No just new products, but also a prolonged and active support

Professor Kevin Curran from IEEE spoked about privacy, cookie law and ransomware.

During MWC we’ve met lots of people that work in a business environment and talked about their company’s vision. We had a pleasant chat with an IT professor, Kevin Curran from Ulster University in Northern Ireland, IEEE senior member, the important organization that takes care of the technological progress with a particular attention to the advantages and benefits that are brought to humanity.

How is your visit to the MWC going? what do you think about the innovations presented here?
There’s a lot of fuss about 5G as the evolution of 4G, despite 4G being not a standard yet. Everybody's talking about Cloud and Internet of Things. All these technologies are important and interesting, but in my opinion there's a lack of attention to standardization and to the support of products that are announced and brought to the market for mere economical reasons.


It’s not a coincidence that one of the themes we’ve covered most in these days is security.
Sure, most companies sell new devices and products without putting due care to provide a prolonged support, to manage security updates that cover businesses and citizens and to prevent devices from being hacked or compromised.

Seen under this light, IoT is really scary: it won’t be “just” your router or PC to be attacked, but dozens of devices between your walls.

With that in mind, what do you think about the European legislation?
For sure there are some improvements, but not always in the right direction. Take for instance the cookie law, I don’t believe it achieved 100% of its goal: it should have limited users tracking, but in the end it brought only dozens of warnings to click without offering the user a real, effective control.

And what about the new European privacy law that will oblige companies to denounce any leak?
This time it’s a law that goes in the right direction. As I said, security will become a more and more important factor and only by discovering all attacks we can work on effective improvements. European and international governments must work to fight the tools and ways criminals use to attack people and companies. At the same time a law should be introduced clearly stating what the support period (from manufacturers) should be, for each device typology. Not just in terms of warranty, but also in terms of patching and updates, in order to guarantee the use in perfect safety even years after the release.

Lastly, what do you think about the evolution of ransomware attacks? Viruses nowadays have a different goals than in the past: making quick and effortless money.
Technological evolution in this field has been very quick, also by leveraging a value like BitCoins that surely must be better regulated because it’s the main channel used by these criminals to get paid. Ransomware will grow more and more in terms of sophistication. Just think about the recent infection that use a Javascript file as an attachment to create a multiplatform disease. Attacks to IoT devices will be even more dangerous in the business scenario, where ransomware attacks are more frequent, because the overall number of hackable devices grows and the collection of data coming from sensors and devices might be even more dangerous.

About the Author

Filippo Moriggia

After more than 10 years of experience in the technical journalism with PC Professionale (the italian version of PC Magazine) and other newspapers of Mondadori group, Filippo Moriggia founded GURU advisor, the reference website for IT professionals, system integrators, cloud providers and MSPs. He has a Master of Science in Telecommunications Engineering and works as a independent consultant and contractor for different firms. His main focuses are software, virtualization, servers, cloud, networking and security. He's certified VMware VCA for Data Center Virtualization.

banner eng

fb icon evo twitter icon evo

Word of the Day

The term Edge Computing refers, when used in the cloud-based infrastructure sphere, the set of devices and technologies that allows...

>

The acronym SoC (System on Chip) describes particular integrated circuit that contain a whole system inside a single physical chip:...

>

The acronym PtP (Point-to-Point) indicates point-to-point radio links realized with wireless technologies. Differently, PtMP links connects a single source to...

>

Hold Down Timer is a technique used by network routers. When a node receives notification that another router is offline...

>

In the field of Information Technology, the term piggybacking refers to situations where an unauthorized third party gains access to...

>
Read also the others...

Download of the Day

Netcat

Netcat is a command line tool that can be used in both Linux and Windows environments, capable of...

>

Fiddler

Fiddler is a proxy server that can run locally to allow application debugging and control of data in...

>

Adapter Watch

Adapter Watch is a tool that shows a complete and detailed report about network cards. Download it here.

>

DNS DataView

DNS DataView is a graphical-interface software to perform DNS lookup queries from your PC using system-defined DNS, or...

>

SolarWinds Traceroute NG

SolarWinds Traceroute NG is a command line tool to perform advanced traceroute in Windows environment, compared to the...

>
All Download...

Issues Archive

  •  GURU advisor: issue 21 - May 2019

    GURU advisor: issue 21 - May 2019

  • GURU advisor: issue 20 - December 2018

    GURU advisor: issue 20 - December 2018

  • GURU advisor: issue 19 - July 2018

    GURU advisor: issue 19 - July 2018

  • GURU advisor: issue 18 - April 2018

    GURU advisor: issue 18 - April 2018

  • GURU advisor: issue 17 - January 2018

    GURU advisor: issue 17 - January 2018

  • GURU advisor: issue 16 - october 2017

    GURU advisor: issue 16 - october 2017

  • GURU advisor: issue 15 - July 2017

    GURU advisor: issue 15 - July 2017

  • GURU advisor: issue 14 - May 2017

    GURU advisor: issue 14 - May 2017

  • 1
  • 2
  • 3
  • BYOD: your devices for your firm

    The quick evolution of informatics and technologies, together with the crisis that mined financial mines, has brought to a tendency inversion: users that prefer to work with their own devices as they’re often more advanced and modern than those the companies would provide. Read More
  • A switch for datacenters: Quanta LB4M

    You don’t always have to invest thousands of euros to build an enterprise-level networking: here’s our test of the Quanta LB4M switch Read More
  • Mobile World Congress in Barcelona

    GURU advisor will be at the Mobile World Congress in Barcelona from February 22nd to 25th 2016!

    MWC is one of the biggest conventions about the worldwide mobile market, we'll be present for the whole event and we'll keep you posted with news and previews from the congress.

    Read More
  • 1