Tags » Pervasive Computing

British spooks 'could hack into children's toys for spying'

http://www.telegraph.co.uk/news/politics/12041349/British-spooks-could-hack-into-childrens-toys-for-spying.html

Britain’s intelligence agencies could take over children’s toys and use them to spy on suspects, MPs have been told.

Antony Walker of techUK said that anything connected to the Internet could “in theory” be hacked into remotely. 140 more words

Windows 10 Is Full Blown Electronic Tyranny 1) Katherine Albrecht

*****

I agree with Katherine Albrecht, most consumers would rather pay £200 for an operating system, than install Windows 10 and it’s keyloggers and surveillance that listens to your private conversations at home. 82 more words

I'm a Doctor, Not a Security Expert!

While I don’t completely agree with the Rob Ragan’s sentiments in a recent article in Dark Reading on the limitations of security awareness training, I think the writer makes some good points, especially regarding the appropriate use of technical controls in combination with training to mitigate risk. 366 more words

Blog Posts

And not Or

I was in an exchange the other day with some folks talking about their perspective that all companies need to be using cloud computing. I agree, but my view is slightly different. 307 more words

Future

Key Assignment 1: Pervasive Computing Reflective Report– Photo Processing Kiosk (summary)

The research is about the analysis of photo processing kiosk as a pervasive device to evaluate its usability to the user which the analysis did was establish from the surveys. 694 more words

Assignment

BYOD: Pervasive Computing Has Arrived

A good tool is an invisible tool. By invisible, I mean that the tool does not intrude on your consciousness; you focus on the task, not the tool. 283 more words

Blog Posts