39 results

If two countries waged cyber war on each another, here’s what to expect

Other
Buchanan, B. (2016)
If two countries waged cyber war on each another, here’s what to expect. https://theconversation.com/if-two-countries-waged-cyber-war-on-each-another-heres-what-to-expect-63544
Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care ...

Bitcoin mining is about to become a lot less profitable

Other
Buchanan, W. J. (2016)
Bitcoin mining is about to become a lot less profitable
Imagine being told that your wage was going to be cut in half. Well, that’s what’s soon going to happen to those who make money from Bitcoin mining, the process of earning the...

Privacy Shield Replaces Safe Harbour, but Only the Name has Changed

Other
Haynes, D. (2016)
Privacy Shield Replaces Safe Harbour, but Only the Name has Changed. https://theconversation.com/privacy-shield-replaces-safe-harbour-but-only-the-name-has-changed-54189
Abstract not available.

US hack shows data is the new frontier in cyber security conflict.

Other
Buchanan, W. J. (2015)
US hack shows data is the new frontier in cyber security conflict
More than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government ...

When amateurs do the job of a professional, the result is smart grids secured by dumb crypto.

Other
Buchanan, W. J. (2015)
When amateurs do the job of a professional, the result is smart grids secured by dumb crypto
Security relies upon good programming and correct adherence to well-designed standards. If the standards are sloppy, then security has been compromised from the outset. Smart ...

End of Safe Harbour isn’t the End of the World – let’s hope its successor is better

Other
Haynes, D. (2015)
End of Safe Harbour isn’t the End of the World – let’s hope its successor is better
Abstract not available.

Ashley Madison breach reveals the rise of the moralist hacker

Other
Buchanan, W. J. (2015)
Ashley Madison breach reveals the rise of the moralist hacker
There’s value in more than just credit card data, as Avid Life Media (ALM), parent company of the extramarital affair website Ashley Madison, has found out after being raided ...

Apple and Starbucks could have avoided being hacked if they'd taken this simple step

Other
Buchanan, W. J. (2015)
Apple and Starbucks could have avoided being hacked if they'd taken this simple step
Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup syste...

Edinburgh leading world in beating online crime.

Other
Buchanan, W. J. (2015)
Edinburgh leading world in beating online crime. The Scotsman
Cyber security surges ahead in the capital, says Bill Buchanan As we become more dependent on the internet by the day, the risks around it also increase, especially from cyber...

Mobilfunk 5G Die ferngesteuerte Welt

Other
Thuemmler, C. (2015)
Mobilfunk 5G Die ferngesteuerte Welt. http://www.handelsblatt.com/technik/hannovermesse/mobilfunk-5g-die-ferngesteuerte-welt/11615084-all.html
Erst die neue Mobilfunkgeneration 5G soll den Durchbruch für die Industrie 4.0 bringen. Während die Forschung schon um die ersten Patente wetteifert, fürchten Kritiker das End...

Date


Date


Date


Date