The Dangers of Overpersonalisation

Is Overpersonalisation Killing the Variety and Interest of Your User Experience?

One user even noted that because the content was boring she continued to scroll looking for something that was interesting, “I don’t find anything interesting on Facebook tonight but what’s funny is that I will keep scrolling until I do; it’s addicting.” This behavior is related to the Vortex phenomenon, which refers to people feeling sucked into the online world almost against their will through sticky design techniques (like continuous content feeds). Users seek the emotional payoff they get from a good piece of content. In these cases, the phone turns into a mini slot machine: they keep pulling the lever coming across dozens of losers in hopes of finally getting a winner.

https://www.nngroup.com/articles/overpersonalization/

Roaming Mantis malware expands its reach

Mantis
Malware called ‘Roaming Mantis’ that infects smartphones through wi-fi routers is rapidly spreading across the world after first emerging only a couple of months ago.
Through DNS hijacking, the malware uses compromised routers to infect Android smartphones and tablets, redirect iOS devices to a phishing site, and run CoinHive, a cryptomining script, on desktops and computers.
https://www.itnews.com.au/news/roaming-mantis-malware-expands-its-reach-491441

Spectre and Meltdown Attacks Against Microprocessors

The security of pretty much every computer on the planet has just gotten a lot worse, and the only real solution — which of course is not a solution — is to throw them all away and buy new ones.
On January 3, researchers announced a series of major security vulnerabilities in the microprocessors at the heart of the world’s computers for the past 15-20 years. They’ve been named Spectre and Meltdown, and they have to do with manipulating different ways processors optimize performance by rearranging the order of instructions or performing different instructions in parallel. An attacker who controls one process on a system can use the vulnerabilities to steal secrets elsewhere on the computer.
This means that a malicious app on your phone could steal data from your other apps. Or a malicious program on your computer — maybe one running in a browser window from that sketchy site you’re visiting, or as a result of a phishing attack — can steal data elsewhere on your machine. Cloud services, which often share machines amongst several customers, are especially vulnerable. This affects corporate applications running on cloud infrastructure, and end-user cloud applications like Google Drive. Someone can run a process in the cloud and steal data from every other user on the same hardware.
I am sure people thought me weird and old fashioned because I would not subscribe to the Cloud philosophy. This is exactly one reason why. – Tom)
Information about these flaws has been secretly circulating amongst the major IT companies for months as they researched the ramifications and coordinated updates. The details were supposed to be released next week, but the story broke early and everyone is scrambling. By now all the major cloud vendors have patched their systems against the vulnerabilities that can be patched against.
https://www.schneier.com/crypto-gram/archives/2018/0115.html