Goto

Collaborating Authors


How the Internet of Things revolution could intensify hacking attacks

#artificialintelligence

The coming Internet of Things revolution will see billions of devices, from fridges to traffic lights, connected and controllable from afar. For Kevin Ashton, the tech entrepreneur and visionary who coined the term'Internet of Things', the risk of devices being hijacked is exponentially greater than any cybersecurity threat we've encountered before. "You can change the real world using the Internet of Things," explains Ashton, who was in New Zealand last week to address the GS1 eCommerce Innovation Summit. "If you are malicious, it isn't just about taking all the money out of someone's bank account. You can flip cars, you can shut down power stations, you can potentially make things explode.


Salesforce wants you to get some AI and visual search into your eCommerce game

#artificialintelligence

Salesforce has announced a series of new updates to its Commerce Cloud platform which aims to encourage organisations to'go beyond eCommerce sites and modernise every shopping experience.' The move includes adding artificial intelligence and visual search capability into APIs and developer services with the goal of giving an insightful experience across various customer touchpoints. The company quoted research from Deloitte which argued that retailers use almost 40 disparate systems on average to manage customer engagement. This naturally includes the usual suspects of call centre, mobile, email and social. Yet the need to catch a potential sale on one channel may mean it all goes pear-shaped on another.


Internet outage was caused by personal webcams, meaning people provided firepower for shutdown without knowing it

The Independent - Tech

You might well have been responsible for one of the biggest-ever attacks on the internet last week. And you're probably going to do it again. A huge network of webcams and other internet of things devices is being built that can be used as perhaps the biggest cyberweapon ever created. And those people who own the devices probably don't even know that they're infected with the malicious code that allows them to be used that way. To be involved in the attack, you wouldn't need to do more than buy a common webcam – perhaps for keeping an eye on your house, or a pet that lives in it – or any other connected home or internet of things device.


Top 5 Essential Features of Effective Cybersecurity for Web Apps

#artificialintelligence

There's hardly any business nowadays that don't use computers and connect to the Internet. Companies maintain an online presence through their official websites, blogs, and social media pages. People use online services to conduct day to day activities like banking. And of course, there are many businesses that are completely based on the web like online markets, e-Commerce websites and financial services. All of these activities create opportunities for cyber attacks.