Regaining an advantage - the role of research

Now that we have looked at the work of cybercriminals, we will use two examples to illustrate how cyber security researchers work to reduce vulnerabilities and opportunities.

  • In our first example we show how work by Maryam Mehrnezhad and Ehsan Toreini at Newcastle University resulted in new security patches for mobile browsers, and updates to the World Wide Web Consortium (W3C) standards defining the access that web-browsers have to sensor information on mobile phones.

  • In the second example Martin Emms describes a loophole in the design of contactless payment cards which he calls ‘The Million Dollar Contactless Payment’.

In these examples you will get a feel for how cyber researchers are trying to stay one step ahead of cybercriminals. It is in the interests of companies to encourage this kind of research, and we will see more examples in Week 3.

Have you been recording your progress? Don’t forget to ‘Mark as complete’.

Share this article:

This article is from the free online course:

Cyber Security: Safety at Home, Online, in Life

Newcastle University

Get a taste of this course

Find out what this course is like by previewing some of the course steps before you join: