Security


Display Tech: Fortifying Industries with EMI Shielding

In an age where technology reigns supreme, the world is more interconnected than ever before. Every device, from the smartphone in your pocket to the advanced machinery in industries, communicates in a symphony of electronic signals. Yet, with this digital cre...

By Jack Pollard | 28-09-2023

Robots on Patrol: The Future of Crime Prevention

The reduction of coppers on the beat has undoubtedly reduced the ability of the police to reduce crime, and while some argue that more police are needed, others are looking towards robots. What challenges does modern policing face, could robots be the solution...

By Robin Mitchell | 27-09-2023

Tech-Savvy Thieves: The New Age of Bluetooth-Enabled Crimes

As more devices become integrated with Bluetooth technologies, the advertisement mechanism used by Bluetooth is giving away the location of valuables to thieves. What challenges does Bluetooth present to valuables, are there mechanisms to defend against this,...

By Robin Mitchell | 12-09-2023

AMD Zenbleed Vulnerability Exposed: What You Need to Know Now

Recently, a new vulnerability was discovered that affects some AMD processors and can allow an attacker to potentially gather massive chunks of private data. How exactly does this attack work, why are speculative systems causing trouble in the security world,...

By Robin Mitchell | 08-08-2023

How Google's New Internet Access Policy Affects Cybersecurity

In a world where cyberattacks are a daily concern, Google has decided to trial a new program that will see volunteers have all internet access revoked during work. What challenges does internet access present, what will the program do, and is it right for comp...

By Robin Mitchell | 04-08-2023

US Unveils Cybersecurity Certification: A New Era for Smart Devices

In a world where technology is increasingly becoming a part of our daily lives, the security of smart devices is a concern that cannot be overlooked. The US government's recent announcement of a new certification program is a significant step in addressing thi...

By Robin Mitchell | 01-08-2023

Robotic Police Systems: A New Era of Security at Singapore's Changi Airport

While not exactly Robocop, police in Singapore have recently deployed two robotic police systems to help patrol the main international airport, offering additional eyes to police and improving situational awareness. What challenges do police face when patrolli...

By Robin Mitchell | 28-06-2023

Outdated Tech in UK Government: A Cybersecurity Threat Revealed by FOI Request

A recent Freedom of Information request by TaxPayers Alliance has revealed that many crucial government services, including HMRC, DHSC, and UK Atomic Energy, are using vulnerable and outdated services that are no longer supported by Microsoft, posing a signifi...

By Robin Mitchell | 26-06-2023

Cryptographic Keys Theft: Hackers Can Exploit Power LEDs via Video from 60 Feet

As the nature of cyberattacks continues to increase in complexity, engineers are facing increasing pressure to develop new methods to protect devices. Recently, researchers demonstrated a side-channel attack against a power LED of a smart card reader from 60 f...

By Robin Mitchell | 22-06-2023

How the EU's Potential Ban on Huawei Could Reshape the Telecom Industry

In response to EU member states lack of action against Chinese-sourced hardware in critical infrastructure, the EU is now considering a sweeping ban to protect states against high-risk companies.  The race to dominate the 5G landscape is more than just a compe...

By Robin Mitchell | 19-06-2023

Underwater Surveillance: Finland's Solution to Infrastructure Vulnerability

Recently, engineers from a Finnish company have developed an underwater surveillance system designed to protect infrastructure such as power cables and internet connections. What challenges does underwater infrastructure face, what did the engineers develop, a...

By Robin Mitchell | 18-05-2023

New Side-Channel Attack on ARM: Implications for IoT Security

Recently, researchers demonstrated a new side-channel attack against ARM TrustZone at the Black Hat Asia conference, but ARM has stated that the attack provides little threat to current ARM cores. What challenges do side-channel attacks present, what exactly w...

By Robin Mitchell | 15-05-2023

Samsung's New Stance on AI: The ChatGPT Controversy Explained

As ChatGPT takes the world by storm, there is growing concern regarding the role that AI plays in society and whether humanity should hold off from its integration. After a series of serious data breaches, Samsung is threatening its employees against using Cha...

By Robin Mitchell | 11-05-2023

Bluetooth Stalking: How Apple and Google are Fighting Back

The rise in tracking devices such as the Apple AirTag has helped thousands around the world to track lost luggage, figure out where car keys have been placed, and even identify if airport staff have stolen gifts from abroad. However, the rise in Bluetooth stal...

By Robin Mitchell | 11-05-2023