Cybersecurity and Technology

Cropped 879.jpg

Tag: society

Chika Wonah A Guide for Cybersecurity Terms

A Guide for Cybersecurity Terms

The topic of cybersecurity is becoming increasingly prevalent worldwide due to the number of companies that cyber-attacks have hit in the last few years. Social security numbers and other sensitive data were stolen in the Equifax hack, which affected over 145 million people.

 

Despite the technological advancements in the past few years, we remain at risk of having our digital data stolen and manipulated. However, being in the digital age is not as frightening as it sounds.

 

In addition to having a good understanding of how your device works, you should also learn cybersecurity basics. This will allow you to protect yourself and your company from various threats.

 

VPN

This tool encrypts traffic and masks the user’s location so they can remain anonymous on the internet.

 

IPN

Your computer’s internet version is known as its home address, typically displayed when it connects to a network.

 

Exploit

An exploit infects a computer with a malicious application or script.

 

Breach

Once a hacker successfully exploits a vulnerability, they can access a computer’s files and network.

 

Firewall

Defend yourself from bad guys with this defensive technology. It is possible to have a hardware firewall or a software firewall.

 

Malware

Malware is an umbrella term that refers to various types of harmful software that can affect a computer. Some of these include viruses and ransomware.

 

Virus

Viruses are designed to modify, corrupt, or wipe information on a computer before it can spread to other people.

 

Ransomware

Ransomware is a type of malware designed to prevent a user from accessing their computer’s files. It typically demands a ransom to get the files decrypted.

 

Bot

An attacker can take over a computer through a command-and-control system typically performed through a software application or script. This type of attack is referred to as a botnet.

 

Rootkit

A type of malware known as a rootkit is another attack that allows hackers to take over a computer. Since it’s hard to detect, this type of malware could remain on a computer for a long time.

 

Phishing

Criminals use a variety of techniques to trick people into providing their personal or sensitive data to them. For instance, they can send out email messages designed to trick people into entering their bank account information.

 

Chika Wonah Benefits of AI in Education

Benefits of AI in Education

Artificial Intelligence (AI) is becoming more and more prevalent in our lives. Many industries, including healthcare, manufacturing, and retail, use AI. But did you know that education uses AI? We will discuss the benefits of using AI in education.

 

  1. AI Can Provide Supplemental Instruction to Students Who Are Struggling

 

AI has the potential of providing supplemental instruction to students who are struggling. Artificial neural networks (ANNs) are computer models designed based on the human brain known as artificial neurons. These artificial neurons process information similarly to biological neuronal cells in humans. Pattern recognition, classification, and calculation use ANNs. These networks are perfect for problems with a large amount of data that students can use as models to predict labels on new data.

 

  1. AI Is Capable of Creating Personalized Lesson Plans for Students

 

Artificial intelligence can create personalized lesson plans for each student by analyzing their strengths and weaknesses. Students learn better and faster with an algorithm explicitly made for them. It will determine the level of understanding for each student and come up with lesson plans for them.

 

  1. Teachers Can Use AI to Track Students’ Progress

 

Teachers can track their student’s progress by using artificial intelligence. Some teachers are already experimenting with AI to help them understand how their students are progressing through the course material. It allows teachers to determine if a student has trouble understanding specific concepts or needs additional resources based on the collected data.

 

  1. Artificial Intelligence (AI) Offers Quick Responses to Students’ Questions

 

AI can analyze students’ questions and determine the best way to answer that question based on previous answers given by other students. The more people ask the same question, the better the AI decides the best response. It allows for immediate feedback and quick answers to many of your students’ questions.

 

  1. AI Can Be Used as Virtual Tutors for Individualized Learning

 

Artificial intelligence can be used as virtual tutors for individualized learning. AI can be used as a virtual tutor to help students who require one-on-one assistance. It will give the instructor more time to focus on other students and still give them individualized attention.

 

Conclusion

 

The benefits of artificial intelligence in the classroom are endless. We must ensure that we are using AI to meet the needs of the students. Only then can we truly maximize the potential of this powerful technology.

 

Chika Wonah U.S. Tech Hubs

U.S. Tech Hubs

A vibrant tech ecosystem provides numerous benefits to both consumers and the industry. Millions of Americans and billions of dollars worth of investment capital flow into technology hubs. One such hub is Silicon Valley, which boasts a dense network of venture capital firms, large corporations, startups, and established businesses.

 

Silicon Valley Statistics

The yearly amount of VC funds in Silicon Valley has risen steadily since the early 2000s. Between 2008 and 2010, the number of companies accepting venture capital increased by an average of 20%. According to the National Venture Capital Association, California has become the leading startup capital of America. In 2008 alone, over 60 billion dollars were invested in new startups.

 

Silicon Valley has successfully replaced New York City as the most important technological innovation and commercialization center for the past few years. 2014 was a particularly fruitful year for Silicon Valley.

 

The Advent of Major Tech Companies

In 2014, technology giant Apple opened its first research facility in Beijing, China. In April, Google announced it was establishing a new campus in Singapore. Later in the year, the internet technology company Yahoo announced a new campus in New York City.

 

Apart from this, San Francisco city is home to several networking groups such as Startup Grind and Founder’s Forum, which provide opportunities for emerging entrepreneurs.

 

Benefits of Tech Hubs

Being a hub is beneficial for the government, consumers, and businesses. For instance, a high density of venture capital firms makes it easier to access investments. A non-exhaustive list of the benefits to consumers includes technological innovation and commercialization, improved products, and faster response to demand.

 

However, the benefits to businesses are highly variable. Some benefits include increased revenues, increased profits, and improved products. It is easy for a firm to get more customers through access to larger markets. A high market value is a definite advantage to businesses because it allows companies to access more extensive funding.

 

Silicon Valley has long been an innovator in technology and has made many breakthroughs. However, the presence of competition from China has reduced the prices and quality of products in Silicon Valley. The low-cost shipping of Chinese goods via companies such as E-bay, Alibaba, and Amazon has threatened to wipe out Silicon Valley’s position as an innovator.

 

Conclusion

In conclusion, Silicon Valley is a leading center for technological innovation, commercialization, and global trade. The presence of high-paying jobs has attracted entrepreneurs, and the entrepreneurial environment has led to increased venture capital firms.

The Risks Of Login Codes Sent Via Text Message

The Risks of Login Codes Sent via Text Message 

 Two-factor authentication can seem very useful for securing your essential accounts from intruders. However, more and more hackers have been getting into accounts that use text messages for two-factor authentication. Look into these reasons why you should switch over the type of two-factor authentication you operate away from text messaging.

Routing Messages

 When you’re holding your phone close to you, you might be thinking that an intruder will have to get into your phone by getting you to install malware. For the past couple of years, though, intruders have been more clever into how they get into mobile phones. They can do this by going directly to your mobile phone carrier.

 The way they do this is by first finding some personal details about you. These can be as complicated as your social security number or as simple as the address you live on. From there, they call up your phone carrier.

 Depending on the phone carrier, they can be easily convinced that you’re locked out of your mobile device, and you need your number transferred to a separate phone. Intruders can accomplish this by giving up their details and paying a small fee. If it goes successfully, an intruder will have full access to any phone calls or text messages coming your way, with no way to stop them until you’re able to call your phone carrier again. This all is why you shouldn’t ever use text messaging for your two-factor authentication.

Notifications

 Sometimes, an intruder might not even be far away to the point where they can be looking at your phone screen in public. Depending on your mobile device settings, you might have notifications popping up with security codes on any screen of your device. Intruders can come up with a plan to get a security code this way.

 For example, you might be live-streaming a game on your phone to the internet. Intruders will use this to their advantage by logging into your account online and checking your stream for when the phone notification appears. After that, they can log in to your account and do enough damage before you even have the chance to change the passwords on your accounts. Notifications are just another reason why you shouldn’t be using text messaging linked to your two-factor authentication.

Understanding If Your Device Has Been Hacked

Understanding if Your Device Has Been Hacked

From social sites to banking, smart devices are increasingly becoming part of most people’s daily lives. Unfortunately, they are also exposing them to data snatchers, popularly known as hackers. The hackers may gain access to a device in many ways, but we will discuss how to know when that happens.

Receiving Random Pop-ups

Random pop-ups are not annoying, but they are among the most popular signs that a device got hacked. If one is getting random pop-ups from their browser, something has compromised their device with adware. Adware is popular with hackers when trying to force someone to view certain websites to drive revenues through viewership.

Draining Battery without Any Reason

If one notices that a device battery is quickly losing power for no reason, that is a sign that it has malware. This sudden loss of battery power is due to malware or spy-app that is operating from the background. The spy-app uses a lot of battery power to scan the device and transmit it to the hacker.

Poor Performance

One may notice that their device is suddenly crashing all the time or loading web pages much slower. When such happens, first try shutting down the machine, and take notice of what happens. If the device has gotten hacked, it may fail to shut down correctly or not shut down at all.

One can also notice slowed functionality of some operations, such as making calls or receiving text messages. Such things shouldn’t take long unless the device has a spy-app.

 

Increased Data Usage

Another indication of a compromised device is the exceptionally high data usage. The usage may be a result of a background running app communicating to a third-party.

Contact List Gets Call and Tests That the Owner Didn’t Make

When a device gets hacked, the hacker leaves the malware in the gadget and may use the contact list to spread it. One’s email list, text messages, or instant messages may transmit the malware to his contact through messages with links or attached files. Check out for complaints from the contact list about notifications that they supposedly received.

The Device’s Settings Change

If the hacker physically accesses a device, they may manually change its settings. For instance, one may notice that their device Bluetooth is on, despite them not switching it on. Such settings change maybe a sign of malware interfering with the device settings to spread it to other devices.

There are many ways to know when a device has gotten hacked. To prevent losing data or money, always take preventive measures. For example, one can run a malware scanner on their device.

Chika Wonah - Cybersecurity Predictions For 2021

Cybersecurity Predictions for 2021

The fast advancing technology comes with a significant challenge of cybersecurity for most enterprises. Cybersecurity has become a consideration for many organizations as attackers deploy all tactics to breach any security protocol laid down by companies.
The following will be the main focus, risks, and considerations in 2021 that cybersecurity leaders and other professionals will have to deal with:

1. Cybercriminals will target remote workers in 2021.
Remote working is trending in every organization due to COVID-19 restrictions. COVID-19 guidelines have made employees be allowed by their employers to work from home. Cybercriminals will, therefore, target enterprises with employees working remotely. Cybercriminals will be very busy launching attacks on companies unprepared to secure their remote workers from such attacks. As of now, numerous organizations have incurred unexpected costs caused by security breaches into their systems. Most of the employees’ gadgets lack advanced protection from malware infections.

2. Zero Trust Network Access will replace VPNs.
After many companies allowed their workers to work remotely, they installed Legacy Security Architecture such as VPNs to prevent attacks. However, VPNs have become prone to attacks. VPNs are not long-term solutions as they grant excessive access to the company’s internal resources. Cybercriminals can easily deploy ransomware to attack the unpatched VPNs.
However, global IT security teams are aware of the threat, and they are currently developing the Zero Trust Security Model, which will be released by 2021. Zero Trust Network Access only gives users access to only the area they are working on; thus, users have no permission outside their jurisdiction.

3. Widespread adoption of Secure Access Service Edge (SASE).
COVID-19 pandemic continues to make enterprises get reduced revenue; hence, many organizations have reduced their IT spending to cut down expenditures. Many companies will use multi-service integration technologies like Secure Access Service Edge (SASE) to cut down IT cost. The single control point will reduce IT cost, but a breach in the integrated system will allow attackers to access every resource.

4. The health sector will face significant security breaches.
Attackers will target hospitals as they face financial pressures due to the COVID-19 pandemic. The health sector will experience more financial transactions hence making it a primary target in 2021.

5. Widespread digital transformation and internet use will lead to massive data exposure.
Most organizations will continue to allow their teams to work remotely. Businesses will continue to experience digital transformation with the remote worker embracing the 5G network, AI and ML-powered analytic, and cloud data management to ease their operations. However, data breaches will increase as hackers target the adoption of new technologies like the 5G network.

However, the challenges will not stop organizations from fully implementing and integrating modern technology into business operations. The advanced security remedies will caution the remote workforce from numerous cybersecurity exposures.

Chika Wonah Technology Hiring

Technology’s Impact on Hiring and Recruitment

Burgeoning tech has been laying claim to multiple industries from real estate to insurance, and more recently technology began to disrupt our hiring and recruitment tactics. In the digital age, it’s no surprise that how people find openings and apply for jobs changed. Now the vast majority start their searches online with sites like Linkedin and Indeed, but the actual interview process itself is also changing. Portfolios all take place online, interviews originally happen via video and personality diagnostics are standard.

One Way Interviews

Interviews are typically two-sided. A few business representatives interview a potential hiree, and while the hiree wants to impress the business, it’s also a chance to field questions and get to know each other.

Tech poses to change that with the rise of video interviews. As Dave Lee describes, “Traditional interviews with an interviewer and interviewee could go by the wayside, too. Rather than a two-way interaction, job candidates will upload video responses to interview questions. New technology will detect non-verbal cues such as those facial expressions and tone while eliminating human bias.” Brands like Red Bull already hopped on board with video interviews. This added step tests the applicant’s ability to think on their feet while also working through potential red flags or false starts eliminating wasted time for recruiters. Then, once the cream rises, formal interviews can take place. As Rajpreet Heir highlights, “Not only does digital interviewing allow candidates and employers to connect earlier in the interviewing process, it also saves time and money. A study by OfficeTeam revealed that 63% of companies are using video interviews vs. 13% from 2011.

Analytics and Diagnostics

Personality diagnostics are also increasingly popular as an inexpensive means to gauge fit and placement within a larger company. As Chamanpreet Singh says, “Data is critical in the digitisation of recruitment. It allows you to determine the effectiveness of any strategy implemented and will enable HRs to develop future recruitment strategies based on the metrics and measurements received. This data will give an insight into channels that can work for your company which means cutting down on time and expenditure.

Building a Business-Savvy Brand

It’s important to remember that if you can find them, potential recruits can also find you. As a result, recruiting in the digital age requires a larger emphasis on companies’ online brands. People want to understand the company culture they throw themselves into. Show personality, but also be sure the image you portray is accurate. Top talent is going to do their research, and if your digital presence is non-existent or inaccurate, they won’t want to work with you. As Rachit Jain says, “Building a healthy working culture and employer brand is getting more important day by day. But most importantly, employers and recruiters have to adapt and move to the modern recruiting technology faster.

Is Blockchain the Face of the Next Google ChikaWonah

Is Blockchain the Face of the Next Google?

When we discuss blockchain, conversations usually surround the tech’s association with cryptocurrency, security and investing. In reality, this new tech is multifaceted and shows major implications for nearly every industry. When it comes to blockchain and cryptocurrency, news outlets can’t stop reporting on the potential promise. That being said, now people are asking big questions like could blockchain actually be the developments needed to create a search engine capable of overtaking google?

Google dictates much of our online searches with “nearly 80 percent of desktop and 95 percent of mobile searches” taking place on the program. That being said, a plethora of alternatives exist. The problem, of course, is that while some people use these tools, most cater to specific niche audiences, because Google has become a Goliath that many of the Davids of search engines aren’t ready to conquer. Enter blockchain. Given its clout in the tech field, many think it could be the answer to building a search engine capable of overcoming Google.

In terms of basic rising user trends, more people results in more reported problems, and Google users experience their fair share of flaws. Privacy remains the primary point of contention with centralized search engines. As BitClave describes, “With centralized search engines, your search data is recorded, your IP address is logged, and tracking cookies are used by centralized search engines to create a digital profile of you so they can target you with ads. Even worse, there’s no way to voluntarily opt out of this invasion of your privacy, and every time you type a keyword into a centralized search engine, you’re giving up information that puts you at risk.” Blockchain acts as the poster-child for privacy and discretion though. While heavily regulated given its infrastructure, the system manages to maintain a level of anonymity for its users.

Now the question becomes, how do we combine blockchain’s private network with a computing system that has the strength of Google? One program still in beta testing called Presearch, thinks they may have found the answer. As Shivdeep Dhaliwal explains, “Using Blockchain technology, Presearch plans to enable users to personalize their experience while staying in control of their data.” The company also incentivizes the switch, rewarding users who change from Google to their program with cryptocurrency coins based on their use. Of course, this still isn’t a perfect system. Questions have arisen about whether hackers may take advantage of the rewards and hack into other user profiles in order to gain more coins once they max out since users are limited to 8 coins a day.

The Presearch program focuses on decentralizing the search engine model, rewarding users for their contribution. As a result, they hope to build a more transparent and unbiased ranking, a problem that Google has made headlines for, for years. Of course, the idea of using blockchain to create a more effective model is one thing and actually doing it another thing.

 

Binky: The App about Nothing

Every app is, at least on its face, “about” something. Twitter is for microblogging. Instagram is for sharing pictures. Snapchat is for silly filters. WhatsApp is for texting. But what about an app that does absolutely nothing?

Enter Binky, the nihilistic app that allows users to go through the motions of a social media app, but offers no real interaction, purpose, or end goal. There are no other users with whom to interact. There’s no accumulation of followers or likes. It’s all utterly meaningless.

Founder Dan Kurtz talked with NPR about why he created the app. One day, he was scrolling through a feed and realized that he couldn’t remember any part of the most recent article he’d read. Being on his phone and flicking his thumb upwards on the screen in a scrolling motion had become “his default state.” The futility of it all hit him like a ton of bricks, and he set about creating Binky, the app that does nothing.

Those who have the app can “swipe” left or right on generic stock photos in a tinder-like motion, but that information is stored nowhere and impacts the user experience in no capacity whatsoever. Users can “comment” by touching a keyboard, but only pregenerated words appear in the comment box.

Many have suggested using the app as a way for social media users to wean themselves off the endless drivel of “real” social media. For many, the simple act of going through the motions will help abate the addiction they’ve developed to scrolling and reacting. Kurtz described it as “the fidget cube of social media,” for people to feel like they’re participating without actually logging onto anything.

Binky provides all the action with none of the cognitive costs of having to plough through a New York Times article or argue in the comments with a political adversary. It’s pure, unfettered nothingness, and it’s making a splash on the App store.

For now, it’s only available on IOS, but it promises to be live on other platforms shortly.

Chika Wonah - The Return of the Basic Phone

The Return of the Basic Phone

All of our devices are getting smarter and more connected. Our refrigerators, our lamps, our cars, and more are all connected to each other and to our phones. Our phones also increasingly connect us to huge audiences of people, from social networks to chatting apps and more productivity apps than we know what to do with. All this connectedness can become easily overwhelming and deprive us of sleep, relaxation, and mental respite from work and the hustle of keeping up appearances.

Whereas many of us have chosen, whether actively or passively, to keep up with the fast pace of smart technology, some have halted it all and returned to something way more simple: A basic phone.

In this day and age, how could someone survive without being totally connected, you may ask. It’s a different lifestyle than the one we’ve all found ourselves living, but for the sake of their sanity and solitude, they have chosen to purposefully disconnect from the Internet of Things. And if you can believe this, there are some tech companies who are creating phones explicitly designed to reduce the amount of time spent on them.

Businesses have a stake in the game when it comes to making sure you spend lots of time on your mobile devices. Cell phone carriers can charge you more for data. Social apps can display more advertising to you. E-commerce apps and platforms want you to linger so that they can convince you to make a purchase. Big data aggregators want to collect as much information about your travels, whereabouts, habits, and decision-making processes as they can to learn about humanity, society, and how to best market to certain groups.

To that end, it’s been in the best interest of most businesses to make sure you spend lots of time on your phone, and many features work to ensure this. Most apps, for example, have a blue interface, which is known to hold your attention for longer and make it more difficult to sleep. Frequent updates fix bugs and adapt to changing desires in the user experience. Apps will often work together to keep you hooked in a loop of toggling among them.

However, there are two particular disruptors who are designing phones designed to help people use their phones less. The first is Nokia, which has long been hailed as an extremely utilitarian and unbreakable device. Their new basic phone, the Nokia 3310, offers a more modern design but with little more than the basic calling and texting functions. Between the multi-day battery life, low cost of minutes, and the relief from the constant binging of app notifications, the new Nokia stands to provide welcome respite from the social network fatigue.

The other device is still in development. Siempo is a smartphone that allows users to simplify their notifications and encourages users to spend less time on it. For example, the phone has options that lock it for a certain amount of time after you wake up so that your first moments up involve exercise, meditation, or reading, not mindless scrolling. The phone also lacks a front-facing camera to cut down on the selfie urge and includes a lot of controls for how often you receive notifications.

Many are rethinking their phone usage and looking for ways to return to a more balanced lifestyle. Perhaps the kinds of phones they chose to use, be it a very simple “dumb” phone, a smartphone with a different purpose, or a total 180 to a house phone, will help users find an equilibrium between constant internet connection and real-world connections.

Powered by WordPress & Theme by Anders Norén