Police play a proverbial cat-and-mouse game with those they pursue, but also with the technology of the day they use. This game of one-upmanship, of measure and countermeasure, sees one or the other side…
After various celebrities’ accounts on Apple’s iCloud servers were hacked, the company has made a point of addressing these issues. It has made new claims for the security of iOS 8, the firm’s latest phone…
Our digital footprints will prove much more enduring.
Tamas Kovacs/EPA
With the growth of internet-based cloud services, storage, social media and mobile devices, our activities increasingly leave digital shadows in our wake – social media activity, website visits, mobile…
Keys at your fingertips, but the technology isn’t there yet.
Rachmaninoff
How can we ensure that someone is who they say they are? How can be sure that the person in our system, both digitally speaking or physically in front of us, is who whom they claim to be? You may think…
Confused? You will be if someone’s making mischief with them.
Julen Parra
The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercept data or take control of…
You could still be at risk from the Heartbleed bug.
Igor Stevanovic
It’s been almost three months since the Heartbleed bug was revealed and many thousands of computer servers still need to be fixed. The Australian government’s Stay Smart Online initiative this week points…
London’s Victorian sewerage system is creaking and in dire need of renewal. The proposed solution: a 25km “super-sewer”, the Thames Tideway Tunnel, running from west to east across the capital at an estimated…
Who is really in charge of an organisation’s IT security?
Flickr/Pacific Northwest National Laboratory
How do organisations and their Information Technology departments rate when it comes to protecting themselves and their organisations against the ever present cyber risks and cybercrime? The answer is…
Popular web browser Internet Explorer the target for the latest security vulnerability.
Flickr/Hash Milhan
It seems hardly a week goes by without a major cyber security flaw exposed that could be exploited across millions of internet and mobile connected devices. This week it was the Internet Explorer browser’s…
Here is a puzzle for you. Why did shares in Yahoo! slide by nearly 10% in the days before Heartbleed was announced and then recover after the main news items broke? It has long been the case that security…
Emailing from the car: fast, convenient and not in the least bit secure.
rheauchyr
Cyber security has been a hot item on the UK government agenda in the last few years. Francis Maude of the Cabinet Office is the minister in charge. So if anyone was looking for answers in this area, his…
Does Heartbleed expose flaws in the way some security-critical software is developed?
Flickr/Kaleenxian
The Heartbleed bug that’s potentially exposed the personal and financial data of millions of people stored online has also exposed a hole in the way some security software is developed and used. The bug…
Despite its success, it’s time for XP to make way for the next generation.
Corrie.../Flickr
As operating systems go, Windows XP has had a fantastic run since debuting 13 years ago. It can be still found on nearly 28% of the desktops in the world. It is the second-most installed desktop operating…
Civil servants everywhere heave a sigh of relief.
psd
The UK government has revealed that it is considering ditching Microsoft software for open source alternatives. Cabinet minister Frances Maude has said he wants to see a range of software being adopted…
If successful, electronic voting poses a serious threat to the great British queue.
Ruth W
The UK may be taking its first, tentative steps towards introducing online voting with the establishment of a Commission on Digital Democracy. As so many of our routine tasks are going digital, the shift…
Voters in Florida casting their votes through electronic voting, introduced in the wake of 2000’s “hanging chad” controversy.
EPA/Rhona Wise
Elections in the United States are run by state authorites that use a wide variety of voting technologies, often with newsworthy results. Some computerised elections have even awarded the election to the…
Even with an e-health record, doctors will still need to ask patients about their medical history.
j reed
In the shadow of the carbon tax, Australia’s e-health records scheme rolled out on July 1 with what can only be described as a very soft launch. Unlike the carbon tax, the e-health records scheme is voluntary…
Having precious data split in two could keep it safer from prying eyes.
dorena_wm
Your data is out there, somewhere – all of your data. Encryption can protect files on your laptop or PC. Storing them on a remote server – such as DropBox is another option. And … well, that’s about it…
Because many people use the same password on multiple sites, hacks that expose login details can create new risks.
Flickr/Davide Restivo
It was announced overnight that cryptography researchers have found a “vulnerability” in the encryption scheme used in the vast majority of secure online transactions – a scheme known as AES-256. Every…