2012 Top Scary Trends in Tech

Yes, it's Halloween season of 2012, and we're here to revisit the technologies that are so frightening, they'll make you evacuate from multiple "interfaces".
Written by Jason Perlow, Senior Contributing Writer

Yes, it's time again for Scary Tech Trends. We've been remiss in our last few years of Scary Tech coverage, but we're baaaaaaaaaaaaaack.

In previous years, the monsters were such awful ghouls, ghosts and goblins as Unreliable Clouds, IT Consolidation, Virtual Workplaces, The Never-Ending Workday and Cyber Bullies from Hell. 

This year, I've got a bunch of new ones for you, so let's crack open a fresh bucket of chilled monkey brains and get our B-movie rolling.

The Night of the Smartphone and Tablet Zombies

You've seen these poor, lifeless beings everywhere. People... if you can still call them that...  with pallid, emotionless faces, staring down at small screens while they walk direction-less down the street, completely unaware of their surroundings.

Yet these poor souls actually believe they are more "connected" to the outside world and more people than ever.

Sometimes they return to real life, and have real interactions with living human beings, but then this horrible urge kicks in which compells them to pull out their iPhone, their iPad or their Android device. Their PRECIOUS.

They'll pull it out in the middle of a business meeting while someone else is talking, and they'll fiddle with it in the bathroom stall at work (or, good heavens, take calls on it and seal deals while on the can).

They'll pull it out in the middle of dinner with family. They'll mess with it while everyone is cuddling on the couch, watching TV. And even after satisfying the most basic of human requirements, it still won't go away. "Oh was it good for you, honey? Great, you nap, I'm gonna play Scramble with Friends." 

What happened to smoking a cigarette?

If they can think of any inappropriate, awkward time to stare at their little screen and tap on their little itty, bitty keys, they will. Because their PRECIOUS compels them.

And the longer they have their favorite toy turned off or not being used, the greater the urge is to pull it out and use it, as if it has some evil spell cast on them. They must Tweet. They must Status Update. They must Check In. They must Text. They must check for emails. They must. MUST!!!!! EVERY. SINGLE. MINUTE.

They've become the 21st-century equivalent of Smeagol. Once, they were human beings. But now they're Smartphone and Tablet Zombies. They may think they're connected to more and more people and information than ever, but for these poor creatures, life is just an illusion.

And for the ones still using Blackberries? Those are the poorest souls of all. We're talking about zombies that are afraid to be seen around other Zombies.

Now excuse me while I check my Twitter feed on my iPhone 5. MY PRECIOUS!

I Know Where You Are... Because You Told Me!

I'm not sure what's scarier, people who are totally oblivious that their lives have been fully absorbed by their smartphones, or that these same people are willing disclose their whereabouts at every opportunity because they think that it's "hip" or "cool" to "Check In".

Check-in for, What, exactly? To gain "Points" and merit badges? What is this, the frickin' Boy Scouts?

For what purpose do you need to broadcast your whereabouts to every single one of your Facebook or LinkedIn contacts or the entire Internet on your Twitter stream in real time? Because you have so much vanity that your actual location being accurate within minutes is so important to your friends and family?

Do they need to know that you buy a bear claw and a large cup of coffee at Dunkin' Donuts at 8:24am every morning? That you just walked into the proctologist's office? You think it's some kind of incredible achievement that you just became Mayor of the Kenosha, Wisconsin Starbucks? 

Do I really need to see that picture of that wilted garden salad or horrible excuse for a slice of pizza which came out of a plastic box that you just bought at the airport terminal at LAX? 

What's scary here is that these vanity location-aware services like Foursquare, Facebook, Twitter, Google+ and Instagram are harvesting thousands of time stamped location datapoints per year for every single one of these users that willingly and often use these services.

What's worse is the future potential for data-mining which could allow, say, a private investigator or a potential employer or a financial services company or insurance carrier or anyone else with a vested interest in how you spend your time could someday use this information against you.

Never mind stalkers who want to actually do you and your family physical harm. 

"Oh you checked into McDonalds and Dunkin' Donuts 84 times from 2010 to 2012? Oh I'm sorry Mr. Smith, we're going to have to raise your life insurance premium, eating all that crap can't possibly be good for you."

But don't listen to me, I'm alarmist. Keep checking in. Really.

Blah! I Come To Suck Your Personal Data!

Location aware services are scary when people are willing to share this information with others, but even scarier is the amount of data that gets shared and distributed that you DON'T wan't others to see. Social Media services like FaceBook encourages its users to "Like" everything because the button is now integrated into every single web site.

The more you "Like", the more datapoints that get built up and stored which FaceBook can use to monetize to advertisers and other third parties. As with the potential hazards of location-aware services like Foursquare, there is a literal goldmine of profiling of "Like" information that gets stored for each and every FaceBook user which could someday come back and bite you.

"Like" information isn't the only data on FaceBook you need to worry about. The service seems to change its personal privacy defaults on a yearly basis and if you leave things as they are, chances are there is data within your profile that is being shared out to the world that you don't want via FaceBook's Graph API.

This information that you don't want shared can even be pulled from what seem like harmless mobile games and applications.

If you haven't done so, take a look at ZDNet's Definitive Facebook Lockdown Guide and secure your profiles right away.

Attack of the Mutant Botnets, Worms and Anonymous

Botnets used to be the domain of Script Kiddies on Internet Relay Chat (IRC) for going after financial and personal data on large targeted groups of individual end-user PCs, but now they've become the preferred cyber-attack tool of hostile governments and their official and unofficial cyber-warfare agents to attempt to steal data and deny service of large end-user services such as Twitter, Yahoo, Google and Facebook, as well as corporate and government extranets.

Botnets require a great deal of of coordination and infrastructure on the part of the cybercriminals to run, which is why they are giving way to more sophisticated, self-replicating attack mechanisms such as Stuxnet and Flamer, both of which are computer viruses that have been specifically engineered to attack industrial infrastructure, such as power plants, or to seek out and steal data from specific users within corporate and academia as an intelligence-gathering mechanism.

Unlike Botnets that have to be coordinated and attack web sites and systems externally, self-replicating worms such as Stuxnet or Flamer  can be injected into the target environment by simply inserting an infected USB key into a Windows PC and using Zero-Day exploits to compromise large networks.

So far, complex worms like Stuxnet have mainly attacked and damaged infrastructure in countries like China and Iran, and the US has largely escaped being compromised by this new form of worm so far. What we know about these types of worms is that they require a lot of man hours to create, design and code, so they aren't the work of just a bunch of smart kids working for hacker groups like Anonymous looking to attack for "cause" or for other malicious reasons.

However, I fear that we may very well be looking at a future where critical aspects of our national infrastructure are brought to a halt due to attacks from worms created by hostile governments or terrorist groups on an on-going basis.

Currently, sophisticated viruses like these are the work of foreign governments cyberwarfare efforts against their enemies. So while (most) civilian end-user PCs are not the actual target, it is a bit disconcerting that at some point, this sort of technology could trickle down to organizations like Anonymous, and could use it against civilians and innocent corporate targets for purely malicious purposes.

The Legacy PC OS That Wouldn't Die

It lies under your desk, where the evil dust bunnies live, haunting the inside of a beige PC case, stored on the hard drive. It's as old as Methuselah, because your IT organization is understaffed, has no budget, or just can't see why replacing it has any value. What am I talking about? I'm talking about Windows XP.

Look, it's been eleven years. XP's had a good run. But it's no longer equipped to handle today's security concerns, and it is just barely hanging on in terms of being able to run current applications and use modern browser technology. It's time to go. Heck, it wants to die.

Windows 8 has just been released, and I've given everyone a bunch of reasons why it makes sense to upgrade to it. But if you are still not ready to take the plunge on this new desktop OS, you really need to upgrade your organization's PCs to Windows 7 at the bare minimum. Seriously.

I know this might involve replacing a whole bunch of desktops, as well as rolling out new versions of productivity suites and other commercial, off-the-shelf apps, but if a large portion of your hardware is EOL, you really need to do this anywany. Along with a good DR plan, keeping your PC as well as your server hardware fresh is part of a good overall business continuity strategy if equipment fails.

And if you don't have this in your plans yet, you should also start looking at Windows Server 2012 to replace your aging Windows 2003 R2 server infrastructure to go along with your desktop overhaul.

The Datacenter That Wouldn't Recover

While this article has been written in a (largely) light-hearted tone, and is directed at number things which should give you and your organization some concern, the recent events which have transpired as a result of Hurricane Sandy striking the Northeast United States should bring Business Continuity and Resiliency to the very top of your company's priority list. And it is no laughing matter.

I can't tell you about how many government and city/local agencies as well as businesses which haven't effectively planned for disaster recovery or have invested enough in backup and data replication infrastructure that I have seen in the last several years.

There are still lots of these places out there which refused to invest in the possibility of dealing with a catastrophic infrastructure loss, despite the warnings of IT management and other trusted IT advisors.

I'm talking about no offisite backups or "Site B" types of scenarios, or even places which have never effectively tested for what would happen during an actual Business Continuity loss or haven't developed manual procedures to bring their environments back, let alone DR systems that are fully or partially automated.

Over the next weeks and months we are going to hear about real horror stories about datacenters that were flooded, lost power, and didn't have sufficent battery backup to allow servers and applications to quiesce cleanly, or had no real offsite backups or replication. The data and financial losses for these organizations who had no real backup plans will be immeasurable, and their customers who had to depend on them getting back online will also have to suffer for it.

Don't be like these guys. Make sure that your infrastructure is backed up remotely, and that you have offisite capabilities, even in a reduced, subcapacity form. Because there is nothing worse than having your business continuity lost permanently due to a natural disaster.

What other scary trends in tech have you encountered this year? Talk Back and Let Me Know.

Editorial standards