Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    unusual trading activity
    Signal Or Noise? A Decision Tree For Evaluating Unusual Trading Activity
    3 Min Read
    software developer using ai
    How Data Analytics Helps Developers Deliver Better Tech Services
    8 Min Read
    ai for stock trading
    Can Data Analytics Help Investors Outperform Warren Buffett
    9 Min Read
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Secure Lava Lamps, and Why True Internet Security Is Hard to Come by
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Secure Lava Lamps, and Why True Internet Security Is Hard to Come by
Internet of ThingsITSecurity

Secure Lava Lamps, and Why True Internet Security Is Hard to Come by

Melissa Thompson
Melissa Thompson
5 Min Read
Internet Security
SHARE

In an office building in San Francisco, there is a wall of 100 lava lamps. Red blobs in shimmering purple, sparkly green blobs in Caribbean-Sea blue, all moving up and down in a truly random pattern: These lava lamps are one business’s innovative solution to internet security.

Contents
  • Cyber-attacks aren’t going away — they’re becoming more effective.
  • Device and software developers aren’t helping with security.
  • It’s every user for themselves.

Cloudflare is a business that provides domain name services to millions of prominent websites. In recent years, cyber-attackers have become infatuated with attacking and taking down web hosts like Cloudflare; just over a year ago, a successful DDoS attack on Dyn took major web destinations like Reddit, Twitter, Netflix, and Spotify offline for several hours. Thus, Cloudflare and its competitors have become eager to build the best possible security measures — thus, the lava lamps.

Unlike humans and computers, lava lamps can produce true randomness. Using video, the company transforms the moving blobs into a stream of bytes, which can then be used as encryption keys to keep data safe. In its London offices, Cloudflare uses the movement of two pendulums as well as randomly generated mazes and Sudoku puzzles. In Singapore, Cloudflare creates encryption keys from a Geiger counter next to a pellet of Uranium. The lava lamps may seem eccentric, but they hint at something plaguing internet users around the world: Desperation.

Cyber-attacks aren’t going away — they’re becoming more effective.

Security experts like to refer to cybersecurity as an arms race: Cyber criminals are developing more advanced ways to infiltrate networks and devices, but security firms are also developing more enhanced defenses to thwart attacks. Unfortunately, this isn’t exactly accurate. Indeed, cyberattacks are becoming more diverse and increasingly effective, but it seems that security efforts can’t keep up. In just the first half of 2017, the volume of cyberattacks doubled compared to the second half of 2016. Worse, most cybercriminal activity originates in Russia, and nearly all activity targets victims in the U.S.

More Read

machine learning can be trained to stop cyberattacks
ML is a Vital Defense Against Thwart Digital Attack Surfaces
The Sum of All Fears: From Vulnerability to Exploit, the Importance of Patch Management
Where is the Cloud?
Technologies and Analyses in CBS’ Person of Interest
US Postal Service Facing Cloud Compliance Issues

A spike in cyber criminal activity was predicted, but it has proven to be dramatically worse than experts believed. It is possible that recent successful attacks, like the WannaCry ransomware and the Reaper botnet, have generated interest in illegal activity and bolstered cybercriminals morale. However, a much more likely reason for the uptick in attacks is the booming Internet of Things.

Device and software developers aren’t helping with security.

The IoT is a fascinating development in technology sure to increase efficiency, improve decision-making, and generate revenue for businesses — if it doesn’t topple them with malware first. In their rush to get IoT devices on the market, most developers have released them with extreme and extensive vulnerabilities that allow cyber criminals easy access to connected networks.

In 2017, the number of logged vulnerabilities increased by roughly 30 percent over 2016; about 35 percent of those vulnerabilities contained a public exploit, and more than half of all vulnerabilities are remotely exploitable, meaning criminals can get in without having the devices in-hand. While about three-quarters of developers had offered solutions to their disclosed vulnerabilities, device users often neglect updates and patches, allowing the vulnerabilities to persist.

The emergence if the IoT is perhaps the most probable reason for the increase in vulnerabilities. Because IoT tech is so new, many developers are uncertain what security precautions are necessary. Fortunately, the U.S. Senate has proposed a bill that would mandate security standards in all IoT used in government buildings, which would ultimately revolutionize IoT security for everyone. However, this could be months or years away, allowing cybercriminals plenty of time to launch successful attacks using existing vulnerabilities.

It’s every user for themselves.

There exist some laws regarding internet security, but few actually help individuals and organizations stay protected or recover lost assets. Thus, users must understand the risks to their devices and data and employ reliable security precautions in their homes and on the road. Similarly, businesses must devise their own network security protocols that stay ahead of clever cyber criminals’ tactics.

Just as criminals continue to launch physical attacks — robbery, assault — they will never cease in their efforts to steal digital data and debilitate digital property. Until the government takes serious strides toward protecting U.S. citizens against cyberattack, we must do what we must to keep our devices and data safe — including, perhaps, buying a lava lamp or two.

TAGGED:CloudflarecyberattackscybersecurityIT security
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

Hidden AI, a risk?
Hidden AI, Real Risk: A Governance Roadmap For Mid-Market Organizations
Artificial Intelligence Exclusive Infographic
unusual trading activity
Signal Or Noise? A Decision Tree For Evaluating Unusual Trading Activity
Analytics Exclusive Infographic
Ai agents
AI Agent Trends Shaping Data-Driven Businesses
Artificial Intelligence Exclusive Infographic
Why Businesses Are Using Data to Rethink Office Operations
Why Businesses Are Using Data to Rethink Office Operations
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

cybersecurity importance
Best PracticesData ManagementExclusiveITPrivacySecurity

10 Helpful Ways To Ensure Data Centric Cybersecurity

9 Min Read
data-driven cybersecurity
Analytics

How to Protect Your Small Business from Cyberattacks with Data Analytics

6 Min Read
Internet of ThingsSecurity

The Hidden Dangers Of The Internet of Things [Infographic]

5 Min Read
Three Healthcare IT trends 2013
Uncategorized

Three Healthcare IT Trends for 2013

4 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?