{"id":196308,"date":"2017-06-03T12:20:34","date_gmt":"2017-06-03T16:20:34","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/addiction-to-technology-can-lead-to-greater-security-risks-tnw\/"},"modified":"2017-06-03T12:20:34","modified_gmt":"2017-06-03T16:20:34","slug":"addiction-to-technology-can-lead-to-greater-security-risks-tnw","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/technology\/addiction-to-technology-can-lead-to-greater-security-risks-tnw\/","title":{"rendered":"Addiction to technology can lead to greater security risks &#8211; TNW"},"content":{"rendered":"<p><p>    Technology addiction has become rampant in recent times, thanks    to the explosive evolvement of technological devices and the    ease of use associated with it. Researchers define it as an    uncontrollable urge to use different technological devices    ranging from smart phones, social media, personal computers and    gaming rigs.  <\/p>\n<p>    Its more prevalent among teenagers who shy away from    social interaction in reality and find a peaceful abode in a    welcoming technological world, where theres a meager chance of    social contact. All in all, its an easy way for them to    fulfill their social needs without havingto leave the    comfort of their couch. According to researchers, technology    abusers are more likely to have underlying health    concerns such as depression and anxiety, and    often possess impulsive    behavior.The Dark    abyss of Smartphones  <\/p>\n<p>    Lets dig deep and take an example of smartphones. Gone    are the days when the brick shaped mobile phones with features    like inbuilt games, ringtone maker and sms were considered a    technology straight from the heavens. But, with the    unimaginable features they have to offer, smartphones have now    become our digital companions (replacing humans) without whom    we cant paint our everyday life.  <\/p>\n<p>    However, the picture is not as glittery as it seems. With    the increased usage, security stakes have increased, with every    other day plagued by the news of a new hack attempt    on Smartphone users. The biggest threat to    Smartphone users comes from the third-party apps. These apps    are considered notorious for leaking personal information    including usage trends, web history, personal pictures and    chat-logs which is then used for numerous purposes including    unwanted advertisements based on personal buying habits and    even blackmailing by unscrupulous elements.  <\/p>\n<p>    Furthermore, smartphones might also cause a disastrous    data leak if you tend to engage in a lot of activity at the    same time. It might happen if you copy something very    important from your work related email in your clipboard and    then subsequently post it unwittingly as a social media public    post or in someones WhatsApp message. This    scenario, if unfolds, might leak important information related    to the company which may scarily end up in the hands of    competitors or some hacker.  <\/p>\n<p>    Even Twitters own CFO    once posted a confidential message via a    public Tweet, even though the message was intended to be sent    as a Direct Message. These scenarios emanate from the fact that    majority of smartphone users have abandoned text messages in    favor of messaging apps.  <\/p>\n<p>    The mother of all addictions, social    media  <\/p>\n<p>    Similarly, social media addiction is attributed to social    network companies and social content creators working hard to    make their social media platforms irresistible with new    features launched every other day. Theres a concept called    FOMO  fear of missing out associated with the    addiction to social media and this involves urge to know    everything thats going on around us and to be a part of these    happenings.  <\/p>\n<p>    The main tool used by the social media giants like    Facebook, Google+ and, Twitter is algorithmic filtering. This    involves tweaking algorithms on daily basis and then monitoring    the response of users to see if the tweak has increased their    engagement. Now, how does it feel like being a lab rat in a    giant, global experimental lab?  <\/p>\n<p>    These experiments might prove profitable for social media    companies but not us. Think of the last time where you posted a    social media story from your home or office, or shared an    important life event via Facebook or Twitter. Incredulously, a    harmless or useless looking post might give enough    information to an outsider which might come    handy in wrecking havoc to your life. Similarly, employees    have, over the time, used social media to connect their    companies to the outside world. Be it an important company    event, a job posting or a promotion.  <\/p>\n<p>    But, little do they know that they are sharing too much    information impulsively via a single post. A geeky cyber    criminal might paint a complete picture of that employee    through social media activities and may deliver a spear    phishing email through the very same contact details provided    to send in resumes for the job post by that employee. Count the    odds if a hacker sends you an email titled How you can save up    $200 on a single flight at the same time when you are planning    for a vacation because he already knew your plans through the    Facebook postyou published only moments ago.  <\/p>\n<p>    Interactive world of online gaming  <\/p>\n<p>    The love of online gaming is deep rooted in our younger    generations. Generation Z has the perks of interacting over    their favorite games and talk to the people they dont know at    all. This comes with the increased risks, especially viruses,    identity theft, and phishing attacks.  <\/p>\n<p>    With the need of creating heavily decorated profiles on    gaming platforms, it has become quite easy for hackers to gain    access to your personal details and credit    card information. The most worrying aspect is the use of    parents credit cards by their kids which means hackers and    cyber criminals have access to a large sum of money.  <\/p>\n<p>    In addition, gamers might get hooked to social    engineering scams where a completely unknown person sends them    a friend request and trick them into sending vital information    such as virtual goods, account details or credit card    numbers.  <\/p>\n<p>    What can be done to avoid this?  <\/p>\n<p>    As simple as it sounds, the most important instrument we    have to dodge tech espionage is our brain coupled with our    greatest tool, common sense. While we tend to skim a lot of    information over the internet but sometimes, its necessary to    grasp a little more knowledge which might come handy.  <\/p>\n<p>    Whatever you do with the use of technology, if you have    the negative consequences in mind, you would think thrice    before jumping into the bandwagon of sharing spree.  <\/p>\n<p>    Read next:     How artificial intelligence optimizes recruitment  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/thenextweb.com\/contributors\/2017\/06\/03\/addiction-technology-can-lead-greater-security-risks\/\" title=\"Addiction to technology can lead to greater security risks - TNW\">Addiction to technology can lead to greater security risks - TNW<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Technology addiction has become rampant in recent times, thanks to the explosive evolvement of technological devices and the ease of use associated with it. Researchers define it as an uncontrollable urge to use different technological devices ranging from smart phones, social media, personal computers and gaming rigs. Its more prevalent among teenagers who shy away from social interaction in reality and find a peaceful abode in a welcoming technological world, where theres a meager chance of social contact <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/technology\/addiction-to-technology-can-lead-to-greater-security-risks-tnw\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187726],"tags":[],"class_list":["post-196308","post","type-post","status-publish","format-standard","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/196308"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=196308"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/196308\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=196308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=196308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=196308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}