This is the internet age, and websites are a part of everyday life. But most people don’t know about how many different types of websites there are in the online environment, or what there functions are. This article will help shed some light on this, and hopefully help you make the right website development choices when you decide to build your business website.
Cryptocurrencies have been BIG news for some time now, but one of the most searched for questions about them on the internet is which ones are the most relevant right now? By their very nature Cryptocurrencies are volatile, so this is by no means an indicator of how to invest in Cryptocurrencies, but rather which ones are most regularly in the news. And the ones that people are talking about.
Cryptocurrency in its simplest form is a virtual currency (also referred to as a digital currency) which is designed to work as a medium of exchange. It received its name due to the fact that it uses cryptography to secure and verify all transactions. It also uses this process to self regulate the creation of new cryptocurrency units. On a technical level it is a limited entry on a database that will not change until specific predetermined conditions are met. It also closely resembles peer-to-peer networks used for file sharing. Sound complicated doesn’t it? Well let’s take a look at this video below to get a better idea of what Crypto is (because it is easier to understand than you think):
A world where everything from a home’s appliances, to communication and transport devices do one’s bidding automatically has been the focus of many a science fiction writer’s fevered imagination over the past decades. The truth is however that this time (and the ability of inter device communication) is a lot closer now than ever before. This is all thanks to The Internet of Things, or IoT for short!
Imagine a time and place where your lights come on when you’re almost home from the office, your coffee is ready the moment you wake up, or your fridge restocks itself and your car lets you know that something is wrong. This is all possible now thanks to the some of the latest device and application tech, all of which are helping to create the Internet of Things. But how will IoT make your life easier? Let’s take a look at the IBM video below to find out more…
Webcams! A harmless communication tool to keep in contact with both friends and family… Only part of this sentence is true, and what many people will be surprised to read is that it is the harmless part of the sentence that is very far from the truth. So much so in fact, that people like Facebook founder Mark Zuckerberg are known to cover their Webcams with tape. But why is this?
It is bad news all around for many South Africans, as Internet security firm Rapid7 has released its list of top 10 countries that are most vulnerable to hacking attacks. According to a report in The Guardian, these rankings were put together using a proprietary Rapid7 Project Sonar System that scans public-facing IP addresses to find out if their server “front doors” are wide open. The countries on the list are surprising to say the least and include:
Over the past 20 years the World Wide Web has helped to define and change the way that we process news, information and entertainment. In fact, along with powered flight, satellite technology and the creation of the standardised assembly line, the internet has had one of the most profound effects on the modern world. Thanks to constant innovation this has not changed, and today there are many web technologies that we take for granted that have changed our lives for the better. These include, what are in our opinion, the following top 5 internet innovations:
Where would we be without the humble Web browser? This is arguably THE technology that allowed the creation of what today we call the Internet experience. Without web browsers the internet would become a very boring place. Every web browser since Mosaic in 1993 has allowed us to retrieve online data in a usable format, and today the industry is dominated by Microsoft’s Internet Explorer, the open source Mozilla Firefox, Apple’s Safari and Google’s open source Chrome browser.
The next 18 months in South African TV Broadcasting is going to be an exceptionally eventful time thanks to the changes that Streaming TV are bringing to the country. The biggest beneficiaries to this process however are going to be us the average SA consumer!
The trigger for this very abrupt change in the way people are going to view TV can be traced back to Netflix, who just earlier this year confirmed that they will be launching in South Africa by the end of 2016. This announcement triggered a surprising turn of events, as NASPERS announced shortly afterwards that it would be launching its local Netflix rival ShowMax. This video-on-demand (VOD) service is now available to all South Africans with internet access at a very accessible price of R99 per month.
Last month we spoke a little about the increase in Spear Phishing and its devastating effects on Sony, but now it seems that the next strike in the cyber war has resulted in North Korea’s internet being shut down.
The attack on Sony, which seems to be a response to Sony’s The Interview, breached Sony’s security and leaked several unreleased films as well as the possible theft of employee’s personal data. It has been suggested that the attack was in part due to outdated OS systems and lax cyber security. It is scary to think it but the simple act of clicking on a link may have cost Sony millions of dollars in lost revenue as well as international humiliation.
Recent attacks on Sony by as an yet unidentified hackers has revealed how easily a lax security system can lead to millions of dollars worth of damage.
According to some reports, the recent breach of Sony’s security, which involved the theft of several unreleased movies as well as possible employee personal data, was most likely caused by a targeted phishing email. ‘Spear phishing’ emails are becoming more commonplace as hackers utilize them to infect targeted companies’ machines with malicious software. Combined with identified system vulnerabilities, hackers are able to map the network and gain access to sensitive data. Okay, this might be a simplification of the actual attack.