• Global contact-tracing apps take divergent routes to beat Covid-19

    If there existed one thing right now that you’d think the whole world could unite on, it would surely be the need to throw all available scientific resources at trying to combat the spread of the coronavirus. And an essential part of combatting the spread of Covid-19 will be telecommunications, in particular contact-tracing apps that can monitor and mitigate the spread of the virus.

    But it is here that there is precisely no unity among countries, nor indeed within them. With few exceptions, the whole idea of contact tracing, while conceptually popular, has proven in practice to be hugely controversial,

    Read More
  • Subpostmasters receive their ‘inadequate’ damages over Horizon IT scandal

    Victims of covered-up IT errors in the Post Office’s branch accounting system have received the damages agreed in the settlement following a multimillion-pound trial.

    Although the subpostmasters had anticipated that the amounts they would receive would not come close to compensating them for their financial losses and suffering, seeing the figures in black and white has sparked fury.

    Subpostmasters won a High Court battle against the Post Office, which concluded in December, proving that the Horizon computer system they used was to blame for unexplained accounting shortfalls, and not them. Subpostmasters were prosecuted for theft and false accounting, with prison

    Read More
  • Why you should think before you Zoom

    Zero-day exploits are big business. As with the sale of guns, drugs, and hacking, not all sales or use of zero-day exploits are malign, although many may be. Security organisations will, for example, buy a zero-day exploit from the discoverer.

    The more commonly used the program, the more the zero-day exploit is worth. Zero-day exploits found for common Microsoft programs have a typical value of £25,000 or more.

    Many zero-day exploits are, however, not sold but placed into the public domain by their discovers, who are often security consultants. The “benefit” to the discoverer is positive publicity. But software that

    Read More