…Large coffee in one hand, laptop teetering precariously on the other, you turn the corner and – WHAM! Threats to your data are around many corners. Here are the most common causes of data loss to watch out for.
A duo of artists known as KairUs curious about private data breaches and e-waste created an exhibition of artworks entitled “Forensic Fantasies”. Highlighting some key issues and effects related to e-waste dumps in places like Ghana, a topic we’ve covered before, they look at some interesting intersections of technology, the environment, and society.
This time last year we were all anxiously biting our nails over the impending threat of the WannaCry cyberattack, which affected over 300,000 computers worldwide. Even though the ransomware attack was resolved in a matter of days, it swiftly incurred billions of dollars in damages. The reality is, it hasn’t been too long since this major attack, and threats to your own cybersecurity measures are as prevalent now as they were then. It’s important to take precautions when it comes to protecting confidential corporate information, but just what do those precautions entail?
A humorous post about repairs from popular webcomic xkcd.
Reduce, Reuse, Recycle, Recover, Repeat.
As we look back on a month full of earth appreciation, common themes of recycling and waste prevention efforts prevail. A topic that experiences significantly less exposure during these conversations is the topic of e-waste recycling.
Submitted for your approval, one enthusiastic amateur. Put on earth with a screwdriver, a broken drive, and wholly too much time on his hands. In a moment, we will be shown a miracle brought by magical DVD lasers. Although it’s a fact that he should have trusted the professionals, he will tempt fate by converting a 500Gb hard drive to a 1Gb Linux boot CD, in… The Recovery Zone.