Browsing: The Conversation

The deluge of cyberattacks sweeping across the world has governments and companies thinking about new ways to protect their digital systems, and the corporate and state secrets stored within. For a long time, cybersecurity experts have erected firewalls to keep out unwanted traffic and set up decoy targets on their networks to distract hackers who do get in. They have also scoured the internet for hints about what cybercriminals might be up to next to better protect themselves and their clients.

Imagine a house where the walls change colour depending on your mood, or your tablecloth changes shape when you’re having a dinner party. A house where every item, from your cushions to your lampshades, interact with you. This might sound like something out of Harry Potter, but such magic interior design could become a real part of our lives in the near future.

When you are asked to create a password – either for a new online account or resetting login information for an existing account – you’re likely to choose a password you know you can remember. Many people use extremely basic passwords, or a more obscure one they reuse across many sites. Our research has found that others – even ones who use different passwords for each site – have a method of devising them, for instance basing them all on a familiar phrase and making site-specific tweaks.

Alita: Battle Angel is an interesting and wild ride, jam-packed full of concepts around cybernetics, dystopian futures and cyberpunk themes.

The film – in cinemas from today – revolves around Alita (Rosa Salazar), a female cyborg (with original human brain) that is recovered by cybernetic doctor Dyson Ido (Christoph Waltz) and brought into the world of the future (the film is set in 2563).

Every day, often multiple times a day, you are invited to click on links sent to you by brands, politicians, friends and strangers. You download apps on your devices. Maybe you use QR codes.

Most of these activities are secure because they come from sources that can be trusted. But sometimes criminals impersonate trustworthy sources to get you to click on a link (or download an app) that contains malware.

Ted Florence is ready for his family trip to Botswana. He has looked up his hotel on Google Maps and downloaded a digital map of the country to his phone. He has also packed a large paper map. “I travel all over the world,” says Florence, the president of the international board of the International Map Industry Association and Avenza Maps, a digital map software company. “Everywhere I go, my routine is the same: I get a paper map, and I keep it in my back pocket.”