Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Secure Lava Lamps, and Why True Internet Security Is Hard to Come by
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Secure Lava Lamps, and Why True Internet Security Is Hard to Come by
Internet of ThingsITSecurity

Secure Lava Lamps, and Why True Internet Security Is Hard to Come by

Melissa Thompson
Melissa Thompson
5 Min Read
Internet Security
SHARE

In an office building in San Francisco, there is a wall of 100 lava lamps. Red blobs in shimmering purple, sparkly green blobs in Caribbean-Sea blue, all moving up and down in a truly random pattern: These lava lamps are one business’s innovative solution to internet security.

Contents
  • Cyber-attacks aren’t going away — they’re becoming more effective.
  • Device and software developers aren’t helping with security.
  • It’s every user for themselves.

Cloudflare is a business that provides domain name services to millions of prominent websites. In recent years, cyber-attackers have become infatuated with attacking and taking down web hosts like Cloudflare; just over a year ago, a successful DDoS attack on Dyn took major web destinations like Reddit, Twitter, Netflix, and Spotify offline for several hours. Thus, Cloudflare and its competitors have become eager to build the best possible security measures — thus, the lava lamps.

Unlike humans and computers, lava lamps can produce true randomness. Using video, the company transforms the moving blobs into a stream of bytes, which can then be used as encryption keys to keep data safe. In its London offices, Cloudflare uses the movement of two pendulums as well as randomly generated mazes and Sudoku puzzles. In Singapore, Cloudflare creates encryption keys from a Geiger counter next to a pellet of Uranium. The lava lamps may seem eccentric, but they hint at something plaguing internet users around the world: Desperation.

Cyber-attacks aren’t going away — they’re becoming more effective.

Security experts like to refer to cybersecurity as an arms race: Cyber criminals are developing more advanced ways to infiltrate networks and devices, but security firms are also developing more enhanced defenses to thwart attacks. Unfortunately, this isn’t exactly accurate. Indeed, cyberattacks are becoming more diverse and increasingly effective, but it seems that security efforts can’t keep up. In just the first half of 2017, the volume of cyberattacks doubled compared to the second half of 2016. Worse, most cybercriminal activity originates in Russia, and nearly all activity targets victims in the U.S.

More Read

5 Ways Cloud ‘Supercharges’ Enterprise Initiatives
Why Are So Many Large and Small Companies Transitioning to AWS?
Contrasting the Different Data Encryption Techniques for Optimal Security
Big Data: Aspirin for Travelers’ Headaches
CEOs: Hold Your Team Accountable for Data Analysis

A spike in cyber criminal activity was predicted, but it has proven to be dramatically worse than experts believed. It is possible that recent successful attacks, like the WannaCry ransomware and the Reaper botnet, have generated interest in illegal activity and bolstered cybercriminals morale. However, a much more likely reason for the uptick in attacks is the booming Internet of Things.

Device and software developers aren’t helping with security.

The IoT is a fascinating development in technology sure to increase efficiency, improve decision-making, and generate revenue for businesses — if it doesn’t topple them with malware first. In their rush to get IoT devices on the market, most developers have released them with extreme and extensive vulnerabilities that allow cyber criminals easy access to connected networks.

In 2017, the number of logged vulnerabilities increased by roughly 30 percent over 2016; about 35 percent of those vulnerabilities contained a public exploit, and more than half of all vulnerabilities are remotely exploitable, meaning criminals can get in without having the devices in-hand. While about three-quarters of developers had offered solutions to their disclosed vulnerabilities, device users often neglect updates and patches, allowing the vulnerabilities to persist.

The emergence if the IoT is perhaps the most probable reason for the increase in vulnerabilities. Because IoT tech is so new, many developers are uncertain what security precautions are necessary. Fortunately, the U.S. Senate has proposed a bill that would mandate security standards in all IoT used in government buildings, which would ultimately revolutionize IoT security for everyone. However, this could be months or years away, allowing cybercriminals plenty of time to launch successful attacks using existing vulnerabilities.

It’s every user for themselves.

There exist some laws regarding internet security, but few actually help individuals and organizations stay protected or recover lost assets. Thus, users must understand the risks to their devices and data and employ reliable security precautions in their homes and on the road. Similarly, businesses must devise their own network security protocols that stay ahead of clever cyber criminals’ tactics.

Just as criminals continue to launch physical attacks — robbery, assault — they will never cease in their efforts to steal digital data and debilitate digital property. Until the government takes serious strides toward protecting U.S. citizens against cyberattack, we must do what we must to keep our devices and data safe — including, perhaps, buying a lava lamp or two.

TAGGED:CloudflarecyberattackscybersecurityIT security
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

student learning AI
Advanced Degrees Still Matter in an AI-Driven Job Market
Artificial Intelligence Exclusive
mobile device farm
How Mobile Device Farms Strengthen Big Data Workflows
Big Data Exclusive
composable analytics
How Composable Analytics Unlocks Modular Agility for Data Teams
Analytics Big Data Exclusive
fintech startups
Why Fintech Start-Ups Struggle To Secure The Funding They Need
Infographic News

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

data-driven cybersecurity
Analytics

How to Protect Your Small Business from Cyberattacks with Data Analytics

6 Min Read
how to protect your information online
Big DataSecurity

Is Your Data At Risk? Here’s How To Protect Your Information Online

5 Min Read
Big Data
Big DataITSecurity

Big Data: A Hidden Blessing or Increased Vulnerability for the Security of IT Systems?

4 Min Read

Resources to Protect Personal Privacy and Mobile Security

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?