Category Archives: Security

San Francisco’s killer robots

Reading Time: 2 minutes

In recent days decision about deploying police armed robots has been revoked , mainly due to the huge outcry and protests across the Bay Area. People manifested against the usage of machines to take human lifes ,but is such strong outrage reasonable ?

I think the public’s fears are completely understandable , especially in the American reality where the general access to weapons and the strict approach of the police officers cause unpleasant feelings, although I think the fear of those “killer” robots is mainly due to lack of knowledge about these project.

A woman holds up a sign while taking part in a demonstration about the use of robots by the San Francisco Police Department outside of City Hall Monday.

As high-profile officers explain these machines are going to be used in cases of high emergency. For example to force a way into the occupied building . Its a device that should prevent the loss of lifes , not to kill people … These robots would be used in the extraordinary situations and operated only by trained specialists. Lethal usage would only be insisted when the lifes of the innocent citizens could be endangered.

However there are still some moral ascpects which stand in the way of introducing killer robots into police equipment. Main reason of course is excessive arming, but also moral dilema of whether the machine should be used to take human life. The first one makes a lot of sense , because there is a lot of room for overusage of this lethal device, although the second statement is rather inaccurate , because the robots are not particullary designed to kill people , but to reduce risk of putting officers in danger.

It’s hard for me to tell if the denial of Killer robots in San Francisco was a correct decision . In many cases this invention would help in the special-forces operations, on the other hand it’s disturbing that robots designed to defuse bombs are going to be used to carry explosives.

Tell me what you think about it , was the decision correct ?


One post can determine your future – Building your company’s reputation

Reading Time: 3 minutes

Few Polish businesses have a plan for managing and enhancing their reputations. Western European companies, on the other hand, do it in a more planned and deliberate manner. Furthermore, especially in today’s digital age, businesses interact through various platforms, which presents several obstacles to consistency and efficiency in communication.

Reputation – an important part of Management

Up to 90% of a company’s market value may come from its reputation. Although a good reputation takes years to build and can be lost in an instant, most companies in Poland only react when a crisis occurs. A strong business reputation leads to superior financial outcomes, client loyalty, and image-building. Reputation is frequently exclusively connected with an organization’s outward appearance, but the image is more about “What do our customers think of us?”. Although superficial, appearance does not accurately represent reputation.

Reputation management has evolved over the years. Today, reputation building is heavily influenced by social media and the internet. For instance, according to research from the Pew Research Center, 91% of individuals trust what they read and see in search results, which is why many companies aim to build a good image in Google’s search results.

The way companies operate can be divided into two types:

Some companies are proactive. In order to improve their image and provide value to their surroundings, they work on image initiatives. They also maintain good communication with the company’s stakeholders and are open to hearing other people’s thoughts. These businesses are frequently quite active on social media, especially professional networks like LinkedIn or Twitter and conventional media. In addition, they take care of their image on the search engine, which is as essential a medium today as Facebook or YouTube. The second category consists of businesses prioritizing protecting their reputations above enhancing them, primarily by keeping an eye on the environment and reducing risks.

A strong reputation means more significant success in the business field and success in achieving goals. Additionally, it translates into stronger client loyalty, dedication, and crisis resilience for the business. Employer image is unquestionably the third factor. After all, we are more likely to submit applications to companies with solid reputations.

Trust is essential to developing an organization’s market position, both from consumers and staff members and partner businesses. It is one of the most critical factors in establishing an organization’s market position, particularly in the era of social media, where one post may define your company’s destiny. According to research presented in ” Managing Your Company’s Most Valuable Asset: Its Reputation,” a company’s reputation is thought to contribute anywhere between 20 and 90% of its market value.

According to the ASAP CARE 24 agency’s report, 23% of internet users interact with brands on social media, and a similar percentage regularly follow brand profiles there. The opinions they discover on these platforms significantly impact consumers’ decisions to purchase products.

However, hackers may quickly access social media platforms and the posted content. It is also harder to respond promptly to hate speech that is not on the record. Therefore, the only things that can prevent a catastrophe are a set strategy and a consistent social media presence. Fake news, however, poses a serious problem since it is so prevalent online.

Such an occurrence has happened recently to many companies after Elon Musk took over Twitter and implemented a paid coveted blue check subscription. As a result, impersonation accounts of well-known people and businesses quickly flooded the platform. Eli Lilly, one of the country’s largest insulin suppliers, was one of the businesses that suffered the most from the increase in fake accounts, with billions of dollars being wiped off its stock due to controversial tweets from impersonation accounts. The Washington Post reported that Eli Lilly saw its stock value fall by more than 4%, or $15 billion, after a fake account using Musk’s verification system tweeted: “We are excited to announce insulin is now free.” The company’s executives had to order a halt to all Twitter ad campaigns. Additionally, they suspended their global corporate accounts’ Twitter publishing schedule.

It is difficult to get out of such situations. Once a fake is released, it is challenging to take it back. That’s why we have to keep in mind that everything we do on the internet is being reflected on society or the social group we are part of and that on the internet, nothing ever disappears completely.


Fombrun, C & van Riel, C 2004, ‘Managing Your Company’s Most Valuable Asset: Its Reputation’

Tagged , , , ,

Black Friday in 2022 becoming fake

Reading Time: 3 minutes

The famous Black Friday sale has already happened on November 25th. This is a tradition that came to Poland along with other European regions around 2013 from the USA, but not all Polish stores act with customers according to the same rules as American ones. Often, the announced discounts are purely symbolic. It is also a popular opinion among customers that stores increase the prices on purpose to then make a “discount” so that they feel they buy products cheaper, though they might be even paying more than could pay before Black Friday.

Moreover, statistics show that sellers do manipulate buyers. According to the research conducted by Deloitte, in 2021, discounts in “800 surveyed Polish stores averaged 3.6%. Almost 57% of the stores did not prepare any special offers for visitors. In rare cases, discounts reached 5%” (Podczas Tegorocznego Black Friday Średnie Obniżki Cen Sięgnęły 3,4 Proc., 2021). Meaning that the screaming all-around SALE and discounts -70% signs are mock. At the same time, an increase in prices for a third of the studied goods was revealed. The largest discount that was recorded was 36%, although the marketing messages were talking about 70% for buyers.

Buyers themselves seem to feel that stores often treat them dishonestly – according to statistics, interest in Black Friday is falling from year to year. According to the Picodi service, in 2021, “31% of Polish residents expressed their desire to participate in the sale, while a year earlier there were 40% who wanted to participate in the sale” (Black Friday (Czarny Piątek) – Picodi Polska, 2022). Therefore, revealing a great deal of interest fall toward the hoax yearly sales.

As mentioned before, it seems like a common practice in retail to raise prices for goods a few days before Black Friday and then “lower” them on the day of discounts. For example, a tech store can raise the price of a fridge from 2 000 zl to 4 000 zl on Tuesday and lower it to PLN 3 000 on Friday. This will provide a banner showing the “Big discount” of 1 000 zl. The Polish authorities, however, promise to take care of this loophole soon. In Europe, there is a special Omnibus directive that obliges sellers to inform about the prices of goods. It was developed to prevent fraud and also to prevent the purchase of customer reviews. And although it has not yet entered into force in Poland, some stores have been adhering to it for a long time now.

When the directive comes into force, according to research by Sebastian Gorski, shop owners who deceive their customers will face a fine of PLN 20,000. Panstwowa Inspekcja Handlowa will monitor compliance with the terms of the directive. If it turns out that the price of a promotional item has been different in the last 30 days, then the store owner will be in trouble (Górski, 2022).

All in all, I recommend that you refrain from impulsive purchases on Black Friday, and before making a decision to buy a product, check whether it is really participating in the promotion. You can use services like, and, which help you get an idea of ​​how the price of a product has formed in recent months.

Comment your thoughts below, share your valuable opinion with others!


Black Friday (Czarny Piątek) 2022 – Picodi Polska. (2022). Inspiracje.

Podczas tegorocznego Black Friday średnie obniżki cen sięgnęły 3,4 proc. (2021, February 9). Deloitte Polska.

Górski, S. (2022, November 25). To ostatni taki Black Friday. Za rok sklepy nie będą mogły ściemniać z promocjami. CHIP – Technologie Mamy We Krwi!

Tagged , , , , ,

AI in cybersecurity

Reading Time: 2 minutes

One of the biggest artificial intelligence trends we’re seeing is the increased use of AI technology for cybersecurity and surveillance.

Many believe that the introduction of artificial intelligence in cybersecurity technology will be a kind of revolution and this will happen much sooner than one might think. In fact, in the future, we are likely to expect only gradual improvements in this area. But even these steps towards absolute autonomy still go far beyond our capabilities in the past.

When looking for new ways to apply machine learning and artificial intelligence in the field of cybersecurity, it is important to outline the range of modern problems in this area. AI technologies can be useful for improving many processes and aspects that we have long taken for granted.

Best Cybersecurity Stocks & Funds of 2022 | The Motley Fool

A significant part of cybersecurity weaknesses is related to the human factor. For example, even with a large IT team, properly configuring a system can be an incredibly difficult task. Computer security is constantly improving, and today this area has become more complex than ever. Adaptive tools can help troubleshoot issues that arise when replacing, modifying, and upgrading network systems.

Manual labor efficiency is another cybersecurity issue. A manual process cannot be replicated exactly the same every time, especially in a dynamic environment such as today’s cybersecurity landscape. Customizing multiple corporate endpoints is one of the most time-consuming tasks. After initially provisioning a device, IT pros often have to go back to the device to fix configurations or update settings that can’t be changed remotely.

It also should not be forgotten that the nature of threats is constantly changing. If people are responsible for responding to them, their speed of action can be slowed down when faced with unexpected problems. A system based on AI and machine learning technologies can work under the same conditions with minimal delay.

Threat response time is one of the most important performance indicators of a cybersecurity service. Attacks are known to move very quickly from exploitation to deployment. In the past, before launching an attack, attackers had to manually check all vulnerabilities and disable security systems and sometimes this process could take weeks.

A person’s reaction may not be fast enough, even if the type of attack is well known. This is why many security teams are more focused on remediating successful attacks than preventing them. Undetected attacks represent a separate danger.

Machine learning technologies are able to extract attack data, group it and prepare it for analysis. They can provide reports to cybersecurity professionals to facilitate data processing and decision making. In addition to reports, this type of security system can also offer recommended actions to limit further damage and prevent further attacks.

Ideally, the role of AI in cybersecurity comes down to interpreting patterns discovered by machine learning algorithms. Of course, modern AI is not yet able to interpret the results as well as a human. This area is actively developing, a search is underway for algorithms similar to human thinking. But the creation of real AI is still far away. Machines have yet to learn how to rethink situations in abstract terms. Their creativity and ability to think critically is far from the popular image of ideal AI.



Another source of stalking?

Reading Time: 3 minutes

PimEyes is a search system that works with images. Any user can upload any photo and the system will find all the photos of a person that have ever been uploaded to the Internet. The user can search for more than just their face all over the web because there is nothing stopping them from looking for someone else.

The company advertises its effectiveness in face recognition on its web page: “In the results, we show not only photos similar to the ones you uploaded to the search bar, but also photos in which you appear on a different background, with other people, or even with a different haircut.” But when you use the service for free, the background of the original photo is blurred and there is no way to go to the site where the photo is posted.

PimEyes is a free service but offers a paid level for deeper face search. Moreover, with a paid subscription to the service the user will have the opportunity to visit the site from where the photo was found. With the unplanned use of the service, there is no such possibility, and moreover, the background of the original photo is blurred.

“PimEyes is not designed to spy on others and is not intended for that purpose,” the statement said. However, a paid subscription to the service allows the user to follow links to any site from which the photo was found, after which, by collecting information related to the images – such as the background of the photo, people nearby, the text of a blog post or a photo on a person’s work site – the stalker can determine where the person in question works or the signs of the area where they live. However, PimEyes says that its data protection department tracks suspicious activity, such as if a male user repeatedly searches for female faces or a user uploads a photo of a child.

But in fact, such a system is unlikely to be able to protect from persecution although many people today upload photos or videos to their own social networks, and thus share information about their personal lives. However, for those people who really do not publish and are opposed to posting personal information on the Internet, this service can be detrimental.

But there is also a useful function for this service, it allows people to opt out of having their image appear in the results. To do this, user should go to the PimEyes website and fill out the opt-out request form.

Facial recognition technology is an innovation whose commercialization is questionable. PimEyes is aware of the contradictory nature of its business – the company claims it does not store data and that all results are generated on publicly available sites. “PimEyes simply provides a tool, and the user is obligated to use it responsibly,” the company writes on its blog.

 What’s more, the company claims there are positive examples of the tool’s use, stating to the BBC that it:

● helps investigative journalists.

● negotiated with law enforcement to help fight crimes against children, human trafficking and terrorism.

● has helped women and girls remove thousands of images related to pornography without their consent.

In sum , this service is quite controversial and requires attention.


Subscription – money magnet

Reading Time: 4 minutes

Today subscription services surround us everywhere. It is difficult to come up with a good or service that you wouldn’t be able to fit into a subscription model. At present, we can subscribe to anything. Among the known examples are – Netflix video streaming, Spotify music, YouTube music, Chewy for pets, PlayStation Plus, Xbox game pass, etc. Some of the largest companies in the tech world have at least one subscription service. And more companies appear whose business is fully based on subscriptions like Netflix. What’s interesting is that today, you are able not only to get the benefits of subscription in the tech world or online but also you could consider subscribing to dietary services that provide you with sets of healthy meals containing certain amounts of calories and nutrients of your choice. The food will be delivered to you regularly and the money taken from your pocket as well. You could subscribe to sausage or cheese services, you could subscribe to deliveries on such planforms as Allegro if you order packages regularly, you could subscribe to various events or business breakfasts that happen regularly, and so on and so forth. Although subscriptions always seem advantageous for the subscribers, not often do people ponder over the question of what makes large companies transfer to, or implement features of this exact business model, it’s got to be beneficial for the organizations as well.

First things first let’s make it clear how subscriptions work. As stated in the Cambridge dictionary a subscription is “an amount of money that you pay regularly to receive a product or service” (Cambridge Dictionary, 2022). Taking into account a well-known example of Netflix. When you subscribe to it you make an agreement with the company that for a given amount of money you paid, you will receive a certain service, in this case, film streaming, for a certain period of time, here it is a minimum of one month. Sometimes you are provided a “free of charge” trial period to check out the service and decide for yourself whether you would like to use it in the future or not. What’s funny though, is that you can only get a free trial under the condition that you provide your bank card information to the service, so that the company at least has a chance of you not remembering or not even knowing that the money will be taken off your card with hardly any warning.

This is a genius way of getting money from people. It looks like a little legal scam. The trick here is that you do not consciously make a purchase every month, no, it could potentially make you think about whether you actually need it. On the contrary, it simply automates the task of taking money off your bank acc. As mentioned before, an especially controversial it is when the company makes you enter your bank account data for a free trial period. Hence, they purposefully want you to forget that you have entered the data and don’t even think about the money no more. You will start using the service and no matter whether you liked it and continue using it or not, they will get the money. And it is also important for them to make the money “you pay” seem insignificant so that you do not start wondering where did your salary go the moment you got it. They want it to be as seamless as possible so that when they gain thousands or millions of subscribers half of which would not even use the service, they will still gain the cash on a regular basis.

But don’t just take my word, check out the research recently conducted by C+R research. Survey has found that nearly half of the population who use subscription services forget that they pay for them, and when it comes to generation Z, the number rises to 55% of forgetful ones. 22% of responders, in turn, claim that they feel overwhelmed by the number of subscriptions they have to deal with (Subscription Service Statistics and Costs, 2022). However, there is a solution. Get a subscription for a mobile app that allows you to keep track of and manage your other subscriptions 😀

Figure 1. C+R research. Most forgotten types of subscriptions. (Subscription Service Statistics and Costs, 2022)

In the figure provided above, we can see that the easiest subscription to forget about is the mobile phone, the internet, tv, and movie streaming. Those are pretty much the ones that become an integral part of our lives, and are relatively inexpensive whatsoever.

Nevertheless, we cannot deny the fact that subscriptions are not pure evil. They are of good use to those who truly take the benefit of them. Those are the people who do interact with the service on an often and regular basis. Say you are a music lover or you make business on buying and selling stuff on Allegro. In these cases, a subscription to Spotify or delivery would make your life simply easier and cheaper. Furthermore, as mentioned in the research from Lin: “Rounding out the top 10 benefits of subscription models for customers are the ability to access a wider range of products and being able to avoid fraud and/or theft” (Lin, n.d.). Meaning that customers find it comfotable and troubleless to use subscriptions. It reduces the number of unnessesary worry/activitires we have in the modern world. That’s why crowd is keen giving up some extra money for a service that even potentially might be useful. It is connected to the feeling of security as well as feeling like the choice is bigger for smaller money, and it is difficult to argue with.

To conclude, what we can do to get the full merit of subscriptions and not suffer from losing our money subconsciously, is to make ourselves aware of the deals we make with organizations. Be cautious whenever we leave our bank account information, and make sure we either use the service we pay for, or we do not pay for the service we do not use.

Hope you found this post interesting. Feel free to share your thoughts on this matter in the comments section below 😉


Cambridge Dictionary. (2022). subscription definition: 1. an amount of money that you pay regularly to receive a product or service: 2. an amount of. . .. Learn more.

Subscription Service Statistics and Costs. (n.d.). C+R Research.

Lin, Y. (n.d.). Top Benefits of a Subscription Model | Oberlo.

Tagged , , , , , , ,

The end of passwords.

Reading Time: 8 minutes

It’s high time that we finally pivot away to other authentication methods rather than using infamously vulnerable alphanumerics to protect our private data.

Passwords And People: Your Secret Weapons Against Cybercriminals

It’s common knowledge that passwords are one of the most widely used authentication methods for protecting our private data, however, it may be a surprise to know how common they actually are. As of April 2022, there were roughly 300 billion passwords in use, which averages to around 38 passwords per person¹. Hence, it is safe to say that passwords have played a major role in the world of cybersecurity. But that needs to change. And I am not the only one who thinks it.

Giant Tech companies, such as Apple and Microsoft, have made plans to make passwords redundant by announcing their intentions earlier this year, ironically on World Password day, to implement new, universal passwordless sign-in methods, such as biometrics including face and fingerprint recognition, across all of their platforms and devices².

Most of us might already be familiar with these types of authentication methods as they are most often used to unlock our android and apple devices, confirm payments, and more.

But why should we change to passwordless authentication methods? What’s wrong with passwords? Read below to find out!

The beginning of passwords.

In 1961, a pioneer in the field of computer science, MIT professor Fernando Corbato, came across a challenge. Back in the 1960s, all professors at the MIT university were using a shared computer system known as the Compatible Time-Sharing System, or CTSS³. Therefore, all of their private files were stored in a single disk which would be accessed through a common mainframe. Worried about the fact that their individual files could be seen and accessed by anyone, Fernando came up with a solution – passwords. He gave each user a password with which they can only access their own files and no one else’s.

As time went on and computers became more accessible, passwords were, and still are, used as the main authentication method to protect private files due to their simplicity, which is now seen as one of its major flaws. Sure, some websites make it mandatory to have an alphanumeric password with special characters but they bring up their own set of problems and there’s only so much you can do to prevent unauthorized access to data through passwords, which brings me to my next point.

What’s wrong with passwords?

Here are the 2 major problems that occur with the use of passwords –

  1. Passwords aren’t User Friendly – As mentioned earlier, an attempt to make passwords more secure by mandating users to include both upper and lower case characters, special characters, and numbers while also requiring a minimum password length, makes it less user-friendly. Here’s why – by making lengthy and complex passwords, not only are they hard to remember but as a result, we often end up saving them on our browsers/password manager (which can be hacked, stolen, and leaked) or end up resetting the password and using the same password across multiple websites…which makes it less secure.
  2. Passwords aren’t Secure – It might be challenging to strike a balance between security and usability because a password that is easy to remember is also insecure, and a password that’s secure is harder to remember. Secure passwords might not be easily guessed compared to insecure passwords, but both types of passwords can be hacked and stolen through, for example, a brute force attack and can further be leaked or sold to third parties. Moreover, passwords can be forgotten which often ends up in resetting the password which can be troublesome if the same forgotten password was used for multiple websites.

Passwordless ways of authentication.

biometrics cybrary

In order to abandon passwords as a form of security and authentication, we need to create and implement/use other methods of securing private data. One of these security methods is already being widely used, most commonly, to unlock devices – Biometrics.


There are two types of biometrics that are often used for authentication – fingerprints and facial recognition. It is said that no two individuals have the same fingerprints, hence, not only does this make this authentication method more secure but it also removes the need to remember complex passwords. Moreover, it’s a faster process and improves user experience by removing the need to remember your fingerprint. Although this security method is much harder to bypass, it is not impossible, as fingerprints can be copied and replicated even though it’s hard to accomplish⁴.

Facial recognition is another biometric authentication method that uses a person’s face to verify his or her identity against already existing facial data. Facial recognition can be used by any device with digital photographic technology. For example, all modern models of iPhones are equipped with a TrueDepth camera system, neural networks, and bionic chips which all work together to project and analyze thousands of invisible dots in order to construct a 3-Dimensional map of your face and take an infrared image of it⁵. Similar to facial recognition, this method is a smooth, quick, and efficient way of authenticating a user and protecting your files. However, like any good authentication method, it has its disadvantages. For example, poor lighting can affect the efficiency of the system and might require multiple attempts to unlock the device/files. The use of facial accessories, such as face masks, scarves, hats, and more, can also lead to multiple unsuccessful attempts, and eventually, the system might ask you to remove them. Nonetheless, fingerprints and facial recognition are definitely a securer and safer way of authentication when compared with passwords.

Passwordless Multi-Factor Authentication

No, I am not referring to the security code or one-time password you get when you finally remember the correct password after multiple failed attempts, only to find out there’s an additional layer that requires you to enter another password, making you more frustrated.

This type of passwordless authentication method depends purely on a second device and eliminates the use of generating another password in the first place, which could’ve been accessed on the same device. It is slightly dependent on the use of biometrics and here’s how. For example, to log into your account, all you have to do is enter your email address and the system will send a push notification to the mobile number that is registered with the email. Unlike a normal 2-Factor Authentication where you are required to enter a password in the first place, and a security code or one-time password is sent to your email address which can be accessed on the same device, this type of authentication method requires you to open the push notification and approve the login attempt through 2 different ways – you will either be asked something in the lines of “We’ve noticed a login attempt from ABC device. Is this you?” and you’re required to choose yes or no. The second way is that the notification will contain 3 different numbers and you have to select the number that matches the number that is displayed on the device you are trying to log in to.

The push notification itself requires you to unlock the phone in the first place using biometric authentication, hence, it adds an extra layer of security. Furthermore, hackers or other third-party users who want to gain access to your account will find themselves in a difficult situation as they would need access to your phone and you⁶.

The only disadvantage this possibly portrays is that it is more time-consuming when compared to simply entering a password or using biometrics. Other than that, it is still considered to be safer and more securer than passwords.

The challenges of going passwordless.

One of the major challenges of using passwordless authentication is that it requires you to first create an account with a password before having the option to choose the passwordless authentication method. Another problem is that passwordless authentication will not be possible on legacy and older systems as they simply lack the technology to do so. Hence, if a company wishes to switch to passwordless authentication, replacing these legacy systems will become a necessity and would cost tens of thousands of dollars to do so.

Furthermore, there are legal and ethical concerns⁷ with the use of biometrics as a method of authentication as companies may not secure their employee’s biometric data or users might be suspicious of the software used to recognize their biometrics as, for example, the camera might never have been turned off after recognizing their face, which is a breach of privacy as the company might be using the camera to surveil or spy on them and can also be selling the data to third parties which can lead to even bigger problems such as identity theft and fraud.


There is no doubt that going passwordless would be a safer and smarter authentication method, especially as it guarantees a frictionless user experience and removes the threats of all password-based attacks as attackers wouldn’t be able to use passwords to log in simply because they won’t exist. This includes the two most dangerous attacks – Phishing and Brute Force attacks. Brute Force attacks would not work as there would be nothing to steal and Phishers wouldn’t be able to steal login credentials as they simply would not exist.

For those of you who are determined to use passwords, and we might be stuck with them for a while, I recommend using a password manager as they offer strong encryption and act as a place to keep all of your passwords in without having the need to memorize them. They also hold features such as generating and changing passwords in one click, and more. Even though they offer their own challenges, such as once hacked, all of your sensitive data will be vulnerable or your passwords might be being sold to third parties by the password managing companies themselves without consent, it is the best option for those who use and will continue to use passwords. But not all of us will be able to afford or want to pay for it.

With developments in technology and cyberattacks following suit, it is necessary that the required changes are made in relation to cybersecurity and that includes the end of passwords. It will undoubtedly take a while for websites and businesses to change from passwords to passwordless authentication methods but that time isn’t as far off as you might think…

Some facts and figures

Here are some facts and figures to help you decide whether you should go passwordless. What do you think? –

  • 90% of internet users fear that their passwords might be stolen¹.
  • More than 23 million people use “123456” (one of the most common passwords) as their password to protect their data¹.
  • 78% of Generation Z have been found using the same password across multiple accounts and websites⁸.
  • 73% of internet users believe that forgetting passwords is the most frustrating element of security⁸.
  • 69.7% of internet users fail to update their passwords once a year⁸.
  • 53% of internet users use only their memory to store and retrieve passwords⁸.
  • Only 35% of Americans trust password managers¹.
  • Every minute, 5-6 businesses become a victim of ransomware¹.


¹Krstic, Branko. “Impressive Password Statistics to Know in 2022.” WebTribunal, 6 Apr. 2022, Accessed 02 Nov. 2022.

²Bateman, Tom. “Big Tech Plans to Kill off Passwords Altogether. What next?”, 5 May 2022, Accessed 02 Nov. 2022.

³Holt, Rene. “A Short History of the Computer Password.” WeLiveSecurity, 4 May 2017, Accessed 03. Nov. 2022.

⁴Jirik, Pavel. “5 Popular Types of Biometric Authentication: Pros and Cons.” PHONEXIA Speech Technologies, 9 Sept. 2021, Accessed 04 Nov. 2022.

⁵Tillman, Maggie. “What Is Apple Face ID and How Does It Work?” Pocket-Lint, 4 Mar. 2022, Accessed 04 Nov. 2022.

⁶Groeneveld, Rachid. “The Password Problem.” Nomios, 7 July 2021, Acessed 04 Nov. 2022.

⁷Fernandez, Ray. “The Challenges Facing the Passwordless Future.” ESecurityPlanet, 25 Sept. 2022, Accessed 04 Nov. 2022.

⁸Vojinovic, Ivana. “Save Your Data with These Empowering Password Statistics.” DataProt, 2 Nov. 2022, Accessed 05 Nov. 2022.

Honan, Mat. “The End of Passwords.” MIT Technology Review, 23 Feb. 2022, Accessed 03 Nov. 2022.

Kinzer, Kelsey. “The Benefits and Challenges of Passwordless Authentication.” JumpCloud, 12 Jan. 2022, Accessed 05 Nov. 2022.

Berhanu, Manny. “The Beginning of the End for Passwords.” FutureBusiness, 10 June 2022, Accessed 03 Nov. 2022.

Rob. “The End of Passwords? Why the World Is Moving Away from This Traditional Method.” ROWND, 27 June 2022, Accessed 05 Nov. 2022.

Tagged , ,

Are cyber crimes funding missile programs in North Korea?

Reading Time: 3 minutes

Since 2006, North Korea is struggling with sanctions. It was imposed shortly after NK’s first nuclear test. With every nuclear test and explosion, United Nations Security Council has been strengthening sanctions, banning new export and import products. The newest sanctions, banning North Korea from exporting their most profitable products, is estimated to take $1 billion from their annual trade of $3 billion. In order to compensate the loss, North Korea engages in various cyber crimes, violating international law. North Korea operations are thought to have generated over $2 billion, balancing their economical damage.

Cyber crimes are low cost, easily performed and hard to trace. Reward for good execution is also very attractive to North Korea. Behind those attacks stands the Reconnaissance General Bureau – top North Korean military intelligence agency. The Bureau targets mainly financial institutions and cryptocurrency exchanges to generate income. Targeting cryptocurrencies in their attacks make it a lot harder to trace than a regular banking sector. 2019 United Nations report stated that money from North Korea cyber crimes are raised for its WMD (weapons of mass destruction) programs. Anne Neuberger, US deputy national security adviser for cyber security, confirmed that information and provided additional numbers about North Korea funding „North Korea uses cyber to gain, we estimate, up to a third of their funds for their missile program”. North Korea is now treated as one of the world’s four principal nation state-based cyber threats, alongside China, Russia, and Iran. Thing also worth mentioning is that, because of the UN sanction North Korea is unable to export coal, they found a pretty good use for it. It uses the excessive coal to power its own crypto-mining plants to accumulate even more digital currencies, says Harvard University’s researchers.

Lazarus Group

It is a North Korean state-sponsored cybercrime group, attributed to the Reconnaissance general Bureau. The group has been active since at least 2009 and is responsible for numerous cyberattacks around the world. Multinational cybersecurity provider, Kaspersky Lab reported in 2017 that Lazarus have a sub-group called Bluenoroff which performs financial cyberattacks. Kaspersky found a direct connection between Bluenoroff and North Korea. According to a 2020 report by the U.S. Army Bluenoroff has about 1700 members. The group target is mainly financial institutions and cryptocurrency exchanges. The revenue most likely go towards development of missile and nuclear tech.

Lazarus Group has been responsible for many cyberattacks against at least 17 countries. Examples:
  • The Sony Pictures studio hack in 2014. Sony Pictures released a comedy The Interview about a fictional assassination attempt on Kim Jong Un. Attack resulted in leaking unreleased movies and thousands of private documents. Lazarus Group was also responsible for this attack.
  • Theft of $951 million from the Central Bank of Bangladesh in 2016 via a hack of SWIFT banking system. Analysts cite that this heist is a great example of how time consuming it is to target traditional banking. Lazarus Group broke into the bank’s computer lurked inside a system for a year before executing the attack. 
  • In 2017 the Lazarus Group unleashed WannaCry ransomware, which infected at lease 200k computers in 150 countries. It infected computers at hospitals, oil companies, banks and many other organizations around the world.
  • According to Chainalysis the Lazarus group have stolen more than $1.75 billion worth of cryptocurrency. They attacked exchange KuCoin and stole $275 million worth of cryptocurrency, which is a third-largest crypto theft of all time.
  • In 2018 Recorded Future report linked the Lazarus Group to attacks on Bitcoin and Monero. To perform this attack the group used phishing to steal users credentials from various crypto exchanges and then take the currency from the account.

Future risks

There are more and more decentralized exchanges on the market, and launch of new cryptocurrencies such as monero, are obviously make it a lot harder for law enforcement to track. Moreover, some analysts predict that more goods and services will be purchasable using crypto. It would allow North Korea to avoid sanctions on importing some products. Rohan Massey, partner at US law firm Ropes and Gray says „you could already use crypto to buy missile parts on the dark web years ago – so imagine what you could buy a few years from now.” This quote shows that even with ongoing sanctions on North Korea, it can bypass them easily with crypto which now they even mine themselves.


Justin Trudeau’s plan to control the media in Canada

Reading Time: 2 minutes

On November 18, 2018, Canadian prime minister Justin Trudeau planned “An act to amend the broadcasting act and to make consequential amendments to other acts” this means the Canadian government would control all media. But because of Covid-19, this was moved to another date. On June 2022, Bill C-11 went true in the Canadian parliament and became law in Canada.

Bill c-11 will let CRTC(Canadian radio-television and Telecommunications Commission) controls the media posted in all of Canada. The point of this is to have cleaner content on the Canadian internet. C-11 is all about controlling what is posted, Anything that has to do with Youtube, Tiktok, Spotify, and more media that can influence people. The idea of this is for people to have more Canadian content from media outside of the TV. As more people don’t watch TV news at home and rely on gathering media from other sources the Canadian government wants to regulate people that upload would have to include some Canadian content/information. Anything to do with racism or feminism would be blocked from being posted or listened to. CRTC also has the power to impose a financial penalty for people and businesses that would post something that is against the law in Canada. Many YouTubers made videos that this law made them have to move out of the country to continue their channels most of them say “that it is not fair that they have to implement something that they don’t believe is right”.

 Is this something we should implement everywhere in the world to have better, cleaner content for people? Can you agree with this new law that has been forced in Canada on the people because of safety? 

I see this as another method of control over people. I don’t see how there is any more freedom in Canada after this law. Where the freedom of speech that Canada and America were known as. (Not going to include America in this because they’re not part of this law) but why is Canada not letting people be able to show and say their beliefs? We all know the problems we have today,  but not letting people say what they will let you say is the answer to the elimination of our society’s problems? What if this would be used to least say change your mind about someone? Or give you fake news? All of their types of control for  “our safety” never work. why would this?


The datafication of our world

Reading Time: 2 minutes

Data has become the central focus of our time. Everything around us can now be measured, recorded, and analysed thanks to modern technology. Additionally, it creates a whole new universe of opportunities for businesses to take advantage of. Datafication is the most recent in a line of customer-focused, data-driven business intelligence techniques that are currently reshaping the entire business environment.

For many years, the only tech titan in the top ten list of most valuable firms was Microsoft; today, Apple, Google, and Amazon share the honor. Why then are technology businesses outperforming the rest of the economy by such a wide margin? The solution is data. The new infrastructure and the new promised land are data. History demonstrates that data is simply doing what computing, steam, and electricity did before it—it is fostering innovation, scientific discoveries, and improvements to our world.

The widespread and integrated use of computer, telecom, and chip technology in most facets of our societies and daily lives has resulted in this phenomenon. Local governments have already begun to digitize, and Smart Cities are quickly gaining favor. This smart revolution in cities has great promise for tackling even the most difficult issues.

It is time for the e-government community, which consists of government employees, academia, and business, to change the focus from digitalization present to datafication future. In this approach, governments can ensure that the increasingly digital society is a better place for everyone by preparing for their new position in it.

We are in extraordinary times. Computers and widespread Internet connectivity transformed how we live today as the industrial age came to an end. Almost everyone creates data on a computer that is connected to the Internet. Additionally, the number of data-generating gadgets is always increasing.

The biggest winners in this situation are businesses, but in some areas, the government also benefits from ongoing surveillance. If the data itself isn’t the issue, we should always consider whether datafication may be made even more considerate of specific consumers. Although the idea of datafication may terrify some of us, properly handled datasets (by legal requirements, security precautions, and work ethics) could usher in a new era of less intrusive advertising and more customer-friendly services across a wider range of industries, as each experience could be enhanced thanks to the thousands of records amassed (as opposed to decades on the market). And in which brand name and size will no longer be important considerations when picking a supplier.

Check your databases right away if you don’t want to get left behind when the datafication comes.


Tagged ,