Author: The Conversation

Ransomware usually spreads via phishing emails or links to infected websites, relying on human error to gain access to systems. As its name suggests, ransomware is designed to block access to data, systems or services until a ransom is paid. At a technical level, cities tend to be fairly easy targets because they often have bespoke operating systems, with parts that are old and out-of-date, as well as ineffective back-up measures.

Read More

Last year, a consortium of unidentified individuals launched Virternity with the stated goal of a digital life for all. A world that would be owned not by any government but by the people. This digital world, Virternity said, would remove the physical constraints upon us and the planet and usher in a completely new plane of existence. Then, without any warning, Virternity disappeared.

Read More

Facial recognition technology is spreading fast. Already widespread in China, software that identifies people by comparing images of their faces against a database of records is now being adopted across much of the rest of the world. It’s common among police forces but has also been used at airports, railway stations and shopping centres. The rapid growth of this technology has triggered a much-needed debate. Activists, politicians, academics and even police forces are expressing serious concerns over the impact facial recognition could have on a political culture based on rights and democracy. Human rights concerns As someone who researches the future of human rights, I share these concerns. Here are ten reasons why…

Read More

With the rise of internet juggernauts Google, Facebook, Amazon and others, this insight seems obvious now. But over the past two decades, a fundamentally new business model emerged which even Castells had not foreseen – one in which attracting users onto digital platforms takes precedence over everything else, including what the user might say, do, or buy on that platform.

Read More