Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Top 10 cyber security stories of 2019
Sponsored by: TechTarget ComputerWeekly.com2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
-
A Security Assessment of Android Full-disk Encryption
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
-
Infosec culture: A former helicopter pilot's perspective
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
-
Royal Holloway: Protecting investors from cyber threats
Sponsored by: TechTarget ComputerWeekly.comThe cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.
-
Mobile Payments Using Host Card Emulation with NFC
Sponsored by: TechTarget ComputerWeekly.comIn this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
-
UNIT 42 Managed Services Threat Report Summary
Sponsored by: Palo Alto NetworksThe MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.
-
Royal Holloway: Testing antivirus efficacy in Linux
Sponsored by: TechTarget ComputerWeekly.comAntivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Royal Holloway: Man proposes, fraud disposes
Sponsored by: TechTarget ComputerWeekly.comIn May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
Demystifying the myths of public cloud computing
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.
-
Deep learning for countering energy theft – a hybrid long-short term memory approach
Sponsored by: TechTarget ComputerWeekly.comEnergy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.