Updated: 29/09/2024
Computers and smartphones are just about everywhere now, they have become crucial to our everyday lives. The devices of ours that we depend upon are deep, sometimes it is like they are nearly alive and, in turn, are a threat to us.
These are ten amazing statements related to computers and information technology that show how in exceptional cases they could be a mortal danger to a human life. Most times, we suffer the severe anguish of not having these appliances when they are destroyed.
When our gadgets refuse to work or become silent, we tend to feel as if we have lost a close friend and/or a significant part of ourselves. However, the loss is so mundane and repeated that, eventually, they are casually fixed after woof-woof and become our trusted devices again.
Infographics By GO-Globe E-commerce Bahrain
Though these cases were rare, there were reports of computer chairs catching fire on their own, having been documented in about eight cases. Such strange occurrences could either be the result of using poor materials, or else, the malfunction of the raised (or lowered) mechanism of the chair by inflatable gas pressure.
A kernel panic is a critical error that happens when a computer's operating system crashes. In the case of Mac, among other reasons, incompatibility of the startup items, the damaged RAM, as well as the failed kernel extensions might initiate these incidents. Besides, in Linux, kernel panic errors can be credited to programs seeking to write more memory than they actually have, software bugs, or systems with a defective part
Red Ring of Death on Xbox 360 would show that there was a hardware failure on that particular device. The complaint was notable of the console attributing to as much as 54% e-waste in 2009 and the problem was made known by many users. This starts of course the problem of the repair costs that later Microsoft had to endure also in a significant part of 54% is linked to e-waste and later becomes massive in the environment as the valuable metals are wasted in India.
Stuxnet was a cutting-edge computer worm that infiltrated technologies of this kind, particularly affecting the nuclear program in Iran. The representatives that were responding to the inquiries from IT experts have reported number of cases that happened in their region. The numbers of such attacks varied from each nation with Iran facing as much as 58.31%, Indonesia at 17.83%, and India at 9.96%. Stuxnet was a lethal malware that paved the way for the discussion on the inadequacies of the super infrastructures protection against cyber threats.
The Blue Screen of Death (BSOD) quickly came into the IT vocabulary from the appearance of the Windows 95 in 1995. It is a light blue screen that usually pops up after a crash, mostly due to hardware failures, driver conflicts, or software bugs. Pressing the start button is the only solution. The one that normally faces the occurrence of the aforementioned failure, always, is rendered to link the YBlue Screen of Death! to me! to his computer.
At last, in September 2016, Samsung the company through which 35 of the users bought phones, get back the causing mobiles criticized in the 30 case fire report, to the warehouse in Seoul, South Korea. A damaged battery is to blame in the Samsung issue of the Galaxy Note 7 line. Such an event led to a loss in capital and there were the highest safety worries in smartphones due to it.
The horrifying WANNACRY ransomware incident in May 2017 managed to brute all the vulnerable computers in the territories of 150 different countries. WANNACRY pass through the networks of various companies. Once it got an entry into the Microsoft operating system, it would begin encrypting the files in it. The malware would then display a message demanding a ransom. The health sector was also heavily affected as the malware impacted such systems.
Smartphones are quite fragile gadgets, and this is shown by the fact that 50 million units get cracked or broken every year. It is revealed that the screen of almost 5,761 smartphones get cracked every hour, and this rate keeps growing. Furthermore, 66% of people confess that they have carelessly managed to damage their device at some moment of time. I have never broken a phone, but I have seen enough of my friends do it, so I don't know exactly what to do in this situation. What can I do so that my phone
An artist demonstrated to engineers how easy it is to weaponize a used item during their time. They conducted an experiment where they installed six types of malware on a Samsung NC10 laptop from 2008 to illustrate this point. In response, the artist reported the incident to the university, emphasizing the importance of good cybersecurity and the inherent risks of using reused technologies.
Zombie computers are infected machines controlled by scammer adversaries who use them illegally - e.g. sending spam on behalf of the adversaries. Estimates show that zombies are responsible for an estimated 58-80% of all spam sent globally. Malware strains (e.g. BetaBot 13.25%, Trickster 12.85%, Panda 9.84%, Spyeye 8.05% and Ramnit 7.97%) contributet this level of spam there.
In summary, while technology makes experiences better, it often comes with misguided dangers. Awareness and proactivity can help people through this environment.