Research explorer tool

29 results

Advanced security and network forensics: Introduction.

Other
Buchanan, W. J. (2011)
Advanced security and network forensics: Introduction. Edinburgh Napier University
1.1 Objectives 1.2 Introduction 1.3 Security Taxonomy 1.4 Threats Hardware misuse Environmental risks External misuse Pests Active misuse Passive misuse Masquerading...

Traffic light hacking shows the Internet of Things must come with better security.

Other
Buchanan, W. J. (2014)
Traffic light hacking shows the Internet of Things must come with better security
The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercep...

How WannaCry caused global panic but failed to turn much of a profit

Other
Buchanan, B. (2017)
How WannaCry caused global panic but failed to turn much of a profit. https://theconversation.com/how-wannacry-caused-global-panic-but-failed-to-turn-much-of-a-profit-77740
The WannaCry cyber-attack led to panic across the globe, showing just how important it is for organisations to have secure operating systems. This was not even the most sophis...

When the ATM runs Windows, how safe is your money?

Other
Buchanan, W. J. (2014)
When the ATM runs Windows, how safe is your money?
How safe is Microsoft Windows? After all, the list of malware that has caused major headaches worldwide over the last 15 years is long – viruses, worms and Trojans have forced...

iWorm hack shows Macs are vulnerable too

Other
Buchanan, W. J. (2014)
iWorm hack shows Macs are vulnerable too
The computer operating systems and applications we use today have often evolved over many years, decades even, and contain tens or hundreds of millions of lines of code. Flaws...

Better locks to secure our data are the inevitable result of too many prying eyes

Other
Buchanan, W. J. (2014)
Better locks to secure our data are the inevitable result of too many prying eyes
Robert Hannigan, the new head of British signals intelligence agency GCHQ, has accused technology companies of aiding terrorists and criminals by providing them secure communi...

Codebreaking has moved on since Turing’s day, with dangerous implications.

Other
Buchanan, W. J. (2014)
Codebreaking has moved on since Turing’s day, with dangerous implications
We have always been been intrigued by keeping secrets and uncovering the secrets of others, whether that’s childhood secret messages, or secrets and codebreaking of national i...

In cybersecurity, the weakest link is … you

Other
Buchanan, W. J. (2014)
In cybersecurity, the weakest link is … you
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat ...

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet.

Other
Buchanan, W. J. (2015)
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet
Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This m...

If Obama is talking about securing the net, it should be on everyone else’s lips too.

Other
Buchanan, W. J. (2015)
If Obama is talking about securing the net, it should be on everyone else’s lips too
We have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Bara...