Better locks to secure our data are the inevitable result of too many prying eyes
Other
Buchanan, W. J. (2014)
Better locks to secure our data are the inevitable result of too many prying eyes
Robert Hannigan, the new head of British signals intelligence agency GCHQ, has accused technology companies of aiding terrorists and criminals by providing them secure communi...
How WannaCry caused global panic but failed to turn much of a profit
Other
Buchanan, B. (2017)
How WannaCry caused global panic but failed to turn much of a profit. https://theconversation.com/how-wannacry-caused-global-panic-but-failed-to-turn-much-of-a-profit-77740
The WannaCry cyber-attack led to panic across the globe, showing just how important it is for organisations to have secure operating systems. This was not even the most sophis...
Advanced security and network forensics: web Infrastructures.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: web Infrastructures. Edinburgh Napier University
5 WEB INFRASTRUCTURES
5.1 Objectives
5.2 Introduction
5.3 Identity 2.0
5.4 SOAP over HTTP
5.5 LDAP
X.500
5.6 Authentication Infrastructures
5.7 802.1x Authentication ...
Lenovo’s security debacle reveals blurred boundary between adware and malware
Other
Buchanan, W. J. (2015)
Lenovo’s security debacle reveals blurred boundary between adware and malware
A widely disliked habit of PC vendors is their bundling of all manner of unwanted software into brand new computers – demo software, games, or part-functional trials. Faced wi...
Ashley Madison breach reveals the rise of the moralist hacker
Other
Buchanan, W. J. (2015)
Ashley Madison breach reveals the rise of the moralist hacker
There’s value in more than just credit card data, as Avid Life Media (ALM), parent company of the extramarital affair website Ashley Madison, has found out after being raided ...
Advanced security and network forensics: network forensics.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: network forensics. Edinburgh Napier University
3 NETWORK FORENSICS
3.1 Objectives
3.2 Introduction
3.3 The key protocols
3.4 Ethernet, IP and TCP headers
3.5 TCP connection
3.6 ARP
3.7 SYN
3.8 Application Layer Ana...
When the ATM runs Windows, how safe is your money?
Other
Buchanan, W. J. (2014)
When the ATM runs Windows, how safe is your money?
How safe is Microsoft Windows? After all, the list of malware that has caused major headaches worldwide over the last 15 years is long – viruses, worms and Trojans have forced...
Codebreaking has moved on since Turing’s day, with dangerous implications.
Other
Buchanan, W. J. (2014)
Codebreaking has moved on since Turing’s day, with dangerous implications
We have always been been intrigued by keeping secrets and uncovering the secrets of others, whether that’s childhood secret messages, or secrets and codebreaking of national i...
In cybersecurity, the weakest link is … you
Other
Buchanan, W. J. (2014)
In cybersecurity, the weakest link is … you
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat ...
When amateurs do the job of a professional, the result is smart grids secured by dumb crypto.
Other
Buchanan, W. J. (2015)
When amateurs do the job of a professional, the result is smart grids secured by dumb crypto
Security relies upon good programming and correct adherence to well-designed standards. If the standards are sloppy, then security has been compromised from the outset. Smart ...