Research explorer tool

25 results

Apple and Starbucks could have avoided being hacked if they'd taken this simple step

Other
Buchanan, W. J. (2015)
Apple and Starbucks could have avoided being hacked if they'd taken this simple step
Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup syste...

If Obama is talking about securing the net, it should be on everyone else’s lips too.

Other
Buchanan, W. J. (2015)
If Obama is talking about securing the net, it should be on everyone else’s lips too
We have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Bara...

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet.

Other
Buchanan, W. J. (2015)
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet
Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This m...

Better locks to secure our data are the inevitable result of too many prying eyes

Other
Buchanan, W. J. (2014)
Better locks to secure our data are the inevitable result of too many prying eyes
Robert Hannigan, the new head of British signals intelligence agency GCHQ, has accused technology companies of aiding terrorists and criminals by providing them secure communi...

When amateurs do the job of a professional, the result is smart grids secured by dumb crypto.

Other
Buchanan, W. J. (2015)
When amateurs do the job of a professional, the result is smart grids secured by dumb crypto
Security relies upon good programming and correct adherence to well-designed standards. If the standards are sloppy, then security has been compromised from the outset. Smart ...

Traffic light hacking shows the Internet of Things must come with better security.

Other
Buchanan, W. J. (2014)
Traffic light hacking shows the Internet of Things must come with better security
The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercep...

Lenovo’s security debacle reveals blurred boundary between adware and malware

Other
Buchanan, W. J. (2015)
Lenovo’s security debacle reveals blurred boundary between adware and malware
A widely disliked habit of PC vendors is their bundling of all manner of unwanted software into brand new computers – demo software, games, or part-functional trials. Faced wi...

How the love of one teenager brought Tweetdeck to its knees.

Other
Buchanan, W. J. (2014)
How the love of one teenager brought Tweetdeck to its knees
TweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-o...

In cybersecurity, the weakest link is … you

Other
Buchanan, W. J. (2014)
In cybersecurity, the weakest link is … you
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat ...

Codebreaking has moved on since Turing’s day, with dangerous implications.

Other
Buchanan, W. J. (2014)
Codebreaking has moved on since Turing’s day, with dangerous implications
We have always been been intrigued by keeping secrets and uncovering the secrets of others, whether that’s childhood secret messages, or secrets and codebreaking of national i...