Cyberwar is overhyped. The clear and present danger is the increase in criminal activity. And while mobile devices are vulnerable, they may also represent our chance to get information security right.
The Full Tilt
Stilgherrian delivers an undiluted dose of criticism and analysis of the ways digital technology is changing our world and the spin that goes with it.
Stilgherrian is a freelance journalist, commentator and podcaster interested in big-picture internet issues, especially security, cybercrime and hoovering up bulldust. He studied computing science and linguistics before a wide-ranging media career and a stint at running an IT business. He can write iptables firewall rules, set a rabbit trap, clear a jam in an IBM model 026 card punch and mix a mean whiskey sour.
Last year, we decided that 2011 had been IT's year of consolidation. Now, it seems like 2012 has been about vendors setting up their strategies for 2013, beyond cloud and BYOD and into big data.
Once all manner of everyday objects become equipped with processors and connectivity, we'll have the Internet of Things. Futurist Mark Pesce thinks the smartphone will be its remote control.
The website for last week's Click Frenzy online sale collapsed under an unexpectedly high load. It didn't have to; techniques do exist for building highly elastic web infrastructure.
Classic information security defences aren't up to the task of facing the latest fashions in attacks, according to Sourcefire founder and CTO Martin Roesch.
Australia's newly-announced internet "filtering" plan relies on an unprecedented interpretation of the law and will do little to prevent the spread of child abuse material.
The pre-Christmas versions of the three major mobile operating systems have now been released. Windows Phone 8 is challenging the dominance of Google's Android and Apple's iOS. How will it play out?
Search engines can find internet-exposed industrial control systems (ICS) devices, and a newly-discovered vulnerability means that many can be hacked. Are we getting closer to cybergeddon?
Data retention for law enforcement is one of the most important political issues relating to our use of the internet now and as far into the future as we care to imagine — and it's being mishandled.
Increasingly, we're being asked to identify ourselves in situations that offline would never have required.
VMware's vision of a virtualised future extends far beyond their existing desktop and server virtualisation products, to include virtualised mobile devices, and even software-defined data centres (SDD).
Distributed denial of service (DDoS) attacks, favoured tactic of hacktivists and extortionists alike, are getting bigger, more numerous, and even smarter.
With iOS version 6, Apple ditched Google Maps and went DIY, with disastrous results. According to geospatial specialist Dr Michael Dobson, this was entirely predictable.
The new Windows 8 user interface discards the desktop metaphor we've used for three decades, and replaces it with a panorama of coloured rectangles. Why? And how does it change the development process?
IBM's Michael Montecillo talks through good-guy hackers, click fraud, and his views on the profile of hacktivism, following the arrest of key Anonymous and LulzSec members.