UNHACKABLE : Your Online Security Playbook
eBook - ePub

UNHACKABLE : Your Online Security Playbook

Recreating Cyber Security in an Unsecure World

George Mansour

Partager le livre
  1. English
  2. ePUB (adapté aux mobiles)
  3. Disponible sur iOS et Android
eBook - ePub

UNHACKABLE : Your Online Security Playbook

Recreating Cyber Security in an Unsecure World

George Mansour

DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations

À propos de ce livre

Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get online with peace of mind.

Are you worried about your family members getting scammed or hacked? Want to keep your computers and phones protected with iron-clad security? Cyber security expert George Mansour has helped individuals and businesses protect their data for over 15 years. Now he'll share his simple system for safeguarding your valuable digital life.

Unhackable provides you with a unique Cyber security strategy that combines user psychology and easy-to-apply techniques that teach you how to become your own strongest line of defense. Informative and insightful, Mansour uses anecdotes, professional experience, and step-by-step procedures to make protecting your personal data as easy as hitting the power button.

Foire aux questions

Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier l’abonnement ». C’est aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via l’application. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă  la bibliothĂšque et Ă  toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode d’abonnement : avec l’abonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă  12 mois d’abonnement mensuel.
Qu’est-ce que Perlego ?
Nous sommes un service d’abonnement Ă  des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă  toute une bibliothĂšque pour un prix infĂ©rieur Ă  celui d’un seul livre par mois. Avec plus d’un million de livres sur plus de 1 000 sujets, nous avons ce qu’il vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Écouter sur votre prochain livre pour voir si vous pouvez l’écouter. L’outil Écouter lit le texte Ă  haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, l’accĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que UNHACKABLE : Your Online Security Playbook est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă  UNHACKABLE : Your Online Security Playbook par George Mansour en format PDF et/ou ePUB ainsi qu’à d’autres livres populaires dans Ciencia de la computaciĂłn et Ciencias computacionales general. Nous disposons de plus d’un million d’ouvrages Ă  dĂ©couvrir dans notre catalogue.

Informations

Année
2020
ISBN
9781648731280
Part I

Awakening

Reevaluate Your Relationship
with Technology
Chapter 2

Our Changing Relationship with Technology

“It has become appallingly obvious that technology has exceeded our humanity.”
—Albert Einstein
Our mission is urgent since the control of privacy and security has been lost due to nation-state-sponsored hacking, criminal behavior, ad-based revenue models, and misinformation. Technology interaction affects everyone, as we are interwoven over the Internet as one, but individually unique. The Unhackable mindset creates the conceptual model to enact a multi-layer digital union between technology and human interaction. The insecurities and impurities that threaten us online with every new connection must be controlled through a collaborative approach that will suppress the threats to our sensitive data. It's time to reclaim our digital lives and digital freedom.
The major influencers within the IT industry took the world by storm with their groundbreaking innovations. Followers took advantage of their innovations without thinking critically about the personal and social consequences of using the new technology almost incessantly.
The Beginning with Bill Gates
In 1974, Bill Gates read about a personal computer kit, Altair 8800, and felt it was a necessary item for the future of humanity. It was all about timing. Gates and his partner Paul Allen knew they could improve the personal computer by using the proper processing language.
“Allen spoke to Ed Roberts, president of Altair manufacturer MITS (Micro Instrumentation and Telemetry Systems), and sold him on the idea. Gates and Allen worked night and day to complete the first microcomputer Basic.”5 Gates anticipated the change that was coming and dropped out of Harvard to focus on the future of personal computing.
In 1980, IBM contacted Microsoft about an operating system for their personal computer. Gates took a big risk because he didn’t have the software at that time. Instead, he quickly bought another company’s software and presented it to IBM. “For this deal, Microsoft bought a system called 86-DOS from a company called Seattle Computer Products and, after adapting it for the PC, delivered it to IBM as 'PC DOS' in exchange for a one-time fee of $50,000.”6 In one transaction, the world of technology forever changed.
Bill Gates saw the future in the first personal computer. However, could he have seen the concerns with the intelligence and information that would come from new innovation? With the advancement of new technology, it contributed to the privacy concerns that we have today. However, as technology became user-friendly, it also became a powerful tool for data gathering.
Microsoft became a giant due to the mouse and GUI (graphical user interface). Early computers used command prompts and only a select few knew the proper language. Microsoft brought technology to the masses, but nobody took the necessary classes to learn the language.
Humans, as a society, didn’t focus on education or training, we just leaped without thinking about the risk. Adults must obtain a driver’s license to have a car, doctors need a degree to practice, why should users not need a certificate to operate a digital device?
As an innovator, Gates is constantly thinking of future advances in technology. He continues to encourage society to use more advanced devices. Currently, Gates is working with Belmont Partners to create a “smart city” in Arizona. Business Insider’s "Bill Gates Just Bought 25,000 Acres in Arizona to Build a New ‘Smart City’”7 shares, “Belmont Partners expects its development to feature all the trappings of a futuristic city: high-speed Internet embedded in the built environment, accommodations for self-driving cars (such as traffic lights that communicate with one another to minimize congestion), and smarter manufacturing technology.”
However, the impact of all the technology on the future residents of Belmont is unknown. Brooks Rainwater, the director of the City Solutions and Applied Research Center at the National League of Cities said, “When details are released, he hopes technology will serve as the ‘backbone’ of the city, ‘not the purpose of its existence.’” Are we focusing on the tech itself, rather than on the quality of the lives for those using the technology?
Our Obsession with Apple
Apple has been incredibly successful in the tech industry. Apple has had an almost fad-like following as fans fervently anticipate new products, such as iPods, iPads, and iPhones. The LiveScience article, “Apple Obsession: The Science of iPad Fanaticism” explores just how fanatical some followers became:
Some fans have retold and romanticized Apple's history, giving a "legend" to the company and its founders. In 2005, Belk and his colleagues found evidence for several myths within the Apple community, including a "creation myth" involving the creation of one of the first computers in Apple founder and CEO Steve Jobs’ garage.8
Steve Jobs made a major impact on our lives with technology. Historically, Apple has been ahead of everyone else with tech development and trends; however, with iPad sales declining, it seems like Apple may have to rethink its plan and adjust to the ever-changing environment. One of the reasons for this decline is that people may be starting to think more critically about whether they actually need a certain type of technology. We don’t blindly buy everything Apple and other technology companies produce. In “The World of Technology Is Changing and the iPad Is Getting Caught in the Middle,” Matt Weinberger shares:
Apple CEO Tim Cook talks the iPad up as a product with a bright future ahead. But with the decline in sales so unmistakable, that future is getting called into question...
And so, the question becomes less, ‘Do I need a tablet?’ or ‘Will this tablet replace my laptop?’ and more like, ‘does this device do what I need it to do?’ It's a healthy reminder that technology is supposed to serve you and your needs, not the other way around.9
Not only are sales down, but Apple is on shaky ground; they are realizing that their system is not as great as they thought. An increase in security attacks against Apple and Macintosh has caused concerns with users. “Eugene Kaspersky, the CEO of security firm Kaspersky Lab, says Apple is headed for a rough patch
 ’Cyber criminals have now recognized that Mac is an interesting area. Now we have more [malware], it's not just Flashback or Flashfake,’ Kaspersky told CBR. ‘Welcome to Microsoft's world, Mac. It's full of malware.’”10
Everything Is Hackable
Unfortunately, we are moving in a direction that focuses more on automation and profit over human connections and fair business practices. Influencers are reaping the benefits while we’re in danger, and that's wrong! Steve Jobs contributed greatly to technology, but he accomplished a lot through smart marketing practices.
“He had a unique way of crafting his own reality, a ‘distortion field’ he used to persuade people that his personal beliefs were actually facts, which is how he pushed his companies forward. He also used a blend of manipulative tactics to ensure his victories, particularly in boardroom meetings with some of the most powerful company executives in the world.”11
Pushing New Versions
When a program tells users an update is available, we need to ask why the update is necessary. Is it due to a security problem or just an enhancement update?
These same companies keep moving forward, releasing new versions, and producing more advanced innovations before they have perfected the current version. Instead of facing the current problem and security concerns, we are being blinded by the newer version, along with new issues to cover and patch the previous set of problems and bugs. We should be trying to work in a collaborative effort to create a more stabilized environment; stop adding all the innovation and stick to what is working. Users should not update in a real-time environment online. Instead, we should have a testing environment where updates can be applied and tested before it’s implemented in real time. Otherwise, sensitive data becomes the guinea pig.
Apple even admitted that “it has been secretly stifling the performance of older iPhones. Critics have accused the company in the past, based on anecdotal evidence, of purposely slowing phones to compel users to upgrade to the latest model...The fact is Apple has an incentive to push users to upgrade; it makes money selling new devices, after all.”12 Apple greatly upset many of its most devoted followers when the company admitted to slowing down the batteries of older iPhones.
Business Insider’s article "Apple Confirmed a Longtime Conspiracy Theory - and Gave Regular Customers a Big Reason to Distrust It" also reveals another tactic Apple has used to force users to upgrade:
The company has a history of artificially making old...

Table des matiĂšres