When throwing tantrums kids should be given time to calm down on their own rather than distracted with smartphones and tablets. It might be tempting to hand over an iPad to a screaming child when all else has failed to calm them down.
But child psychologists say it may be stunting youngsters' emotional development, because they do not learn how to control their emotions. Researchers found that children need to find ways of self-regulating their feelings rather than masking them with distracting programmes or games. It has been noticed that increased television time decreases a child's development of social skills and language.
Read moreThe British army is going to create Facebook warriors, good at psychological operations and use of social media to engage in unconventional warfare in the information age. The brigade will be responsible for what is described as non-lethal warfare. Both the Israeli and the army of the USA already engage heavily in psychological operations.
The force will attempt to control the narrative. The army will include reservists and regulars. Soldiers with journalism skills and familiarity with social media are among those being sought. The move is partly a result of experience in counter-insurgency operations in Afghanistan.
Read moreJournalists, PR folk, and anyone else who needs accurate copies of calls over the phone or Skype should check out a new Bluetooth headset. Nowadays there are plenty of headsets out there that give you a comfortable fit or decent sound quality compared to the earbuds that come with our phones, the Bluewire actually can even record conversations.
You don’t even have to make your calls and communicate over the headset. As long as it’s paired to your smartphone, it will record both sides of a conversation, even if it takes place over a different headset you find more comfortable or your in-car audio system.
Read morePeter Diamandis has taken the interview that he is most excited about with his good friend Ray Kurzweil for his new book, called BOLD. In short, Ray’s very clever and his predictions are mind-boggling, amazing and remind us that now we are living in the most exciting time in human history.
This article looks at his very incredible predictions for the next 25 years. If you are an entrepreneur, you need to be thinking about these. Specifically, how are you going to capitalize on them when they happen? How will they affect your business in the sphere of information security?
Read moreHackers are opening new horizons: having learnt how to break into Apple Inc.’s iPhones they may target smart televisions next. In the future, hackers will be able to interfere with smart TVs – the latest generation of TVs that are connected to the Internet – and require users to send a paid text message to get them unlocked.
Criminals may also seek to steal money from online movie accounts or use the TV’s camera to record what users are doing, he said. Hackers are boosting attacks on targets ranging from corporate computer networks to individual smartphones for data that could help steal money from user accounts.
Read moreExperts disclosed a widespread level of employee indifference towards protecting sensitive corporate data, including personal information of customers. In fact, an alarming number of employees surveyed admitted they would sell their passwords, some for little money.
These statistics are based on a global survey of employees at large organizations. In addition to blatant sabotage, the survey also confirmed that employees are lax about password management in general. Specifically, employees routinely share login information for corporate applications with their colleagues, so it increases the potential that the passwords they sell might not even be their own.
Read moreBill Gates is a well-known person who has put his money where his mouth is when it comes to saving the world. It would seem that this makes his opinions worth considering when he tells us that he scares that artificial intelligence could be a threat to humanity.
Gates stressed the concerns expressed over the past year by Musk, Hawking and others that something vaguely resembling the science fiction scenarios from the Terminator and Matrix franchises could come to pass if the potential of artificial intelligence is not taken seriously. Personal interests aside, Musk and Gates could just be right about the threat posed by artificial superintelligence.
Read moreBritish and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.
Programmers frequently embed code from a handful of such companies into their smartphone apps because it helps them answer a variety of questions: How often does a particular user open the app, and at what time of day? Where does the user live? Where does the user work? Where is the user right now? What’s the phone’s unique identifier?
Read moreNot long ago, Twitter was a novelty social media site that average users thought was silly. Now the microblogging tool is a vital news source and publishing platform, letting anyone share information and opinions from almost anywhere. Almost everyone is on it now, from your favorite celebrity to your parents.
But as is the case with every emergent trend on the Internet, Twitter is also populated by scammers and so-called ‘trolls,’ people who harass and provoke others with posts that range from the annoying to the profane. And what’s more, that security risk is essentially built into Twitter — its public-facing nature allows anyone to follow or mention anyone else.
Read moreGoogle and Core Security are at odds over the severity of a vulnerability affecting a number of Android mobile devices, details of which were released by the security vendor today.
The issue was reported to the Android security team and in subsequent communication between the two parties, the severity of the vulnerability was debated, culminating with Core’s disclosure. Google three times acknowledged Core’s report and request for a timeline on a patch, and each time Google said it did not have one. The flaw is a remotely exploitable denial-of-service vulnerability in Wi-Fi-Direct, a standard that allows wireless devices to connect directly.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland