Sections

Services

Information

UK United Kingdom

Computer security

Analysis and Comment (10)

Does Heartbleed expose flaws in the way some security-critical software is developed? Does Heartbleed expose flaws in the way some security-critical software is developed? Flickr/Kaleenxian

How the Heartbleed bug reveals a flaw in online security

The Heartbleed bug that’s potentially exposed the personal and financial data of millions of people stored online has also exposed a hole in the way some security software is developed and used. The bug…
Despite its success, it’s time for XP to make way for the next generation. Despite its success, it’s time for XP to make way for the next generation. Corrie.../Flickr

Windows XP is still popular – so why is Microsoft pulling the plug?

As operating systems go, Windows XP has had a fantastic run since debuting 13 years ago. It can be still found on nearly 28% of the desktops in the world. It is the second-most installed desktop operating…
Civil servants everywhere heave a sigh of relief. Civil servants everywhere heave a sigh of relief. psd

There’s no better time for governments to go open source

The UK government has revealed that it is considering ditching Microsoft software for open source alternatives. Cabinet minister Frances Maude has said he wants to see a range of software being adopted…
If successful, electronic voting poses a serious threat to the great British queue. If successful, electronic voting poses a serious threat to the great British queue. Ruth W

Digital voting is a game changer but we have to get it right

The UK may be taking its first, tentative steps towards introducing online voting with the establishment of a Commission on Digital Democracy. As so many of our routine tasks are going digital, the shift…
Voters in Florida casting their votes through electronic voting, introduced in the wake of 2000’s “hanging chad” controversy. Voters in Florida casting their votes through electronic voting, introduced in the wake of 2000’s “hanging chad” controversy. EPA/Rhona Wise

A foreigners’ guide to US election technology

Elections in the United States are run by state authorites that use a wide variety of voting technologies, often with newsworthy results. Some computerised elections have even awarded the election to the…
Even with an e-health record, doctors will still need to ask patients about their medical history. Even with an e-health record, doctors will still need to ask patients about their medical history. j reed

Doctors and patients uneasy about new e-health records system

In the shadow of the carbon tax, Australia’s e-health records scheme rolled out on July 1 with what can only be described as a very soft launch. Unlike the carbon tax, the e-health records scheme is voluntary…
Having precious data split in two could keep it safer from prying eyes. Having precious data split in two could keep it safer from prying eyes. dorena_wm

Cloud Shredder: hiding data better or making life more complicated?

Your data is out there, somewhere – all of your data. Encryption can protect files on your laptop or PC. Storing them on a remote server – such as DropBox is another option. And … well, that’s about it…
AES-256 is used widely in personal banking and other online services. AES-256 is used widely in personal banking and other online services. panguy100

World’s toughest encryption scheme is ‘vulnerable’ … so what about you?

It was announced overnight that cryptography researchers have found a “vulnerability” in the encryption scheme used in the vast majority of secure online transactions – a scheme known as AES-256. Every…
Remember people told you to back things up? Remember? Remember people told you to back things up? Remember? Sybren A. Stuvel/Flickr

Frustration to salvation: a code to end computer crashes

Computer crashes and software bugs are infuriating and – usually belatedly – teach us the value of regular back-ups. But could they be a thing of the past? We’ve all been there: the work of days or weeks…
Recovering information from Osama’s hard drives may be impossible. Recovering information from Osama’s hard drives may be impossible. wokka/Flickr

Cracking bin Laden’s computer code: unlikely

It has been reported that Osama bin Laden’s hard drives have been seized, hard drives that could conceivably contain information regarding the membership, funding and future plans of al-Qaeda. Information…

Research and News (1)