![]() Much verbal abuse was associated with drunken perpetrators, which frequently occurred on public transport. While the violent Melbourne attacks were seen as putting the issue of international student safety on the policy agendas of organisations and government, non-violent crime is more prevalent. Despite these high-profile Melbourne attacks, international students in the Australian city of Sydney more frequently reported feeling unsafe. highly publicised street attacks against Indian students in the western suburbs of Melbourne. The 200 interviews forming the database for the Australian study were conducted before the. A small number indicated that they had been subject to forms of hate crime including verbal abuse or had heard about thefts and assaults, but felt safe nonetheless. In a large Australian study, most international students (84 per cent) indicated unreservedly that they felt safe (Marginson et al., 2010). Using Juice jacking mechanism the hackers have found a new way to compromise the equipment and steal the data only to provide the access back to the original owner for a hefty price. This article focuses on a similar equipment breach which uses USB (Universal Serial Bus) ports meant for to be used by passengers while in public transport places using which they can electrically charge their mobile phones, laptops, iPod and other portable devices. Whether to benefit from the data or not, the hackers never leave any loophole of the systems which are a result of never thought innovation in the space of security breaches termed as "hacking". The more the technology is used by people, the more the data is generated and the more the data is generated, the more the insights one can get and that's what the curiosity behind the hackers getting too interested in getting hands on both the personal and commercial data where data is the new oil of 21 st century and beyond. ![]() When we say digital security, everything in the virtual world of information the "data" technology counts which includes complex industrial systems, mobile systems, handheld devices, entertainment systems, design and governance systems and so on the list never ends. Hackers have evolved from ground zero and are growing hard and tough on digital security inch-by-inch every day.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |