Thuemmler, C. (2014). Shock Index demonstrator
This is an outcome from the FI-STAR project and a contribution to the FIWARE catalogue.
Buchanan, W. J. (2011). Advanced security and network forensics: Introduction. Edinburgh Napier University
1.3 Security Taxonomy
Thuemmler, C. (2017). Accroître l’efficacité de la prestation des soins
Interview on socio-economic background of digital agenda in health.
Buchanan, B. (2017). How WannaCry caused global panic but failed to turn much of a profit. https://theconversation.com/how-wannacry-caused-global-panic-but-failed-to-turn-much-of-a-profit-77740
The WannaCry cyber-attack led to panic across the globe, showing just how important it is for organisations to have secure operating systems. This was not even the most sophis...
Buchanan, B. (2017). The next cyberattack could come from sound waves. https://theconversation.com/the-next-cyberattack-could-come-from-sound-waves-74716
You might think your smartphone or laptop is relatively safe from cyber attacks thanks to anti-virus and encryption software. But your devices are increasingly at risk from “s...
Buchanan, B. (2016). If two countries waged cyber war on each another, here’s what to expect. https://theconversation.com/if-two-countries-waged-cyber-war-on-each-another-heres-what-to-expect-63544
Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care ...
Buchanan, W. J. (2016). Bitcoin mining is about to become a lot less profitable
Imagine being told that your wage was going to be cut in half. Well, that’s what’s soon going to happen to those who make money from Bitcoin mining, the process of earning the...
Buchanan, W. J. (2015). When amateurs do the job of a professional, the result is smart grids secured by dumb crypto
Security relies upon good programming and correct adherence to well-designed standards. If the standards are sloppy, then security has been compromised from the outset. Smart ...
Buchanan, W. J. (2015). US hack shows data is the new frontier in cyber security conflict
More than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government ...
Buchanan, W. J. (2015). Ashley Madison breach reveals the rise of the moralist hacker
There’s value in more than just credit card data, as Avid Life Media (ALM), parent company of the extramarital affair website Ashley Madison, has found out after being raided ...
Buchanan, W. J. (2015). Apple and Starbucks could have avoided being hacked if they'd taken this simple step
Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup syste...
Buchanan, W. J. (2015). Edinburgh leading world in beating online crime. The Scotsman
Cyber security surges ahead in the capital, says Bill Buchanan As we become more dependent on the internet by the day, the risks around it also increase, especially from cyber...
Thuemmler, C. (2015). Mobilfunk 5G Die ferngesteuerte Welt. http://www.handelsblatt.com/technik/hannovermesse/mobilfunk-5g-die-ferngesteuerte-welt/11615084-all.html
Erst die neue Mobilfunkgeneration 5G soll den Durchbruch für
die Industrie 4.0 bringen. Während die Forschung schon um die
ersten Patente wetteifert, fürchten Kritiker das End...
Buchanan, W. J. (2015). Lenovo’s security debacle reveals blurred boundary between adware and malware
A widely disliked habit of PC vendors is their bundling of all manner of unwanted software into brand new computers – demo software, games, or part-functional trials. Faced wi...
Buchanan, W. J. (2015). If Obama is talking about securing the net, it should be on everyone else’s lips too
We have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Bara...