loading...
  1. Trusting Our Smart Devices

Trusting Our Smart Devices

Part Two

Beyond the unnerving chill that comes with the word, a cyber attack can be more threatening than we can imagine. As you may have noted from the previous blog, over the past few years we have grown a strong dependency on the Internet to complete our daily tasks. Unfortunately, as we put more and more trust on our smart devices we have also lost the knowledge on how to function without them. An Sm world is not one we want or even know how to live in, but Oct. 21’s cyber attack presented another dilemma.

Fear # 2: Smart Devices Break Our Trust

Let’s just picture our cell phones. How often does your phone ask you to allow it to see your location? How much of your private life can be accessed through your phone? Do you save passwords so you don’t have to type them again? Do you also save your credit card numbers? Newer iPhones may even have your fingerprint memorized. And let’s not forget about that camera. Many of us have entrusted our entire lives to our smart devices.

Naturally, we don’t think anything of this phenomenon. It’s just another part of our technological savvy lives. However, when an event occurs that shows us just how vulnerable we are, we tend to reconsider and evaluate our choices.

If you’ve ever been a victim of identity theft, you know the kind of long-term damage that causes. It’s not something we want to experience. Yet, here we are leaving all our private information within one device. Your passcode may leave you with a small feeling of comfort, but that is nothing to an advanced hacker.

Whose to say it’s even your identity that a hacker is after? There could be a whole range of motives behind these cybercriminals.

As the news of this attack dies down, it’s important to not completely erase it from our memory. According to Krebs on Security, the source code behind this attack was posted online allowing other hackers access to it. With that information out there, there’s no telling what’s around the corner.

 

 

 

 


Tags: , ,