Unlike purpose-built data storage systems, a data lake can be used to dump data in its original form. This data usually remains unsupervised.
A major cyber attack on a data lake could have immense consequences for any of us. And the damage could be felt anywhere from banking to the healthcare sector.
Secure communications are increasingly important.
Virtual private network companies make lots of promising claims about their services. Most people don't have the skills to double-check their providers. So this group of researchers did the testing.
They’re small and well-connected, but how safe are ‘internet of things’ devices?
As the number of 'internet of things' devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.
Floods of traffic can clog up an internet server and the wires connecting it to other systems.
The very first cyberattack clogged up the nascent internet, halting digital communications. Now much bigger, the internet is still largely open to – and suffering regularly from – similar attacks.
Think of your router as the post office for the internet.
Get to know your internet router a little better.
Apple's design decisions don't please everyone, but in the iPhone the company created something truly revolutionary that has lasted.
The recent cyber attack on the Dyn infrastructure shows why the internet of things poses a risk to us all.
The internet's architecture is under attack again as a huge denial of service attack takes out major sites in US and Europe.
Internet connected devices like webcams are the tip of the iceberg when it comes to the Internet of Things.
Millions of new devices are going online as the Internet of Things expands. But many have security or privacy holes. Here's what to look for to keep yourself safe online.
There are a few things you can do to keep yourself safe online.
Getting the basics of cybersecurity right could eliminate 85% of the threats overnight. Here are some tips to get you started.
Cybersecurity is becoming increasingly important.
Online infrastructure and business are becoming increasingly important, as is our need to focus research efforts on securing them from cyber-attack.
Anti-virus software can keep cyber-criminals at bay.
Throwing a safety net over one's computer, mobile handset or tablet is a necessity because of the threat of viruses and infections through removable devices.
When the SWAT team bursts into your bedroom, it’s not only unpleasant but potentially deadly.
Two new forms of online harassment, 'doxxing' and 'swatting', are increasing in frequency. Here's how to protect yourself from them.
Big guns for big jobs.
With three billion internet users and rising, a device that turns surfers into shells is a dangerous development.
How safe is your metadata once it’s been collected and stored?
Flickr/David Melchor Diaz
The new legislation forcing telcos and internet companies to store your metadata for two years creates a new set of secuirty risks.
Questions still to be answered on what metadata is to be kept from internet connections.
The metadata retention debate is heating up with Prime Minister Tony Abbott telling us the cost of not going ahead with compulsory retention of metadata will be incalculable and will represent a form of…
Let me see if I’ve got this right…
Dear Prime Minister Cameron, You recently proposed that all internet apps – and their users’ communications – be compelled to make themselves accessible to state authorities. I want to explain why this…
We don’t need any more internet off-switches, thanks.
Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This might make a grand statement…
Webcams have been made public because their passwords weren’t changed from the default.
There are concerns that thousands of private webcams around the world could be streaming live images to anybody who wishes to view them – without their owner knowing – thanks to a Russian website providing…
When all your appliances are internet-enabled, whose hands are holding the remote control?
Hands image via www.shutterstock.com.
An ever-increasing number of our consumer electronics is internet-connected. We’re living at the dawn of the age of the Internet of Things. Appliances ranging from light switches and door locks, to cars…