When Gadgets Betray Us: The Dark Side of Our Infatuation With New Technologies

When Gadgets Betray Us The Dark Side of Our Infatuation With New Technologies Technology is evolving faster than we are As our mobile phones mp players cars and digital cameras become and complex we understand less and less about how they actually work and what personal de

  • Title: When Gadgets Betray Us: The Dark Side of Our Infatuation With New Technologies
  • Author: Robert Vamosi
  • ISBN: 9780465019588
  • Page: 212
  • Format: Hardcover
  • Technology is evolving faster than we are As our mobile phones, mp3 players, cars, and digital cameras become and complex, we understand less and less about how they actually work and what personal details these gadgets might reveal about us.Robert Vamosi, an award winning journalist and analyst who has been covering digital security issues for than a decadTechnology is evolving faster than we are As our mobile phones, mp3 players, cars, and digital cameras become and complex, we understand less and less about how they actually work and what personal details these gadgets might reveal about us.Robert Vamosi, an award winning journalist and analyst who has been covering digital security issues for than a decade, shows us the dark side of all that digital capability and convenience Hotel room TV remotes can be used to steal our account information and spy on what we ve been watching, toll booth transponders receive unencrypted EZ Pass or FasTrak info that can be stolen and cloned, and our cars monitor and store data about our driving habits that can be used in court against us.When Gadgets Betray Us gives us a glimpse into the secret lives of our gadgets and helps us to better understand and manage these very real risks.

    808 Comment

    • Jon says:

      Somewhat of a disorganized mess of a book. The author had some good points to make, mostly requiring the reader to infer those points from hints scattered about. There is some good, although in my estimation common sense, advice presented. Read the documentation about the gadgets you purchase. Don't depend solely on electronic security (lock your doors!) . But these are things that should be applied to our non-electronic possessions as well. I can't say that I couldn't take this author's work, r [...]

    • David says:

      This book is a compendium of the ways that modern gadgets can work against us. While the computer software world has matured in terms of improving security, the hardware world is a decade behind the times. Most of this is about security lapses--just about any gadget can be hacked, for nefarious purposes. And many people are simply not aware that some of these gadgets even exist! For example, personal information can be stolen digitally from a driver's license, if you give your license to a clerk [...]

    • Desiree says:

      I really enjoyed this book! Everyone should be reminded to turn off their blue tooth connections, as anyone can connect to it! The author also points out the dangers of RFID chips, which are popping up all over. With a simple antenna, these signals can be picked up from very long distances! Definitely a techie book, but, if you have been to defcon, you will find this WAY too elementary. For the rest (most) of us, I think it is within reach. Another reviewer said that it is somewhat disorganized [...]

    • Nathan says:

      Vamosi is a PC World journalist and he has tackled the thorny subject of security and privacy problems with modern computing devices: phones, laptops, RFIDs, and so on. The book is a collection of horror stories (researchers silenced, locks picked, cars hacked), but I felt it lacked a synthesis: what are we supposed to do with this information, what changes should be made? We can't really live our lives in a different way, and the book had no call to arms for greater pre-release security checks [...]

    • D.M. Dutcher says:

      Decent book about how many gadgets, including ones you wouldn't think of, have serious technical and privacy vulnerabilities. The author's main point is that too many technologies that exist rely on security through obscurity-by not being found out in the first place, and that it is relatively easy to hack them for nefarious means. He also towards the end looks at positive uses of these interconnected technologies, like reality mining and the shift to a central, mobile phone-based standard and v [...]

    • Mario says:

      I had the opportunity to finish this book last week while at work on a quiet,lonely night but even having more time at my disposal,I have to say that this book was not an easy read. As with most non-fiction with a technical insight this book was not a quick page turner but instead a detailed description using historical references and third-party anecdotes to demonstrate the vulnerability we citizens have when using our new technological gizmo. I initially found interest in reading this book bec [...]

    • Stefan says:

      The author knows his stuff, although a fair amount was not new news to me. The problem is the writing itself - it's one citation after another of research showing the limitations of technology presented in tabloid-scare fashion that starts to get a little stale after the second chapter. Invariably, he'll spend pages ripping apart something only to follow it with a one sentence, "well this probably won't affect you" line. Also - another sign of poor writing - most of the chapters end with a ridic [...]

    • Yuto says:

      "When Gadgets Betray Us" describes the various types of technologies that on one hand can be convenient and on the other hand can be harmful. Additionally, this books mentions the different types of technologies (all) that are susceptible to hackers. The only problem with this book is that there is just a chunk of information thrown at the reader. There isn't a real narrative nor analysis in this book. This book is a book of multiple sources used.

    • Emily McCune says:

      Hey, I tried -I got a few chapters into it but it just wasn't what I'd expected it to be. I was hoping for a little more of the philosophical angle of when technology fails us, but what this book posed was more actual, technical instances of GPS units not working, and how virtually any car can be stolen (as well as any lock picked), etc. Oh, and apparently it's easier now more than ever for your identity to be stolenrprise surprise. I dunno - I plan on living so off-grid someday that I won't eve [...]

    • William Blair says:

      Definitely for techies. Folks who have no clue about crypto or simple electronics should not bother. That is unfortunate, because this book is the clearest exposition regarding the misuse of crypto and the lack of actual security in deployed authentication schemes (e.g smart cards, RFID chips, SIM cards, etc.). I checked this out from the library, but will buy a couple dozen to distribute to folks whom I have not been able to convince of the dangers of computer systems with inadequately analyzed [...]

    • Stan says:

      why do we think things have a desire or reason to betray us , they are designed by humans , employed by companies , to make money for their product. Humans aint perfect , why think that gizmos made by dudes are ?Although we get into a lot of geek tech about how smart they are , and can beat the flaws , duh !why dont you ask the age old question , how come antivirus programmers are so good at their day job?as they have the night before to do virus programming Yeeeeooooww

    • Anthony says:

      Even if this wasn't the best written book it was probably the most important. We go about our lives not realizing all the ways we are now offering our identity and tempting others to steal it from us. THis book really opened my eyes, not that I was naive but this covered things that I didn't even give a passing concern for. I may not make life altering changes from this but will be much more aware when using the technology daily.

    • Scottsdale Public Library says:

      When Gadgets Betray Us is a well-researched book on how the technologies people are using today, although making life more convenient, allows thieves easier access to our information and belongings. Vamosi covers everything from automotive anti-theft devices to biometrics in a book that brings to the forefront the dark side of technology.-Michael S-

    • Warren Gossett says:

      This book gives useful surveys of security problems on the internet and mobile phones. There is no one size fits all solution to keeping our digital data and our electronically managed devices or possessions safe. The author explains how layering or multiple overlapping approaches are necessary to enhance security although we should not imagine that it will ever be perfect.

    • Ryan says:

      Somewhat of a disorganized book but I give the benefit of the doubt to IT people who write because, well, we don't really write.I'd consider the following chapters quality ones:Chapter 3: Invisible ThreatsChapter 4: Electronic Bread CrumbsChapter 6: The Myth of FingerprintsChapter 7: Zeroes and Ones

    • Hunter Johnson says:

      Good reminders about the power we routinely cede to devices, especially in situations they don't have adequate security for. Not that I'll stop ceding that power, but I will better understand the power shift to make sure it's worth it.

    • Joe says:

      A paranoid person would have a heart attack over this book. The train has already left the station concerning a lot of the things discussed so it's hard to tell what to do about many of the things we live with.

    • Kelli says:

      We know there are "chips" and technology integrated into almost everything-- but what data is being collected, and stored? How is it being used? Are we as anonymous as we think we are? Very interesting read. How much are you willing to trade for convenience?

    • James says:

      A decent book. It opens your eyes to the types of attacks that are possible in our digital age. Some of the scenarios are pretty far fetched, but technically possible.

    • Abraham Ray says:

      ok book about gadgets.

    • Trevor says:

      Things aren't nearly as secure as most people think they are

    • Nemo says:

      Well written, not really anything anyone in infosec doesn't already know about.

    • Danny says:

      Really interesting, but very technical. A lot of SSL, INIS, and other complicated acronyms.

    • Micah Joel says:

      Recommended reading for anyone with a gadget (or car)

    • Doug Frantz says:

      Not as technical as I would have liked but a good read for anyone ignorant to basic electronic collection techniques

    • jen8998 says:

      Author looks at how technology evolves faster than security measures. Timely topic but dry in places, downright scary in others.

    Leave a Reply

    Your email address will not be published. Required fields are marked *