News

More technology and less privacy

Written by admin

The loss of privacy in our times is a frequent occurrence. We’ve flooded cyberspace with all the information we’re storing consciously or unconsciously.

Remember the old TV shows where a coffee maker could be a spy device? Now technology can make that a reality. The more advanced our coffee maker is, it will become an entry point for hackers all over the world. And if you were wondering, how could it affect me? Simple, with the information from your mobile account that is connected to the appliance, providing information on your GPS location and knowing when you are at home. Probably the location of your home can be taken out of your social media posts.

Companies that spend large amounts of money to protect their customers ‘ information (bank account numbers, credit cards, etc.) will now not only have to worry about the computers or mobile devices occupied by the attackers to gain access to the company’s servers, but will have to consider that millions of appliances can be used as a tool of aggression. The Internet of Things propitiates this with the digital interconnection of everyday objects. Can you imagine millions of people getting up and having coffee prepared by their high-tech coffee maker and at the same time being the means of attacking a country’s government officials?

The loss of privacy in our times is a frequent occurrence. We’ve flooded cyberspace with all the information we’re storing consciously or unconsciously. What time do we get up? what pages do we consult? what relationships do we have? who do we live with? Espionage no longer needs people, the cell phone knows everything about you, and many devices will soon too.

This is not a distant future, it is already happening, and more and more technology experts will be required to deal with this situation with safe developments and programmes that do not affect third parties. This is one of the priorities of the racing IT at the Tecnológico de Monterrey, generate professionals capable of understanding the risks and vulnerabilities they are subjected to the systems and implement controls and methods of protection against possible attacks.

About the author

admin

Leave a Comment