Tiaan van Schalkwyk

38 Flips | 5 Magazines | 24 Followers | @TiaanvanSch6f7p | Keep up with Tiaan van Schalkwyk on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Tiaan van Schalkwyk”

Living Off Hackathons: The Possible Rise Of The Pro-Hacker

Simon Lightstone Contributor<p>Simon Lightstone is on IBM's DB2 team, LifeHack author, programmer and former startup guy.<p>Hackathon prize money keeps rising each year as organizations learn to take advantage of their value. Runner-up cash prizes are now in the thousands, and grand-prize payouts are as …

EU's highest court rules for student in Facebook data privacy case

LUXEMBOURG — The European Union's highest court ruled Tuesday in favor of an Austrian law student who claims a trans-Atlantic data protection …

Microsoft's Windows 10 privacy headache extends into gaming

Is Windows 10 going to disable pirated games? Probably not<p>Windows 10 launched nearly three weeks ago, and while millions of people are upgrading there have been a number of privacy concerns around the new OS. Default settings send information to Microsoft, enable bandwidth sharing to distribute …

BlackBerry acquires AtHoc to help improve crisis communications in companies

BlackBerry has announced that it’s acquiring AtHoc, a Calif-based company that develops emergency alert systems for government agencies, military bodies, and other organizations.<p>The AtHoc software is designed to enable the exchange of “critical information in real-time during business continuity …

Hacking attack grounds planes at Polish airport

More than 1,400 passengers delayed after computers at Chopin Airport in Warsaw targeted by hackers<p>Around 1,400 passengers of the Polish airline LOT were grounded at Warsaw's Chopin airport on Sunday after hackers attacked the airline ground computer systems used to issue flight plans, the company …

Warsaw

Achieving Anonymity Online Remains Difficult Despite Evolving Privacy Tools

<b>Editor’s note:</b> <i>Tomás Touceda is a privacy officer at SpiderOak, a privacy cloud technologies provider.</i><p>Some things are best kept secret. But when it comes to your online activities, can you ever truly conceal your identity? A variety of tools and best practices can help you achieve some level of …

4 ‘cyberhealth’ strategies for boards

Cybersecurity made it onto the list of the top five concerns of U.S. electric utilities this year, according to a new Black & Veatch survey. And less than a third of respondents said they’re equipped to handle an attack.<p>And it’s not just energy companies that are worried. Boards of hundreds of …

Report: Most NSA-Intercepted Data From 'Ordinary Internet Users'

A <i>Washington Post</i> analysis of data provided by Edward Snowden has revealed that nine out of 10 communications intercepted by the National Security Agency were from ordinary Internet users, not legally targeted foreigners. But the examination also showed that officials gleaned valuable intelligence …

Hey Nielsen: If TV audience measurement ain't broke, don't 'fix' it

Don’t you hate watching someone work on a ‘solution’ to fix a problem that has already been solved? This is what’s currently happening in the digital media space for television with audience measurement and tracking.<p>Even though today’s TV everywhere deployments seem fresh and new, the reality is …

Startup Marketing And How Emotion Drives Customer Action

<b>Editor’s note:</b> <i>Kobie Fuller is a principal at Accel Partners.</i><p>Put down the calculator and ignore the data for a second. Contrary to popular belief, startup marketing is not all about quantitative metrics and growth hacking. It’s time to start mapping out what creates a connection between you and your …

Tesla to allow iPhone to start Model S without key/fobs with v6.0 update

Tesla Motors, known for changing the automobile industry with its innovative electric cars, will update its Model S firmware in the coming months to allow owners to start and drive the Model S with only an iPhone. While it isn’t yet exactly certain how this will work, there is speculation that it …

Every Leader Must Delegate Well: 4 Tips to Become Effective

I've observed time and time again that so many new (and some not so new) managers struggle with delegating. They've never been taught that it means more than giving your subordinates "stuff off your to do list."<p>I hope you'll read and take action on the tips here, because if you're in management and …

Hackers Find a New Way Into Your Home

Smart TVs are one of the newest device categories to gain mass adoption. Yet their adoption could cause more harm than it's worth—for Europeans, at …

How to Create a Company of Thought Leaders

Every employee is a potential thought leader.<p>Your team is made up of individuals who, collectively, create an ecosystem of interconnected ideas, perspective, and insight. Leverage that ecosystem, and you’ll be running a company full of thought leaders. Just imagine the impact on your brand.<p>Despite …

Military's 'Plan X' would put cyberweapons into the hands of soldiers

A soldier's natural home is on the battlefield. So what happens when to infantry when conflicts move online? It turns out that DARPA, America's mad science division, has a solution called "Plan X." The project is designed to make cyber-weapons as easy to use as a pistol, but also to use technology …

Tesla car doors can be hacked

Hackers can unlock a high-tech Tesla car door by using the same run-of-the-mill techniques they use to crack open computers.<p>That's according to security researcher Nitesh Dhanjani, who spoke about his findings at a recent hacker conference in Singapore. All it takes is cracking a six-character …

Utilities hack may affect your power - CNN Video

How the rich protect their online identity

You can't always control what's said about you on the Internet. But with enough money, you can influence what comes up in a search.<p>A few companies promise to control your message online, or eliminate a bit of scandal or bad press — for a price.<p>"We can remove something that shouldn't be there," said …

Google fielding 'take-down requests' after privacy ruling

Google is already receiving demands from people to remove links from its search results just days after Europe's highest court said people worried about their privacy have the "right to be forgotten" on the Internet.<p>The European Court of Justice on Tuesday found Google and other search engines …

What were China's hacker spies after?

Blueprints to nuclear power plants. Business plans at a solar energy company. Key computers at steel manufacturers.<p>That's what Chinese hackers were looking for, according to federal prosecutors who have charged members of the Chinese military with cyber theft and more.<p>The 31-count indictment, …

Inside FBI's massive cybercrime bust

Computer hacker forums lit up last week as Federal Bureau of Investigation agents and police in 17 countries began knocking on doors, seizing computers and making arrests.<p>On the popular websites where cyber criminals buy and sell software kits and help each other solve problems, hackers issued …

Half of American adults hacked this year

Hackers have exposed the personal information of 110 million Americans -- roughly half of the nation's adults -- in the last 12 months alone.<p>That massive number, tallied for CNNMoney by Ponemon Institute researchers, is made even more mind-boggling by the amount of hacked accounts: up to 432 …

Your car is a giant computer - and it can be hacked

Imagine driving down the highway at 70 miles per hour, when suddenly the wheel turns hard right. You crash. And it was because someone hacked your car.<p>It's not far-fetched science fiction. It's the near-term future today's hackers are warning about.<p>Most people aren't aware their cars are already …

Hackers can 'un-brick' stolen iPhones

Two hackers have figured out a way to unlock lost Apple devices -- a boon for criminals with stolen iPhones and iPads.<p>The hackers have discovered a method for bypassing a protective feature on Apple (AAPL) devices. Lost your iPhone? No worries. Something called "Activation Lock" turns it into a …

U.S. takes out computer malware that stole millions

U.S. authorities said Monday they have disrupted two sophisticated types of computer malware used to steal millions of dollars from people all over the world.<p>The Gameover Zeus botnet, a network of virus-infected computers, targeted thousands of small businesses. And Cryptolocker, a software that …

Google testing super-secure email

Google is working on the ultimate security and privacy feature.<p>It's called "End-to-End" encryption, and it's the best way to stop anyone from snooping on your emails. Google would turn your emails into jumbled code, and the only person who can see the email in plain text is the trusted person on …

6 countries routinely snoop on Vodafone calls

Law enforcement agencies in six countries have direct access to Vodafone's network, allowing them to monitor phone calls and messages without the carrier's knowledge, the company said Friday.<p>The British telecom firm said it couldn't name the countries for legal reasons, and for fear of retaliation …

How the NSA can 'turn on' your phone remotely

Even if you power off your cell phone, the U.S. government can turn it back on.<p>That's what ex-spy Edward Snowden revealed in last week's interview with NBC's Brian Williams. It sounds like sorcery. Can someone truly bring your phone back to life without touching it?<p>No. But government spies can get …

Second Chinese military unit linked to hacking

Security researchers have accused a second Chinese military unit of carrying out cyber espionage attacks against foreign corporations.<p>CrowdStrike, a U.S security firm, detailed the allegations in a lengthy report on a People's Liberation Army unit operating in Shanghai.<p>The report comes just weeks …

Talking cars: the next hacking target

In the near future, your car will be equipped with life-saving computer software that can prevent accidents. But that technology also creates a major opening for cyber terrorists.<p>The U.S. government in the next decade will require vehicle-to-vehicle communication, or V2V. Cars will coordinate by …