An open letter signed by security experts from around the world is calling on governments to protect encryption rather than undermine it in a quixotic attempt to tackle terrorism.
Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They’re not necessarily in it for the…
Theft of vehicles is about as old as the notion of transport – from horse thieves to carjackers. No longer merely putting a brick through a window, vehicle thieves have continually adapted to new technology…
In writing, music, photography and other areas, “outdated” technologies have initially been valued for their retro, nostalgic appeal in the hipster culture. Vinyl is one of the most notable technologies…
Police play a proverbial cat-and-mouse game with those they pursue, but also with the technology of the day they use. This game of one-upmanship, of measure and countermeasure, sees one or the other side…
After various celebrities’ accounts on Apple’s iCloud servers were hacked, the company has made a point of addressing these issues. It has made new claims for the security of iOS 8, the firm’s latest phone…
With the growth of internet-based cloud services, storage, social media and mobile devices, our activities increasingly leave digital shadows in our wake – social media activity, website visits, mobile…
How can we ensure that someone is who they say they are? How can be sure that the person in our system, both digitally speaking or physically in front of us, is who whom they claim to be? You may think…
The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercept data or take control of…
It’s been almost three months since the Heartbleed bug was revealed and many thousands of computer servers still need to be fixed. The Australian government’s Stay Smart Online initiative this week points…
London’s Victorian sewerage system is creaking and in dire need of renewal. The proposed solution: a 25km “super-sewer”, the Thames Tideway Tunnel, running from west to east across the capital at an estimated…
How do organisations and their Information Technology departments rate when it comes to protecting themselves and their organisations against the ever present cyber risks and cybercrime? The answer is…
It seems hardly a week goes by without a major cyber security flaw exposed that could be exploited across millions of internet and mobile connected devices. This week it was the Internet Explorer browser’s…
Here is a puzzle for you. Why did shares in Yahoo! slide by nearly 10% in the days before Heartbleed was announced and then recover after the main news items broke? It has long been the case that security…
Cyber security has been a hot item on the UK government agenda in the last few years. Francis Maude of the Cabinet Office is the minister in charge. So if anyone was looking for answers in this area, his…
The Heartbleed bug that’s potentially exposed the personal and financial data of millions of people stored online has also exposed a hole in the way some security software is developed and used. The bug…
As operating systems go, Windows XP has had a fantastic run since debuting 13 years ago. It can be still found on nearly 28% of the desktops in the world. It is the second-most installed desktop operating…