Welcome to

Beyond Imagining

The amazing technologies of the Fourth Industrial Revolution (4IR Tech) bring with them incredible opportunity for individuals, commerce and society at large. What was once the domain of science fiction has become reality, or are slated for use in the foreseeable future.

Access to 4IR tech is increasingly made possible through digital means, much of which happens in a hybrid between an online and the real world, or even entirely online, so much so that while we only existed in the real, physical world in the past, we now partly live digitally. We’re becoming hybrids with both a real and digital self.

This is a radical change and it can cause a variety of challenges in its wake, such as concerns about security, privacy and the fictionalisation of news and facts. Everything seems to change in the digitisation process.

In this issue of Beyond Imagining we tackle some of the conundrums that arise with becoming fully or partially digital. Our articles examine what the metaverse is, or could be, we highlight how online security is being adapted through 4IR Tech and suggest hacking yourself to see how secure you really are online.

Fact-checking can be a full-time job these days with hard-to-spot deepfake video and every interpretation under the sun. Everyone can have their own voice heard online and this means we must be vigilant about taking anything at face value. In our Spot the fakes article we offer some guidance.

In addition, this issue features stories about how to manage messaging apps and we guide you on how to avoid ransomware attacks (and what to do when it happens).

The brave new world powered by 4IR Tech is astonishing in what it offers us, but digital pitfalls can cause much harm. We trust this eighth issue of Beyond Imagining will assist you in navigating cyberspace a bit more informed and somewhat safer.

Contents

Hack Yourself: Test your own online security… before criminals do.

Just like testing a door after you’ve locked it, one proven technique to ensure online safety is to act like a cybercriminal would.

Read more

Managing your Messaging Apps

As messaging apps increasingly take over from email, use them wisely. Sometimes irritating, often useful, messaging apps…

Read more

The online puppy scam: A social engineering case study

When Google announced in April 2022 that it is suing a Cameroonian national for running a “puppy fraud scheme…

Read more

Is the metaverse real?
For now, it’s all seemingly still a dream…

When Neal Stephenson created the idea of a metaverse in his 1992 book Snow Crash, he probably didn’t think …

Read more

Authenticating yourself with 4IR tech

Responsibility for authentication moves from individuals to service providers. Due to the inherent insecure nature…

Read more

Spot the fakes: Facts or fiction?

Juxtaposed to new 4IR Tech’s usefulness, an unfortunate side-effect is the rise in faking it online with new manipulation technology.

Read more

Avoiding Ransomware

It’s a frightening reality that the
ransomware industry is configured
just like sectors of the real economy…

Read more

We behave differently, virtually

One of the enigmas of online human behaviour is that it seems as if we instinctively believe our virtual selves are somehow…

Read more