Results of a study undertaken by an SRA supported by School RKE funds.
“Things” as referred to in The Internet of “Things”, are everyday objects that have been adapted to be hosts for low energy sensors. These sensors provide the data thus enabling these “Things” (Devices) to communicate with a network of some kind, in order to either share data or be managed, using a range of Bluetooth and Wireless technologies.
Low energy sensors can be embedded into many devices such as light switches, door locks, power sockets and actuators, which in turn are used to control or monitor more complex things such as central heating systems and home security systems.
In recent news Amazon’s Prime Air has successfully completed its first drone delivery, and we get to see the actual flight footage … no simulation!
For a number of years we have known of the intentions for companies to experiment with the use of drones for the delivery of parcels. Back in 2015 we saw a video released by Amazon which explained how the process would work, for Amazon Prime Air, noting we could eventual see the delivery of individual packages within 30 minutes of ordering. Since, Amazon has begun its trials for Prime Air’s drone delivery service. Currently trials are being run nearby to Amazon’s drone testing facility near Cambridge.
Amazon released official footage of the first ever successful drone delivery in the middle of December 2016. The video (below) demonstrates a customer who ordered an Amazon TV streaming stick and a bag of popcorn to their own garden. It is reported that the delivery, with no human pilot involved, delivered the package to the customer in 13 minutes from the click for delivery (Bezos, 2016).
Our previous post by Joseph Williams titled ‘Bad passwords or just bad advice’ discussed the poor password habits of an online savvy society. Discussing that “the past few decades [of password advice] hasn’t quite sunk in” (Williams, 2016). In light of the leak of a Yahoo database, most likely tied to the huge data hack in recent headlines, researchers have once again looked at the most popular passwords uncovered.
Insecure passwords such as “123456”, “password”, “abc123”, “welcome” and “qwerty” were among the top ten exposed (Wang et al., 2016). Amongst these classic passwords, other users were using simple combinations of easily identifiable information (e.g. name, age and birthday). Generally, some users make their passwords easy to remember and simple for convenience. Yet, this leads us to an argument of convenience vs security. Continue reading
Victor Völzow presents his digital forensics Masterclass to CCCU students.
Our Computing, Digital Forensics and Cybersecurity students had the pleasure to be shown the complex and dynamic world of digital forensics, by Victor Völzow, an international speaker on the subject. Victor is a trainer in digital forensics in Germany with a background in policing. He started working in the field in 2007 and has been training forensic specialists from regional, federal, and international law enforcement since. Continue reading
To kick off the New Year, Canterbury Christ Church University invited Jonathan Haddock, a Network and Security engineer in local government, to join our third-year Networking class. He showed us a glimpse of his world by demonstrating ARP poisoning which is, for those of us not in the know, intercepting and modifying traffic between two hosts. Continue reading