Images, locations and health issues are just some of the bits of data that are sent to the cloud – sometimes out of our control. But, have you wondered who has access to this data? VINCE RESENTE of Intel explores these issues an how we can address them.
You’re watching your son play a school soccer match. Your camera is ready when he scores the winning goal, taking his team to victory. You’re so proud; you can’t wait to share the news. Along with the picture, you write: “The goal that made Sunny Hills Primary School winners today; well done, Peter!”
A few hours later, you get this message: “I saw Peter’s goal for Sunny Hills – amazing! I was on the other side; you have to see this angle.” You probably won’t think twice about clicking on the link in the message – obviously the person sending the message was there, how else would he know your son’s name, his school and that he scored the winning goal?
Two months later, you can’t understand why you’ve been blacklisted and the bank won’t grant you a personal loan.
Hackers are using social engineering methods such as these, which prey on our willingness to share our lives online, to access our personal information. They trick us into following links that give them access to our phones, which these days store everything from our social media profiles, which are always logged in, to our GPS apps that have our home addresses already saved. It’s become almost too easy to steal someone’s identity.
With the rise of the Internet of Things (IoT), we’ll soon be sending a lot more personal information to the cloud. Wearable devices that monitor our heart rates, blood pressure and glucose levels are becoming as common as regular wristwatches, while apps like Waze and Foursquare let anyone know where we are – and when we’re not at home, which is practically an invitation to burglars.
Where is all this information going and who has access to it? At the moment, too many people.
I don’t mind if my doctor can see my health data, but I have a problem with my medical insurance company using it to hike my premiums because my heart rate never goes past resting. And I certainly don’t want hackers getting their hands on it.
By default, our IoT DNA should be locked down in a virtual vault for which only we have the password. Only we should decide who can access what information – like an opt-in system – and block access to everyone else.
But passwords are inherently insecure, especially when we use the same one for multiple accounts. Anti-virus software and firewalls don’t offer sufficient protection as they’re easily breached and rely on users to regularly update them.
My eyes only
Everyone in the value chain has a responsibility to protect users’ information, from the users themselves and device manufacturers, to software creators and security providers.
We’re already seeing promising developments in the security industry. Soon, our faces or fingerprints will be our passwords, while password repositories will store passwords for the sites we use most often, and will only allow us to access those sites once we’ve supplied a ‘master’ password.
Device manufacturers and software vendors are also addressing flaws in existing security systems. Intel Security (previously known as McAfee), for example, is no longer just concerned with viruses and firewalls. It now checks multiple entries for infiltration and records common patterns. Anything out of the ordinary – if your computer pings every other PC on the network, for example – will get blocked and reported.
Soon we won’t need anti-virus software because the processor will be doing the smart thinking to flag suspicious behaviour. Every PC will be equipped with a software appliance that will operate as the firewall instead of having to load software onto an operating system.
In the past, we could walk the streets at night and not continually look over our shoulders. Today, we jump at every sound and take precautions to protect ourselves. We’ve adapted to changes in our physical security; we need to apply that same vigilance to cyber security.
* Vince Resente, Enterprise Technology Specialist at Intel Corporation
Notre Dame, Scoop Makhathini, GoT, top week in search
From fire disaster to social media disaster, the top Google searches this week covered a wide gamut of themes.
Paris and the whole world looked on in shock as the 856-year-old medieval Catholic cathedral crumbled into ash. The tragic infernal destruction of this tourist attraction of historical and religious significance led South Africans to generate more than 200 000 search queries for “Notre Dame Cathedral” on Monday. Authorities are investigating the cause of the fire that razed the architectural icon.
In other top trending searches on Google this week, radio presenter Siyabonga Ngwekazi, AKA Scoop Makhathini, went viral when it appeared he had taken to Twitter to expose his girlfriend, Akhona Carpede, for cheating on him. Scoop has since come out to say that he was not responsible for the bitter rant and that his account was hacked. “Scoop Makhathini” generated more than 20 000 search queries on Wednesday.
Fans generated more than 20 000 search queries for “Sam Smith” on Tuesday ahead of the the British superstar’s Cape Town performance at the Grand West Casino. Smith ended up cutting his performance short that night due to vocal strain.
Local Game of Thrones superfans were beside themselves on Sunday, searching the internet high and low for the first episode of the American fantasy drama’s eighth season. “Game of Thrones, season 8, episode 1” generated more than 100 000 queries on Google Search on the weekend.
As the festivities kicked off in California with headliners such as Childish Gambino and Ariana Grande, South Africans generated more than 2 000 search queries for “Coachella” on Saturday.
South Africans generated more than 5 000 search queries for “Wendy Williams” on Friday as it emerged that the American talk show host had filed for divorce from her husband Kevin Hunter after 21 years of marriage. Hunter has long been rumored to have been cheating on Williams, which reportedly finally led to the divorce.
Search trends information is gleaned from data collated by Google based on what South Africans have been searching for and asking Google. Google processes more than 40 000 search queries every second. This translates to more than a billion searches per day and 1.2 trillion searches per year worldwide. Live Google search trends data is available at https://www.google.co.za/trends/hottrends#pn=p40
5G smartphones to hit 5M sales in 2019
According to the latest research from Strategy Analytics, global smartphone shipments will reach a modest 5 million units in 2019. Early 5G smartphone models will be expensive and available in limited volumes. Samsung, LG and Huawei will be the early 5G smartphone leaders this year, followed by Apple next year.
Ken Hyers, Director at Strategy Analytics, said, “We forecast global 5G smartphone shipments will reach a modest 5 million units in 2019. Less than 1 percent of all smartphones shipped worldwide will be 5G-enabled this year. Global 5G smartphone shipments are tiny for now, due to expensive device pricing, component bottlenecks, and restricted availability of active 5G networks.”
Ville Petteri-Ukonaho, senior analyst at Strategy Analytics, added, “Samsung will be the early 5G smartphone leader in the first half of 2019, due to initial launches across South Korea and the United States. We predict LG, Huawei, Xiaomi, Motorola and others will follow later in the year, followed by Apple iPhone with its first 5G model during the second half of 2020. The iPhone looks set to be at least a year behind Samsung in the 5G smartphone race and Apple must be careful not to fall too far behind.”
Neil Mawston, executive director at Strategy Analytics, added, “The short-term outlook for 5G smartphones is weak, but the long-term opportunity remains huge. We forecast 1 billion 5G smartphones to ship worldwide per year by 2025. The introduction of 5G networks, by carriers like Verizon or China Mobile, opens up high-speed, ultra-low-latency services such as 8K video, streaming games, and augmented reality for business. The next big question for the mobile industry is how much extra consumers are really willing to pay, if anything, for those emerging 5G smartphones and services.”
Strategy Analytics provides a snapshot analyses for the outlook for 5G smartphone market in this Insight report: 5G Smartphones : From Zero to a Billion
Strategy Analytics provides a deep-dive into the air-interface technologies that will power phones through 2024 across 88 countries here: Global Handset Sales Forecast by 88 Countries and 19 Technologies : 2003 to 2024