29 results

Traffic light hacking shows the Internet of Things must come with better security.

Other
Buchanan, W. J. (2014)
Traffic light hacking shows the Internet of Things must come with better security
The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercep...

How the love of one teenager brought Tweetdeck to its knees.

Other
Buchanan, W. J. (2014)
How the love of one teenager brought Tweetdeck to its knees
TweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-o...

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet.

Other
Buchanan, W. J. (2015)
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet
Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This m...

Advanced security and network forensics: Introduction.

Other
Buchanan, W. J. (2011)
Advanced security and network forensics: Introduction. Edinburgh Napier University
1.1 Objectives 1.2 Introduction 1.3 Security Taxonomy 1.4 Threats Hardware misuse Environmental risks External misuse Pests Active misuse Passive misuse Masquerading...

Advanced security and network forensics: obfuscation and data hiding.

Other
Buchanan, W. J. (2011)
Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University
4 DATA HIDING AND OBFUSCATION 4.1 Objectives 4.2 Introduction 4.3 Obfuscation using Encryption Private-key data hiding Public-key data hiding Hashing Encoding Ex-OR en...

US hack shows data is the new frontier in cyber security conflict.

Other
Buchanan, W. J. (2015)
US hack shows data is the new frontier in cyber security conflict
More than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government ...

Advanced security and network forensics: web Infrastructures.

Other
Buchanan, W. J. (2011)
Advanced security and network forensics: web Infrastructures. Edinburgh Napier University
5 WEB INFRASTRUCTURES 5.1 Objectives 5.2 Introduction 5.3 Identity 2.0 5.4 SOAP over HTTP 5.5 LDAP X.500 5.6 Authentication Infrastructures 5.7 802.1x Authentication ...

How WannaCry caused global panic but failed to turn much of a profit

Other
Buchanan, B. (2017)
How WannaCry caused global panic but failed to turn much of a profit. https://theconversation.com/how-wannacry-caused-global-panic-but-failed-to-turn-much-of-a-profit-77740
The WannaCry cyber-attack led to panic across the globe, showing just how important it is for organisations to have secure operating systems. This was not even the most sophis...

Codebreaking has moved on since Turing’s day, with dangerous implications.

Other
Buchanan, W. J. (2014)
Codebreaking has moved on since Turing’s day, with dangerous implications
We have always been been intrigued by keeping secrets and uncovering the secrets of others, whether that’s childhood secret messages, or secrets and codebreaking of national i...

In cybersecurity, the weakest link is … you

Other
Buchanan, W. J. (2014)
In cybersecurity, the weakest link is … you
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat ...