Regaining an advantage - the role of research
Now that we have looked at the work of cybercriminals, we will use two examples to illustrate how cyber security researchers work to reduce vulnerabilities and opportunities.
In our first example we show how work by Maryam Mehrnezhad and Ehsan Toreini at Newcastle University resulted in new security patches for mobile browsers, and updates to the World Wide Web Consortium (W3C) standards defining the access that web-browsers have to sensor information on mobile phones.
In the second example Martin Emms describes a loophole in the design of contactless payment cards which he calls ‘The Million Dollar Contactless Payment’.
In these examples you will get a feel for how cyber researchers are trying to stay one step ahead of cybercriminals. It is in the interests of companies to encourage this kind of research, and we will see more examples next week. If we have whetted your appetite to learn more with or join the team here at Newcastle University School of Computing, you might like to explore studying with us.
Have you been recording your progress? Don’t forget to ‘Mark as complete’.
© Newcastle University