We love the Internet of Things, but there’s a catch
The Internet of Things has changed our personal environment, giving everyday objects the ability to transmit and receive data, and also creating new vulnerabilities to our privacy, children, and even our own safety. In 2014, a study conducted by researchers at HP Fortify found that there were at least 25 vulnerabilities per device. These devices ranged from webcams, sprinkler controllers, home alarm systems, to even remote power outlets.
Daniel Miessler who led the study said, “When you think about what all is involved in an Internet of Things device, you’ve got the device itself, network access, authentication, the Internet component; and all these pieces together are what stack up to be the Internet of Things device. If you’re not looking at the big picture, you’re missing a lot of stuff.”
Between the years 2013 and 2015, the nation had its first large scale “Internet of Things” cyber-attack, and hackers were able to send 750,000 phishing/spam emails from refrigerators. Samsung Fridges were the most vulnerable to being attacked from their own software’s lack of security, and hackers took advantage of this vulnerability when they used back doors to send your information like passwords, and data about your buying habits without verifying the SSL certificate, which means that your fridge doesn’t know who it’s talking to.
Either it is your worst enemy or best friend; your fridge doesn’t care, and it wasn’t made to keep your information secure, just to keep your food cold.
Refrigerators, fitness trackers, and baby monitors
Buying a GPS-connected running shirt might seem like a great idea, but did you know that hackers can actually use that information to find out when you’re not going to be home?
One horrifying fact is that connected baby monitors are not safe from attack either. It has been reported that it is ridiculously easy for a novice to hack into the browser of your baby monitor by using brute force attacks on IP addresses, found on sites like Shodan. Your baby’s video and audio can be intercepted easily and a novice hacker can even talk to your baby.
Smart locks are vulnerable
Something that you will find ironic is the fact that smart locks are not isolated from this threat either. In 2013, Wired reported that millions of Kwikset locks were open to being hacked. Yes, a lock can most likely be broken using explosives or a sledge hammer, but if we are allowing them to replace our conventional locks to secure our valuables, we need to have a comprehensive approach to securing our information, and our livelihood.
A lot of banks, shops, and offices rely on sophisticated encryption to secure themselves from attack, but relying on that false sense of security has given way to millions of opportunities for breaching security.
It’s not all doom and gloom
My tone might seem ominous, but it comes with a logical sense of protecting our privacy. Technology is vertical, changing our infrastructure, and in its nature it is disruptive, changing society and our economy.
We have to be conscious of the causes and effects, the niches, and industries that emerge from human progression. With further separation of our most rudimentary tasks, comes a lack of control, and always those looking to take advantage of our momentary lapses of reason.
Want to save snippets of a Zoom meeting? Listener makes it possible!
(TECHNOLOGY) Listener lets you screenshot or bookmark important sections of live meetings, as well as curate a playlist of snippets, to share or playback.
We live in a very computer-mediated world where the bulk of communication is done virtually. Many of us spend a great deal of time – whether for work or pleasure – on video calls connecting with people that we’re unable to meet with in person.
Zoom became the unofficial mascot for the pandemic and has shown no signs of going anywhere. So naturally, people are looking for ways to put this to even more of an advantage – like by creating messaging extensions to utilize in lieu of live meetings.
Now the folks behind Listener are getting in on the action by creating Listener for Zoom.
The new tool allows users to bookmark important moments of Zoom calls in real-time and easily turn long recordings into bite-sized video clips.
As founder Nishith Shah puts it, “Zoom meetings just got more productive!”
Listener allows users to do a myriad of things, including live bookmarking to create short video clips; ability to transcribe your entire meeting; edit video clips by using transcripts instead of struggling with video editing tools; share video highlights with your team; create playlists from video highlights across different Zoom meetings to tell powerful stories; use projects to organize your meetings and playlists.
Founders say that Listener is designed for pretty much anyone who uses Zoom. In early testing, the founders found that it is especially helpful for product managers and UX researchers who do customer interviews.
They also reported that early-stage founders have been using Listener to add powerful customer videos to their investor pitch decks. It is also helpful for recruiters and hiring managers who search transcripts across hundreds of hiring interviews to remember who said what and to pass on important clips to other people in the interview process.
The tool is also beneficial for teams and hiring, as customer success and sales teams create a knowledge base with Listener to train and onboard new employees. They also use it to pass on customer feedback to the product teams.
This could also be great for clipping video elements that are appropriate for social media use.
On January 11, 2022, Listener was awarded #3 Product of the Day on Product Hunt.
Listener for Zoom is free while in Beta. The tool works only with licensed (paid) Zoom accounts.
Job listings are popping up left and right, so what exactly *is* UX writing?
(EDITORIAL) While UX writing is not technically new, it is seemingly becoming more and more prevalent. The job titles are everywhere, so what is it?
The work of a UX writer is something you come across every day. Whether you’re hailing an Uber or browsing Spotify for that one Drake song, your overall user experience is affected by the words you read at each touchpoint.
A UX writer facilitates a smooth interaction between user and product at each of these touchpoints through carefully chosen words.
Some of the most common touchpoints these writers work on are interface copy, emails, and notifications. It doesn’t sound like the most thrilling stuff, but imagine using your favorite apps without all the thoughtful confirmation messages we take for granted. Take Eat24’s food delivery app, instead of a boring loading visual, users get a witty message like “smoking salmon” or “slurping noodles.”
Eat24’s app has UX writing that works because it’s engaging.
Xfinity’s mobile app provides a pleasant user experience by being intuitive. Shows that are available on your phone are clearly labeled under “Available Out of Home.” I’m bummed that Law & Order: SVU isn’t available, but thanks to thoughtful UX writing at least I knew that sad fact ahead of time.
Regardless of where you find these writer’s work, there are three traits an effective UX writer must-have. Excellent communication skills are a must. The ability to empathize with the user is on almost every job post. But from my own experience working with UX teams, I’d argue for the ability to advocate as the most important skill.
UX writers may have a very specialized mission, but they typically work within a greater user experience design team. In larger companies, some UX writers even work with a smaller team of fellow writers. Decisions aren’t made in isolation. You can be the wittiest writer, with a design decision based on obsessive user research, but if you can’t advocate for those decisions then what’s the point?
I mentioned several soft skills, but that doesn’t mean aspiring UX writers can’t benefit from developing a few specific tech skills. While the field doesn’t require a background in web development, UX writers often collaborate with engineering teams. Learning some basic web development principles such as responsive design can help writers create a better user experience across all devices. In a world of rapid prototyping, I’d also suggest learning a few prototyping apps. Several are free to try and super intuitive.
Now that the UX in front of the writer no longer intimidates you, go check out ADJ, The American Genius’ Facebook Group for Austin digital job seekers and employers. User-centric design isn’t going anywhere and with everyone getting into the automation game, you can expect even more opportunities in UX writing.
How Apple is trying to combat the AirTag backlash (hint – its not working)
(TECHNOLOGY) Apple’s weak-kneed attempts at fixing their AirTags issues aren’t working. They can be placed on anything (or anyone), and it is detrimental.
A few weeks ago, I wrote up an article on how the Apple AirTag can be used to stalk and track people, and now it’s happening. Unfortunately, not all stalkers have the same glamour as Joe from the hit series You.
Engadget reported that model, Brooks Nader, says someone used an AirTag to track her. Per her account, she didn’t receive the notification until she was walking home, alone, at night. If that’s not scary enough, now imagine she was an android user. The only way for her to know someone was tracking her would be if she had installed the Tracker Detect app.
As stated by TechCrunch, “Apple has made its own post-launch efforts to tighten up how AirTags that don’t belong to a certain user can be detected, but these notifications have proven buggy and have often waited far too long to alert users. Add in the fact that Apple has seemed to treat Android integration as an afterthought, not a necessary partnership in order to ship a device like this, and Apple’s incompetence looks a bit more severe.”
The app itself, which was released on December 11, 2021, is getting a lot of negative feedback. One issue is that to see if you’re being tracked you have to manually scan to find the AirTag. How often and when you do that is up to the user. Whereas with the Apple Find My app, it alerts you automatically without the user having to scan anything. It’s not perfect, however. It’s buggy and can take hours to notify the user that an AirTag is tracking them. However, it’s still better than the android app.
Another dreadful scenario that hasn’t been factored in this equation is children. Not all kids have devices, much less Apple devices, nor should they necessarily, but if someone was going to track them, they would be easy targets.
Apple, for the love of all that’s decent, pull AirTags and reconsider how they function. Examine the ways an AirTag could be used without using the mesh network of all iPhone users so that it doesn’t continue to emit a location or, I don’t know, give up. If it doesn’t mean anything to you to risk other’s lives with this product then consider the possible dangerous consequences as a reflection on Apple.
Contrary to popular belief, not all publicity is good publicity.
Business Articles1 week ago
100+ inspirational quotes to motivate you to have prosperous new year
Business News6 days ago
80 reasons why you didn’t get the job interview or offer (brutally honest)
Business Marketing5 days ago
10 must-listen-to podcasts for business owners
Opinion Editorials1 week ago
Do these 3 things if you TRULY want to be an ally to women in tech
Opinion Editorials1 day ago
Job listings are popping up left and right, so what exactly *is* UX writing?
Opinion Editorials2 weeks ago
How to excel in your next remote job interview
Opinion Editorials1 week ago
Does your creativity dwindle as you get older? Science says its possible
Business News2 weeks ago
Get what you want through negotiation and persuasion, sans aggression