is especially crucial for those in the financial and legal sectors – requiring emails and its contents to be preserved for a minimum of seven years typically. Security is the central factor that has kept the postal service in business – well at least for now.

    Your checklist when shopping for a good email solution:

    • A decent-sized mailbox – with archiving ability – 50GB is the new standard size (don’t get short-changed!).


    • Should allow you to sync emails, calendars, and contacts onto multiple devices – and it must always work!


    SMTP is now the standard and preferred Email protocol. If you are still on POP3 or even IMAP – run away!


    • Customizable domain (a .com or .net or any other you have bought), with the option to add more domains and email aliases. (info@ …sales@ etc).


    • Sync to an active directory – to keep your user-profile and allow for ease of single sign-on or extra security features like two-factor authentication. (Prevents unauthorized people from accessing your emails by pairing to your phone via an SMS code).


    • Your mailbox (since you are storing contact details or using it along with a CRM or ERP solution) must be GDPR-compatible.

    Final thoughts

    Finally, a good email hosting service should provide the ability to add innovative features in the future. These include extra archiving space, advanced threat protection, and enterprise voicemail. These are characteristics of a good email solution.

    Preparing to use an email solution can be effortless if you have the time. Most software suppliers like Microsoft (Office 365), have support sites with primary training material and “how-tos”.

    Check out Microsoft’s Support page to upskill your Office, email, and overall cloud-software aptitude.

  • Vocations of the Future

    Vocations of the Future

    There is a lot of banter, which is backed up by well-research papers on how Automation and Robotics (powered by AI) will replace manufacturing jobs.

    Blue-collar jobs are not the only ones however, that face imminent and progressive extinction.

    A recent survey report conducted by the World Economic Forum predicts futuristic trends affecting certain jobs in the modern workplace.

    Robert Solow predicted decades ago, in his Solow-Swan model, a massive driving force of global growth: technology.

    And the evidence is prevalent with the likes of Apple, Google, and Amazon championing stock markets with Billion-dollar market capitalizations. They also create an abundance of jobs globally.

    250x250

    Disruptive technological advances such as AI (Artificial Intelligence); the ubiquitous high-speed mobile Internet (5G); widespread adoption of big data analytics; cloud technology; and the recent Blockchain technology will be the drivers of this job evolution.

    Based on the report, by 2022, this job evolution will be firmly in place as it has already.

    In a matter of just 4 years, we could have a situation where jobs such as postal service clerks, data entry clerks, and bean-counters (accountants and auditors) would be made redundant.

    Impact on services

    Software like Microsoft’s Dynamics 365, aims to remove ‘silos’ within customer relationship management (CRM) and enterprise resource planning (ERP) processes.

    The latter takes over (fully automates) back-office operations such as stock-taking and supply chain management.

    Such tasks will be performed via software, reducing the need for more human supervision. Consequently, the focus would be more on managerial roles.

    In the sales and customer service realm, technologies like Microsoft’s AI will provide automated insights to guide employees on improving customer experiences.

    Furthermore, it may lower support costs by using virtual agents or Chatbots to eliminate in-house AI experts and those writing code. This will  result in more redundancies!

    World's jobs

    On a positive note, newer and more exciting jobs such as data analysts, machine learning and AI specialists, digital transformation experts and in general information system services will be on the rise – up to 135 million globally, according to the Report.

    The fields to benefit directly from new technologies would be information technology; information security; innovation; customer services and risk management (financial services).

    Impact on finance

    Another group of professionals whose nature of work will be affected due to the advent of ‘disruptive technology‘ is financial middlemen. Likewise, smaller banks and money transfer institutions.

    Decentralized systems were primarily put in place to eradicate exorbitant fees associated with transferring money across borders.

    Cutting them out completely undoubtedly renders them redundant. It is therefore pertinent for them to innovate their products in order to open up sufficient job position.

    Read more about the effect of Cryptocurrencies on the banking sector here

    Recently, Malta’s finance minister whilst in a private interview during a Blockchain Conference, echoed this. He said that the advent of cryptocurrency has changed financial middlemen into traditional “photo developers”.

    “I can see this, just like in photography when you could tell that […] those who process the photos will lose their jobs; a lot of financial intermediaries will be facing the chop in the not too distant future,” says Edward Scicluna.

    The good news for governments will be that the trend shows that the jobs created will surpass those lost.

    Be proactive and skill yourself accordingly or get the right personnel who can quickly adopt some of the mentioned skills so that you do not fall behind!

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.