{"id":43766,"date":"2024-01-24T05:00:13","date_gmt":"2024-01-24T10:00:13","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=557215"},"modified":"2024-01-24T05:00:13","modified_gmt":"2024-01-24T10:00:13","slug":"hashtag-trending-jan-24-mother-of-all-breaches-leaks-26-billion-user-records-gen-z-more-likely-to-fall-for-cyber-scams-humanoid-robots-make-their-way-to-bmws-auto-plants","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/hashtag-trending-jan-24-mother-of-all-breaches-leaks-26-billion-user-records-gen-z-more-likely-to-fall-for-cyber-scams-humanoid-robots-make-their-way-to-bmws-auto-plants\/","title":{"rendered":"Hashtag Trending Jan.24- Mother of all breaches leaks 26 billion user records; Gen Z more likely to fall for cyber scams; Humanoid robots make their way to BMW\u2019s auto plants"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The mother of all breaches has leaked 26 billion user records, Gen Z are more likely to fall for a phishing or other cyber scam, humanoid robots are making their way to BMW\u2019s auto plants and maybe we haven\u2019t learned much in decades about the risks of using technology in the justice system.<\/span><\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.amazon.com\/ITWC-Hashtag-Trending\/dp\/B074ZQTRMP\/ref=cm_cr_srp_d_product_top?ie=UTF8\"  rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-396718 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-alexa-200.png\" alt=\"Hashtag Trending on Amazon Alexa\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<td><a href=\"https:\/\/www.google.com\/podcasts?feed=aHR0cDovL2hhc2h0YWd0cmVuZGluZy5saWJzeW4uY29tL2dwbQ%3D%3D\"  rel=\"noopener\"><img decoding=\"async\" class=\"thumbnail aligncenter wp-image-408712 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2018\/09\/sub-gp-200.png\" alt=\"Google Podcasts badge - 200 px wide\" width=\"200\" height=\"74\" \/><\/a><\/td>\n<td><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/hashtag-trending\/id1264759930?mt=2\"  rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-396720 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-itunes-200.png\" alt=\"\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">All this and more on this \u201cisn\u2019t this privacy week\u201d edition of Hashtag Trending. I\u2019m your host Jim Love, CIO of IT World Canada and TechNewsDay in the US.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here is a 90 second summary for the podcast:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A massive data breach called the Mother of All Breaches has exposed an astounding 26 billion user records. Cybersecurity researchers discovered the 12 terabyte leak which contains personal information from past breaches of sites like LinkedIn, Twitter, and Tencent. While some records are likely duplicates, billions appear to be published for the first time.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The compiled data could allow cyber criminals to launch damaging phishing campaigns, identity theft, and account takeovers. Records include names, passwords, phone numbers, addresses and other sensitive details from thousands of breached databases. Governments were also impacted.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Researchers aren&#8217;t sure who&#8217;s behind it but suspect a malicious actor given the huge scale. They warn consumers who reuse passwords to change them immediately. Other tips &#8211; use strong unique passwords, turn on two-factor authentication, watch for phishing attempts, and check if your information was exposed. With over 26 billion exposed identities, the consumer risk is massive.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you are in the practice of not having unique complex passwords for each system you log into, with 26 billion records, chances are there is at least one occurrence of your favourite username and password.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Best practice. Use a different password for each system. Longer is better. Make them difficult to guess.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Two factor authentication wherever you can.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keep up on cybersecurity news by following our sister podcast Cybersecurity Today with Howard Solomon. You can find it on Google, Apple, Spotify \u2013 wherever you get your podcasts. Or at ITWorldCanada.com\/podcasts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sources include: <\/span><a href=\"https:\/\/cybernews.com\/security\/billions-passwords-credentials-leaked-mother-of-all-breaches\/\"><span style=\"font-weight: 400;\">Cybernews.com<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Contrary to expectations, Gen Z falls for online scams much more than older generations &#8211; 3 times more than baby boomers according to a recent survey by Deloitte. The first &#8220;digital native&#8221; generation uses the internet extensively across devices and platforms. But familiarity seems to breed complacency rather than caution.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Gen Z reported higher rates than boomers of phishing scams, identity theft, romance fraud, and cyberbullying in Deloitte&#8217;s poll. The convenience of staying permanently logged into apps like Instagram makes security friction unappealing. But experts say reinforcing good habits needn&#8217;t limit internet use.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The types of scams target the behaviours of Gen Z whether online shopping, social media use or meeting people virtually. According to Social Catfish\u2019s 2023 report, scam victims under age 20 lost an estimated $210 million last year compared to just $8.2 million in 2017 &#8211; as the generation processes life online, more exposure occasions more risk. Still, better design of platforms and privacy controls could reduce vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Education focused on the incentives perpetuating scams may raise awareness effectively for youth. Rather than a choice between safety and convenience, a customized, empowering approach to online safety serves Gen Z best according to advocates.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Apologies to my Canadian listeners. I think this is one place where the Canadian Zed doesn\u2019t work.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sources include: <\/span><a href=\"https:\/\/www.vox.com\/technology\/23882304\/gen-z-vs-boomers-scams-hacks\/\"><span style=\"font-weight: 400;\">Vox<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">BMW is bringing in a new type of autoworker &#8211; humanoid robots from a company called Figure. These 5 foot 6 machines can walk, pick up objects with dexterous robot hands, and take breaks to recharge.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s the first-time human-shaped robots will join auto manufacturing. While roles are still being defined, the robots&#8217; mobility and flexibility are assets for automation. Industry analysts see it as a harbinger of increasing robotization to counter labour costs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The deal has an initial phase identifying applications followed by deployment at BMW&#8217;s South Carolina plant. Further stages will explore how to integrate AI and other advances. Figure&#8217;s CEO says humanoids can handle most tasks people can within a few years.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When auto manufacturers are asked how they will pay for the recent contract increases for auto workers, they are saying \u2013 more efficiency.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Certainly, BMW sees efficiency and productivity benefits from adding these humanoid robots.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Warehouse robots are also emerging and some complex jobs like car production remain a stretch currently. Still robot capability is advancing. One day roles like equipment repair in risky areas may shift and even though mass replacement of humans is a long way off, these humanoid robots are a big first step.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sources include: <\/span><a href=\"https:\/\/www.axios.com\/2024\/01\/23\/humanoid-robots-bmw-automotive-manufacturing-figure\"><span style=\"font-weight: 400;\">Axios<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">A false facial recognition match led to a devastating injustice for Harvey Murphy Junior. Macy&#8217;s, the U.S. department store\u2019s security system incorrectly identified him as an armed robber &#8211; resulting in 10 days in jail.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not only was he falsely accused, but he was sexually assaulted while being held in detention.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The potential for these mistakes is known.\u00a0 The technology&#8217;s accuracy depends heavily on image quality and database size. Despite police claims it&#8217;s only an investigative lead, this case shows the damage done once someone is identified as a criminal.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It adds to similar incidents where incomplete evidence paired with misplaced confidence in facial recognition tech, led officers to accuse innocent citizens like Murphy. While rare, the instances span race and gender.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The FTC recently sanctioned RiteAid for enforcement practices stemming from their software&#8217;s mismatches. Still popularity grows among retailers like Macy&#8217;s seeking theft deterrence through instant screening of in-store cameras.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before we blame this all on a new technology, here\u2019s another story that hit the air this week with\u00a0 a similar theme.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A software scandal has rocked Britain&#8217;s postal service. Bugs in a faulty accounting system helped convict over 900 postal workers of theft from 1999 to 2015. Innocent employees went to jail or paid to cover nonexistent shortfalls.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The code defects were well known by the builder, Fujitsu, and postal authorities from the start. But this stayed hidden from courts and workers&#8217; lawyers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">93 verdicts have been overturned so far while victims await compensation. Fujitsu apologized this month for the injustice they enabled. Their executive admitted shameful, appalling concealment of exculpatory evidence from prosecutors. The fiasco fuels outrage at private prosecutions in the UK. Officials promise new laws to swiftly aid the falsely accused. But past harm haunts many victimized by rapid faith in flawed technology.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Police should be looking for corroborating proof before charges are laid, but critics say that everything is stacked against an accused person once they are brought under suspicion.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And over the last 20 years, we still have issues that should be resolved before we let any algorithm or system be used without heavy scrutiny.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The faith we seem to have in facial recognition and AI are just another reason to remember the phrase justice should be blind, doesn\u2019t mean it should be blind to the risks of using technology.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Sources include: <\/span><a href=\"https:\/\/arstechnica.com\/tech-policy\/2024\/01\/fujitsu-bugs-that-sent-innocent-people-to-prison-were-known-from-the-start\/\"><span style=\"font-weight: 400;\">ArsTechnica<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.washingtonpost.com\/technology\/2024\/01\/22\/facial-recognition-wrongful-identification-assault\/\"><span style=\"font-weight: 400;\">Washington Post<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Hashtag Trending goes to air five days a week with a daily news show and every Saturday, we have an interview show called the Weekend Edition.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We love your comments. Please let us know what you think. You can reach me at <\/span><a href=\"mailto:jlove@itwc.ca\"><span style=\"font-weight: 400;\">jlove@itwc.ca<\/span><\/a><span style=\"font-weight: 400;\">\u00a0 or leave a comment under the show notes at <\/span><a href=\"http:\/\/www.itworldcanada.com\/podcasts\"><span style=\"font-weight: 400;\">www.itworldcanada.com\/podcasts<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I\u2019m your host Jim Love, thanks for listening and have a Wonderful Wednesday!<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>The post <a href=\"https:\/\/www.itworldcanada.com\/article\/hashtag-trending-jan-24-mother-of-all-breaches-leaks-26-billion-user-records-gen-z-more-likely-to-fall-for-cyber-scams-humanoid-robots-make-their-way-to-bmws-auto-plants\/557215\">Hashtag Trending Jan.24- Mother of all breaches leaks 26 billion user records; Gen Z more likely to fall for cyber scams; Humanoid robots make their way to BMW\u2019s auto plants<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The mother of all breaches has leaked 26 billion user records, Gen Z are more likely to fall for a phishing or other cyber scam, humanoid robots are making their way to BMW\u2019s auto plants and maybe we haven\u2019t learned much in decades about the risks of using technology in the justice system. \u00a0 All<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1083,360],"tags":[525,1248,467,492,1246],"class_list":["post-43766","post","type-post","status-publish","format-standard","hentry","category-hashtag-trending","category-podcasts","tag-ai","tag-bmw","tag-cybersecurity","tag-facial-recognition","tag-mother-of-all-breaches"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/43766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=43766"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/43766\/revisions"}],"predecessor-version":[{"id":43791,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/43766\/revisions\/43791"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=43766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=43766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=43766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}