SlideShare a Scribd company logo
1 of 20
Download to read offline
WOULD YOU LEAVE YOUR
HOUSE .
UNLOCKED?
Photo: Natasha McMillan
Flipbook by: Natasha McMillan
AS TECHNOLOGY GETS
SMALLER IT BECOMES MORE
POWERFUL
WITH VASTLY INCREASED
Photo: Natasha McMillan
6
STORAGE CAPACITY.
CAN FIT IN THE PALM OF OUR
COMPUTERS
Photo: Natasha McMillan
HAND.
“WE MAY BE INSTITUTIONALIZING
RUDENESS WITH OUR GADGETS,
BUT INCREASINGLY IT’S A MORE
WAY TO WORK.”PRODUCTIVE
Photo: Hayley McMillan
3
WE ARE WITNESSING A
TECHNOLOGY IS BEGINNING TO PLAY AN AMPLE
ROLE IN BUSINESSES AND PERSONAL LIFE.
MERGE.
Photo: Natasha McMillan
Edited: Ken McMillan
HAVE PASSWORD PROTECTED
THEIR DEVICES.
BUT ONLY
61%OF USERS
Photo: Natasha McMillan
*
8
* This is a US statistic from 2015
PRIVATE
STOLEN
MORE!
A DEVICE MEANS
ACCESS TO PHOTOS,
CONTACTS, ADDRESSES, AND
Photo: Natasha McMillan
UNENCRYPTED
USB DEVICES CAN LEAD TO
.
SECURITYFATAL
BREACHES.
7
Photo: Natasha McMillan
BUT IT DOESN’T END WITH PASSWORDS.
NEED TO LEARN SAFEUSERS
COMPUTER-USE PRACTICES,
AND CLOSE THE GAP.
Photo: Hayley McMillan
SEEMINGLY HARMLESS FILES SUCH AS .DOC, .XLS, AND EVEN .PPT
CAN BE HARMFUL TO YOUR COMPUTER?
NEVER OPEN A FILE IF YOU
ARE UNSURE OF THE CREATOR.
THE LAW TO FOLLOW:
DID YOU KNOW?
10
Photo: Natasha McMillan
MALWARE IS MALICIOUSLY INSTALLED
SOFTWARE WHICH CAN RUN
QUIETLY IN THE BACKGROUND.
ONCE INSTALLED IT
CAN STEAL YOUR
INFORMATION,
WHETHER YOU ARE
CONNECTED - OR NOT.
Photo: Natasha McMillan
ANALARMING
30%OF HOUSEHOLDS ARE AFFECTED
BY MALWARE.
*
Photo: Natasha McMillan
* This is a US statistic.
9
SOFTWARE CAN PERFORM TASKS SUCH AS,
KEYSTROKE LOGGING
EMAIL SAVING
DOCUMENT DOWNLOADING
AND
INTERNET SEARCH HISTORY SAVING.
2
Photo: Hayley McMillan
CLICKS
MORE DAMAGE
BUT SIMPLE CAN
THAN MALWARE.
ACTUALLY DO
Photo: Natasha McMillan
IT’S THE FINER DETAILS THAT
GET YOU.
APPS, WEBSITES, AND DEVICES ASK FOR
EXTENSIVEPERMISSIONS EVERYDAY.
Photo: Hayley McMillan
APPS RECORD YOUR
LOCATIONEVEN WHEN THEY
AREN’T IN USE.
BECAUSE “MARKETERS PAY 10% TO 20%
MORE FOR LOCATION BASED ADS.”
Photo: Hayley McMillan
4
DID YOU KNOW?FACEBOOKLOOKS AT YOUR
CONTACT LIST AND MAPS A NETWORK
OF PEOPLE; IN ORDER TO MAKE
REASONABLE GUESSES ABOUT
YOUR FRIENDS.
5
Photo: Natasha McMillan
BUT THE BIGGEST
SECURITY HOLE
OF ALL
Photo: Hayley McMillan
WE WILLINGLY
PERSONAL INFORMATION IN
SHARE OUR
“OUR PERMANENT - AND
PUBLIC - DIGITAL FILES.”
Photo: Hayley McMillan
IN THE WORLD OF TECHNOLOGY,
YOUR BIGGEST THREAT IS YOURSELF.
1
Photo: Natasha McMillan
CITATIONS
1. Rosen, Jeffrey. "The Web Means the End of Forgetting." The New York Times. The New York Times, 21 July 2010. Web. 01
June 2016. <http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all>.
2. Ingram, Mathew. "Snooping on Your Kids: If the NSA's Tools Were Available, I Probably Would Have Used Them." Gigaom.
07 Aug. 2013. Web. 01 June 2016. <https://gigaom.com/2013/08/07/snooping-on-your-kids-if-the-nsas-tools-were-available-
i-probably-would-have-used-them/>
3. Eichler, Leah. "Sorry to Be Rude, but My Smartphone Needs My Attention." The Globe and Mail. The Globe and Mail, 04
Oct. 2013. Web. 02 June 2016. <http://www.theglobeandmail.com.proxy.queensu.ca/report-on-business/careers/career-
advice/life-at-work/sorry-to-be-rude-but-my-phone-needs-me/article14706158/>.
4. Dwoskin, Elizabeth. "Where Were You 3 Minutes Ago? Your Apps Know." The Wall Street Journal. The Wall Street Journal,
23 Mar. 2015. Web. 02 June 2016. <http://blogs.wsj.com/digits/2015/03/23/where-were-you-3-minutes-ago-your-apps-
know/?mod=LS1>.
5. Dewey, Caitlin. "How Facebook Knows Who All Your Friends Are, Even Better than You Do." Washington Post. The
Washington Post, 02 Apr. 2015. Web. 02 June 2016. <https://www.washingtonpost.com/news/the-intersect/wp/2015/04/02/
how-facebook-knows-who-all-your-friends-are-even-better-than-you-do/?wprss=rss_technology>.
6. "Technology Quarterly | After Moore's Law." The Economist. The Economist Newspaper, 12 Mar. 2016. Web. 02 June 2016.
<http://www.economist.com/technology-quarterly/2016-03-12/after-moores-law>.
7. Shwartz, Matthew J. "How USB Sticks Cause Data Breach, Malware Woes." Dark Reading. 08 Aug. 2011. Web. 02 June
2016. <http://www.darkreading.com/risk-management/how-usb-sticks-cause-data-breach-malware-woes/d/d-id/1099437>.
8. McCabe, David. "Survey: More Consumers Password Protecting Their Smartphones." The Hill. 19 Oct. 2015. Web. 02 June
2016. <http://thehill.com/policy/technology/257295-survey-more-consumers-password-protecting-their-smartphones>.
9. CloudTweaks. "Cloud Infographic – Computer Virus Facts And Stats." Cloud Tweaks. 11 Apr. 2014. Web. 02 June 2016.
<http://cloudtweaks.com/2014/04/cloud-infographic-computer-virus-facts-stats/>.
10. Hoffman, Chris. "50 File Extensions That Are Potentially Dangerous on Windows." How To Geek. 12 Feb. 2013. Web. 02
June 2016. <http://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows/>.

More Related Content

What's hot

Voice meets IoT/Smarthome Hackathon - Munich. Storyline
Voice meets IoT/Smarthome Hackathon - Munich. StorylineVoice meets IoT/Smarthome Hackathon - Munich. Storyline
Voice meets IoT/Smarthome Hackathon - Munich. StorylineAlexey Vidanov
 
Online Tools For Journalists
Online Tools For JournalistsOnline Tools For Journalists
Online Tools For JournalistsLivestation
 
Media is killing Social Media - BBH LIVE
Media is killing Social Media - BBH LIVEMedia is killing Social Media - BBH LIVE
Media is killing Social Media - BBH LIVEBen Shaw
 
The Future of Instagram - Gian Carlo Pitocco, Attention
The Future of Instagram - Gian Carlo Pitocco, AttentionThe Future of Instagram - Gian Carlo Pitocco, Attention
The Future of Instagram - Gian Carlo Pitocco, AttentionFlashStock
 
Cultivating Community with Social Media at the Local Level
Cultivating Community with Social Media at the Local LevelCultivating Community with Social Media at the Local Level
Cultivating Community with Social Media at the Local LevelJennifer Navarrete
 
Using Twitter to communicate science
Using Twitter to communicate scienceUsing Twitter to communicate science
Using Twitter to communicate scienceAlan Cann
 
Podularityftw 130528020402-phpapp02
Podularityftw 130528020402-phpapp02Podularityftw 130528020402-phpapp02
Podularityftw 130528020402-phpapp02Wooga
 
Podularity FTW!
Podularity FTW!Podularity FTW!
Podularity FTW!Tim Lossen
 
10 Steps: Integrating Social Media Into Crisis Plans
10 Steps: Integrating Social Media Into Crisis Plans10 Steps: Integrating Social Media Into Crisis Plans
10 Steps: Integrating Social Media Into Crisis PlansKami Watson Huyse, APR
 
Lightening Talk: Lean start up
Lightening Talk: Lean start upLightening Talk: Lean start up
Lightening Talk: Lean start upAgileee
 
How Targeted Should We Get?
How Targeted Should We Get?How Targeted Should We Get?
How Targeted Should We Get?MediaPost
 
UGM: From Online Content to Real Life Interactions – Engagement for a Richer ...
UGM: From Online Content to Real Life Interactions – Engagement for a Richer ...UGM: From Online Content to Real Life Interactions – Engagement for a Richer ...
UGM: From Online Content to Real Life Interactions – Engagement for a Richer ...An Bui
 
Elodie Malliet - WHEN AI GETS CREATIVE, HOW DO COMPANIES STAY ON TOP
Elodie Malliet - WHEN AI GETS CREATIVE, HOW DO COMPANIES STAY ON TOPElodie Malliet - WHEN AI GETS CREATIVE, HOW DO COMPANIES STAY ON TOP
Elodie Malliet - WHEN AI GETS CREATIVE, HOW DO COMPANIES STAY ON TOPHilary Ip
 
5 Technology Trends Disrupting Consumer Behavior (v15)
5 Technology Trends Disrupting Consumer Behavior (v15)5 Technology Trends Disrupting Consumer Behavior (v15)
5 Technology Trends Disrupting Consumer Behavior (v15)Kyle Lacy
 
Take Action on your Passion
Take Action on your PassionTake Action on your Passion
Take Action on your PassionBrian Dixon
 
Are Facebook Pages Officially Dead?
Are Facebook Pages Officially Dead?Are Facebook Pages Officially Dead?
Are Facebook Pages Officially Dead?Sheer Social
 

What's hot (20)

Voice meets IoT/Smarthome Hackathon - Munich. Storyline
Voice meets IoT/Smarthome Hackathon - Munich. StorylineVoice meets IoT/Smarthome Hackathon - Munich. Storyline
Voice meets IoT/Smarthome Hackathon - Munich. Storyline
 
Online Tools For Journalists
Online Tools For JournalistsOnline Tools For Journalists
Online Tools For Journalists
 
18th Feb
18th Feb18th Feb
18th Feb
 
Media is killing Social Media - BBH LIVE
Media is killing Social Media - BBH LIVEMedia is killing Social Media - BBH LIVE
Media is killing Social Media - BBH LIVE
 
Work life-balance
Work life-balanceWork life-balance
Work life-balance
 
The Future of Instagram - Gian Carlo Pitocco, Attention
The Future of Instagram - Gian Carlo Pitocco, AttentionThe Future of Instagram - Gian Carlo Pitocco, Attention
The Future of Instagram - Gian Carlo Pitocco, Attention
 
Cultivating Community with Social Media at the Local Level
Cultivating Community with Social Media at the Local LevelCultivating Community with Social Media at the Local Level
Cultivating Community with Social Media at the Local Level
 
Using Twitter to communicate science
Using Twitter to communicate scienceUsing Twitter to communicate science
Using Twitter to communicate science
 
Podularityftw 130528020402-phpapp02
Podularityftw 130528020402-phpapp02Podularityftw 130528020402-phpapp02
Podularityftw 130528020402-phpapp02
 
Podularity FTW!
Podularity FTW!Podularity FTW!
Podularity FTW!
 
10 Steps: Integrating Social Media Into Crisis Plans
10 Steps: Integrating Social Media Into Crisis Plans10 Steps: Integrating Social Media Into Crisis Plans
10 Steps: Integrating Social Media Into Crisis Plans
 
Lightening Talk: Lean start up
Lightening Talk: Lean start upLightening Talk: Lean start up
Lightening Talk: Lean start up
 
How Targeted Should We Get?
How Targeted Should We Get?How Targeted Should We Get?
How Targeted Should We Get?
 
Lecture ubd condensed
Lecture ubd condensedLecture ubd condensed
Lecture ubd condensed
 
UGM: From Online Content to Real Life Interactions – Engagement for a Richer ...
UGM: From Online Content to Real Life Interactions – Engagement for a Richer ...UGM: From Online Content to Real Life Interactions – Engagement for a Richer ...
UGM: From Online Content to Real Life Interactions – Engagement for a Richer ...
 
Darwin Analytics Event
Darwin Analytics EventDarwin Analytics Event
Darwin Analytics Event
 
Elodie Malliet - WHEN AI GETS CREATIVE, HOW DO COMPANIES STAY ON TOP
Elodie Malliet - WHEN AI GETS CREATIVE, HOW DO COMPANIES STAY ON TOPElodie Malliet - WHEN AI GETS CREATIVE, HOW DO COMPANIES STAY ON TOP
Elodie Malliet - WHEN AI GETS CREATIVE, HOW DO COMPANIES STAY ON TOP
 
5 Technology Trends Disrupting Consumer Behavior (v15)
5 Technology Trends Disrupting Consumer Behavior (v15)5 Technology Trends Disrupting Consumer Behavior (v15)
5 Technology Trends Disrupting Consumer Behavior (v15)
 
Take Action on your Passion
Take Action on your PassionTake Action on your Passion
Take Action on your Passion
 
Are Facebook Pages Officially Dead?
Are Facebook Pages Officially Dead?Are Facebook Pages Officially Dead?
Are Facebook Pages Officially Dead?
 

Viewers also liked

Final version flipbook
Final version flipbookFinal version flipbook
Final version flipbookYatong Wu
 
The Rise of Instant Messaging
The Rise of Instant MessagingThe Rise of Instant Messaging
The Rise of Instant MessagingFlorian Nt
 
Mobile Technology: The most essential travel tool
Mobile Technology: The most essential travel toolMobile Technology: The most essential travel tool
Mobile Technology: The most essential travel tool2hle
 
Social Media, the next Resume?
Social Media, the next Resume?Social Media, the next Resume?
Social Media, the next Resume?bluberry555
 
Lovelock brittany film260 flipchart_2015
Lovelock brittany film260 flipchart_2015Lovelock brittany film260 flipchart_2015
Lovelock brittany film260 flipchart_2015brittlovelock
 
More than just a click
More than just a clickMore than just a click
More than just a clickChloe Miller
 
Hybridized Activism
Hybridized Activism Hybridized Activism
Hybridized Activism Marahp
 
Digital activism or online "slacktivism"?
Digital activism or online "slacktivism"?Digital activism or online "slacktivism"?
Digital activism or online "slacktivism"?Tarah McRoberts
 
Warm Glow Giving
Warm Glow GivingWarm Glow Giving
Warm Glow GivingColleen Uay
 
Michael coldwell swipe fever
Michael coldwell   swipe feverMichael coldwell   swipe fever
Michael coldwell swipe fevermichaelcoldwell96
 
Like, Favourite, Retweeet: Social Media's Impact On Our Relationships
Like, Favourite, Retweeet: Social Media's Impact On Our RelationshipsLike, Favourite, Retweeet: Social Media's Impact On Our Relationships
Like, Favourite, Retweeet: Social Media's Impact On Our RelationshipsClement Wong
 
You are not in control
You are not in controlYou are not in control
You are not in controlJae Gee
 
Crowdfunding: an Easy and Creative Way of Funding
Crowdfunding: an Easy and Creative Way of FundingCrowdfunding: an Easy and Creative Way of Funding
Crowdfunding: an Easy and Creative Way of Fundingjustverycurious
 
Mobile Phone Addiction
Mobile Phone Addiction Mobile Phone Addiction
Mobile Phone Addiction kangus314
 
Mindfulness and media
Mindfulness and mediaMindfulness and media
Mindfulness and mediaEthan Beech
 
Smartphones: A New Age
Smartphones: A New AgeSmartphones: A New Age
Smartphones: A New AgeErik Wainman
 

Viewers also liked (20)

Final version flipbook
Final version flipbookFinal version flipbook
Final version flipbook
 
connections
connectionsconnections
connections
 
The Rise of Instant Messaging
The Rise of Instant MessagingThe Rise of Instant Messaging
The Rise of Instant Messaging
 
Mobile Technology: The most essential travel tool
Mobile Technology: The most essential travel toolMobile Technology: The most essential travel tool
Mobile Technology: The most essential travel tool
 
Social Media, the next Resume?
Social Media, the next Resume?Social Media, the next Resume?
Social Media, the next Resume?
 
Lovelock brittany film260 flipchart_2015
Lovelock brittany film260 flipchart_2015Lovelock brittany film260 flipchart_2015
Lovelock brittany film260 flipchart_2015
 
More than just a click
More than just a clickMore than just a click
More than just a click
 
Presentation4
Presentation4Presentation4
Presentation4
 
Hybridized Activism
Hybridized Activism Hybridized Activism
Hybridized Activism
 
Film260 flipbook
Film260 flipbookFilm260 flipbook
Film260 flipbook
 
Digital activism or online "slacktivism"?
Digital activism or online "slacktivism"?Digital activism or online "slacktivism"?
Digital activism or online "slacktivism"?
 
Warm Glow Giving
Warm Glow GivingWarm Glow Giving
Warm Glow Giving
 
Michael coldwell swipe fever
Michael coldwell   swipe feverMichael coldwell   swipe fever
Michael coldwell swipe fever
 
Like, Favourite, Retweeet: Social Media's Impact On Our Relationships
Like, Favourite, Retweeet: Social Media's Impact On Our RelationshipsLike, Favourite, Retweeet: Social Media's Impact On Our Relationships
Like, Favourite, Retweeet: Social Media's Impact On Our Relationships
 
You are not in control
You are not in controlYou are not in control
You are not in control
 
Crowdfunding: an Easy and Creative Way of Funding
Crowdfunding: an Easy and Creative Way of FundingCrowdfunding: an Easy and Creative Way of Funding
Crowdfunding: an Easy and Creative Way of Funding
 
Voluntourism and Social Media
Voluntourism and Social MediaVoluntourism and Social Media
Voluntourism and Social Media
 
Mobile Phone Addiction
Mobile Phone Addiction Mobile Phone Addiction
Mobile Phone Addiction
 
Mindfulness and media
Mindfulness and mediaMindfulness and media
Mindfulness and media
 
Smartphones: A New Age
Smartphones: A New AgeSmartphones: A New Age
Smartphones: A New Age
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 

Your Digital Life: Security and Privacy in the Modern Age

  • 1. WOULD YOU LEAVE YOUR HOUSE . UNLOCKED? Photo: Natasha McMillan Flipbook by: Natasha McMillan
  • 2. AS TECHNOLOGY GETS SMALLER IT BECOMES MORE POWERFUL WITH VASTLY INCREASED Photo: Natasha McMillan 6 STORAGE CAPACITY.
  • 3. CAN FIT IN THE PALM OF OUR COMPUTERS Photo: Natasha McMillan HAND.
  • 4. “WE MAY BE INSTITUTIONALIZING RUDENESS WITH OUR GADGETS, BUT INCREASINGLY IT’S A MORE WAY TO WORK.”PRODUCTIVE Photo: Hayley McMillan 3
  • 5. WE ARE WITNESSING A TECHNOLOGY IS BEGINNING TO PLAY AN AMPLE ROLE IN BUSINESSES AND PERSONAL LIFE. MERGE. Photo: Natasha McMillan Edited: Ken McMillan
  • 6. HAVE PASSWORD PROTECTED THEIR DEVICES. BUT ONLY 61%OF USERS Photo: Natasha McMillan * 8 * This is a US statistic from 2015
  • 7. PRIVATE STOLEN MORE! A DEVICE MEANS ACCESS TO PHOTOS, CONTACTS, ADDRESSES, AND Photo: Natasha McMillan
  • 8. UNENCRYPTED USB DEVICES CAN LEAD TO . SECURITYFATAL BREACHES. 7 Photo: Natasha McMillan
  • 9. BUT IT DOESN’T END WITH PASSWORDS. NEED TO LEARN SAFEUSERS COMPUTER-USE PRACTICES, AND CLOSE THE GAP. Photo: Hayley McMillan
  • 10. SEEMINGLY HARMLESS FILES SUCH AS .DOC, .XLS, AND EVEN .PPT CAN BE HARMFUL TO YOUR COMPUTER? NEVER OPEN A FILE IF YOU ARE UNSURE OF THE CREATOR. THE LAW TO FOLLOW: DID YOU KNOW? 10 Photo: Natasha McMillan
  • 11. MALWARE IS MALICIOUSLY INSTALLED SOFTWARE WHICH CAN RUN QUIETLY IN THE BACKGROUND. ONCE INSTALLED IT CAN STEAL YOUR INFORMATION, WHETHER YOU ARE CONNECTED - OR NOT. Photo: Natasha McMillan
  • 12. ANALARMING 30%OF HOUSEHOLDS ARE AFFECTED BY MALWARE. * Photo: Natasha McMillan * This is a US statistic. 9
  • 13. SOFTWARE CAN PERFORM TASKS SUCH AS, KEYSTROKE LOGGING EMAIL SAVING DOCUMENT DOWNLOADING AND INTERNET SEARCH HISTORY SAVING. 2 Photo: Hayley McMillan
  • 14. CLICKS MORE DAMAGE BUT SIMPLE CAN THAN MALWARE. ACTUALLY DO Photo: Natasha McMillan
  • 15. IT’S THE FINER DETAILS THAT GET YOU. APPS, WEBSITES, AND DEVICES ASK FOR EXTENSIVEPERMISSIONS EVERYDAY. Photo: Hayley McMillan
  • 16. APPS RECORD YOUR LOCATIONEVEN WHEN THEY AREN’T IN USE. BECAUSE “MARKETERS PAY 10% TO 20% MORE FOR LOCATION BASED ADS.” Photo: Hayley McMillan 4
  • 17. DID YOU KNOW?FACEBOOKLOOKS AT YOUR CONTACT LIST AND MAPS A NETWORK OF PEOPLE; IN ORDER TO MAKE REASONABLE GUESSES ABOUT YOUR FRIENDS. 5 Photo: Natasha McMillan
  • 18. BUT THE BIGGEST SECURITY HOLE OF ALL Photo: Hayley McMillan
  • 19. WE WILLINGLY PERSONAL INFORMATION IN SHARE OUR “OUR PERMANENT - AND PUBLIC - DIGITAL FILES.” Photo: Hayley McMillan IN THE WORLD OF TECHNOLOGY, YOUR BIGGEST THREAT IS YOURSELF. 1
  • 20. Photo: Natasha McMillan CITATIONS 1. Rosen, Jeffrey. "The Web Means the End of Forgetting." The New York Times. The New York Times, 21 July 2010. Web. 01 June 2016. <http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all>. 2. Ingram, Mathew. "Snooping on Your Kids: If the NSA's Tools Were Available, I Probably Would Have Used Them." Gigaom. 07 Aug. 2013. Web. 01 June 2016. <https://gigaom.com/2013/08/07/snooping-on-your-kids-if-the-nsas-tools-were-available- i-probably-would-have-used-them/> 3. Eichler, Leah. "Sorry to Be Rude, but My Smartphone Needs My Attention." The Globe and Mail. The Globe and Mail, 04 Oct. 2013. Web. 02 June 2016. <http://www.theglobeandmail.com.proxy.queensu.ca/report-on-business/careers/career- advice/life-at-work/sorry-to-be-rude-but-my-phone-needs-me/article14706158/>. 4. Dwoskin, Elizabeth. "Where Were You 3 Minutes Ago? Your Apps Know." The Wall Street Journal. The Wall Street Journal, 23 Mar. 2015. Web. 02 June 2016. <http://blogs.wsj.com/digits/2015/03/23/where-were-you-3-minutes-ago-your-apps- know/?mod=LS1>. 5. Dewey, Caitlin. "How Facebook Knows Who All Your Friends Are, Even Better than You Do." Washington Post. The Washington Post, 02 Apr. 2015. Web. 02 June 2016. <https://www.washingtonpost.com/news/the-intersect/wp/2015/04/02/ how-facebook-knows-who-all-your-friends-are-even-better-than-you-do/?wprss=rss_technology>. 6. "Technology Quarterly | After Moore's Law." The Economist. The Economist Newspaper, 12 Mar. 2016. Web. 02 June 2016. <http://www.economist.com/technology-quarterly/2016-03-12/after-moores-law>. 7. Shwartz, Matthew J. "How USB Sticks Cause Data Breach, Malware Woes." Dark Reading. 08 Aug. 2011. Web. 02 June 2016. <http://www.darkreading.com/risk-management/how-usb-sticks-cause-data-breach-malware-woes/d/d-id/1099437>. 8. McCabe, David. "Survey: More Consumers Password Protecting Their Smartphones." The Hill. 19 Oct. 2015. Web. 02 June 2016. <http://thehill.com/policy/technology/257295-survey-more-consumers-password-protecting-their-smartphones>. 9. CloudTweaks. "Cloud Infographic – Computer Virus Facts And Stats." Cloud Tweaks. 11 Apr. 2014. Web. 02 June 2016. <http://cloudtweaks.com/2014/04/cloud-infographic-computer-virus-facts-stats/>. 10. Hoffman, Chris. "50 File Extensions That Are Potentially Dangerous on Windows." How To Geek. 12 Feb. 2013. Web. 02 June 2016. <http://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows/>.