News Articles

As the world becomes increasingly connected to the internet the phenomenon of the big web has appeared. Nowhere does this sound more dystopian than when applied to Digital Health.

Wearable technologies have made the switch from niche gadgets to mainstream mainstays as more people are becoming users that want to influence and control their own health. It’s truly inspirational to see companies surpassing year-on-year growth with the latest inventive wear containing heart level monitors, pedometers, and calories pawns, to name a few. A big focus has been adopted to refine a patient’s experience within severe care, restoration, and community-based care amenities, with wearables supporting patient’s in making the transition from hospital care to independent self-care.

Mark Chimley, an Information Assurance Architect and Cyber Security Consultant asks "What are reasonable mobile computing security procedures?"

Working on the Move

I am writing this on a train using mobile computing devices (a netbook and a phone) and I'm fairly happy with the security measures I've put in place and the procedures I'm using to enable mobile computing, but are these appropriate controls for the majority of people? There is always a risk involved in carrying out business practices outside of an office environment but it's pretty obvious that the advantages of the mobile office in its various forms are such that few of us can constrain our work to just occurring within a traditional office.

It seemed apt to write my first post here on a topic which is becoming increasingly important for businesses: the risk of ransomware. Just as a perpetrator may hold a physical person or thing to ransom, the same applies to a company's data assets and information. Documents, images and other files are encrypted by ransomware using a key that is only held by the attacker. A ransom demand is then made for release of the key so that the victim's files can be decrypted. As with many cyber attacks against businesses or individuals, the mechanism used to mount a ransomware attack is usually through infection of the victim's computer systems with some type of malicious software.

Cybersecurity and, more broadly, issues connected with cyberspace, have risen to the rank of strategic, global challenges. On the one hand, over the last few decades we have witnessed unprecedented opportunities for general development: economic, political, social, and individual. On the other, we are now facing completely new categories of threats, with potentially catastrophic consequences. All stakeholders, even the non-governmental ones, who, in the past, had limited or no tools enabling them to effectively influence the world around, now have comparatively easy access to technologies that may potentially impact entire international security systems. The Web has become a tremendous source of influence.

Image of the planetarium building in Poland accompanying the article about the Instytut Kościuszki by Aneta Urban

The UK government is improving cyber security in its supply chain. From 1 October 2014, all suppliers must be compliant with the new Cyber Essentials Scheme controls if bidding for government contracts which involve handling of sensitive and personal information and provision of certain technical products and services.

Picture of Charlie Chaplin accompanying the article by Abiola Abimbola on mitigating the Information Threat

Cryptography has a saint and sinner profile just now, with companies like Google pushing forward HTTPs, and governments around the world railing against it. While many countries have been close to forcing companies to add backdoors, few have taken the step of ban its operation. Now, a royal edict from the president of the United Arab Emirates (UAE), His Highness Sheikh Khalifa bin Zayed Al Nahyan (Figure 10), has taken this step the massive step by making it illegal to use a secure tunnel, VPN or secure proxy service. Those who are caught will risk jail and fines between 500,000 and 2,000,000 UAE dirham (US$136,130 and $544,521):

Image of people on an escalator accompanying the cyber security article by Professor William Buchanan of Napier Univristy Something to hide: If you hide, you must be committing a crime

Secure tunnels and VPN connections have had a difficult time recently, as law enforcement has railed against their implement. Also with the increase in data loss, too, typically through an insider or from a remote access trojan (RAT), many companies are looking to ban VPN connections, and also to replace the digital certificate from the remote site with their own certificate (and thus be able to read the contents on a tunnel).

Image accompanying the Cyber Security article Something to hide: VPNs and Proxies by Professor Bill Buchanan of Napier University

Professor Bill Buchanan of Napier University has written a series of articles for Company Connecting on Cyber Crime and the challenges that Digital Forensic Investigators face. Yesterday we looked at Telegram. Today we look at the anonymous browser Tor.

"With the Tor network, the routing is done using computers of volunteers around the world to route the traffic around the Internet, and with every hop the chances to tracing the original source becomes reduced. In fact, it is rather like a pass-the-parcel game"

Image accompanying the article The Three Ts: Remaining Untraceable with Tor by Professor Bill Buchanan of Napier University

Professor Bill Buchanan of Napier University has written a series of articles for Company Connecting on Cyber Crime and the challenges that Digital Forensic Investigators face. Yesterday we looked at tails. Today we look at Telegram the encrypted messaging app with the ability to self destruct chat logs and old messages. Its a cloud based messaging app with a focus on security and speed.

Image accompanying the article The Three Ts: Remaining Untraceable with Telegram by Professor Bill Buchanan of Napier University