Sections

Services

Information

US United States

Computer security

Analysis and Comment (22)

No longer a ‘hipster thing’ … even governments are embracing typewriters. Christian Gonzalez/Flickr

Typewriters, not touchscreens … security the old-fashioned way

In writing, music, photography and other areas, “outdated” technologies have initially been valued for their retro, nostalgic appeal in the hipster culture. Vinyl is one of the most notable technologies…
You could still be at risk from the Heartbleed bug. Igor Stevanovic

The Heartbleed bug continues to pose risks for people

It’s been almost three months since the Heartbleed bug was revealed and many thousands of computer servers still need to be fixed. The Australian government’s Stay Smart Online initiative this week points…
Who is really in charge of an organisation’s IT security? Flickr/Pacific Northwest National Laboratory

What’s your IT department’s role in preventing a data breach?

How do organisations and their Information Technology departments rate when it comes to protecting themselves and their organisations against the ever present cyber risks and cybercrime? The answer is…
Popular web browser Internet Explorer the target for the latest security vulnerability. Flickr/Hash Milhan

With bugs in the system how safe is the internet?

It seems hardly a week goes by without a major cyber security flaw exposed that could be exploited across millions of internet and mobile connected devices. This week it was the Internet Explorer browser’s…
Emailing from the car: fast, convenient and not in the least bit secure. rheauchyr

Cybersecurity czar dodges questions over IT security

Cyber security has been a hot item on the UK government agenda in the last few years. Francis Maude of the Cabinet Office is the minister in charge. So if anyone was looking for answers in this area, his…
Does Heartbleed expose flaws in the way some security-critical software is developed? Flickr/Kaleenxian

How the Heartbleed bug reveals a flaw in online security

The Heartbleed bug that’s potentially exposed the personal and financial data of millions of people stored online has also exposed a hole in the way some security software is developed and used. The bug…
If successful, electronic voting poses a serious threat to the great British queue. Ruth W

Digital voting is a game changer but we have to get it right

The UK may be taking its first, tentative steps towards introducing online voting with the establishment of a Commission on Digital Democracy. As so many of our routine tasks are going digital, the shift…
Voters in Florida casting their votes through electronic voting, introduced in the wake of 2000’s “hanging chad” controversy. EPA/Rhona Wise

A foreigners’ guide to US election technology

Elections in the United States are run by state authorites that use a wide variety of voting technologies, often with newsworthy results. Some computerised elections have even awarded the election to the…
Even with an e-health record, doctors will still need to ask patients about their medical history. j reed

Doctors and patients uneasy about new e-health records system

In the shadow of the carbon tax, Australia’s e-health records scheme rolled out on July 1 with what can only be described as a very soft launch. Unlike the carbon tax, the e-health records scheme is voluntary…
Remember people told you to back things up? Remember? Sybren A. Stuvel/Flickr

Frustration to salvation: a code to end computer crashes

Computer crashes and software bugs are infuriating and – usually belatedly – teach us the value of regular back-ups. But could they be a thing of the past? We’ve all been there: the work of days or weeks…
Recovering information from Osama’s hard drives may be impossible. wokka/Flickr

Cracking bin Laden’s computer code: unlikely

It has been reported that Osama bin Laden’s hard drives have been seized, hard drives that could conceivably contain information regarding the membership, funding and future plans of al-Qaeda. Information…

Research and News (1)