Why I think that U.S. house is hounded by phone trackers
25 Jan 2016
After the BBC contacted us for comment on this story I thought it’d be useful and interesting to share the details that were omitted, as well as the reasoning behind some of my assumptions (none of which involve the Bermuda triangle BTW).
Who is tracking your run? Run and bike activity tracking app privacy issues investigated
22 Jan 2016
Star Wars BB-8 IoT toy: awesome fun, but can it be turned to the Dark Side with this vulnerability?
06 Jan 2016
Tonight’s CSI Cyber: implausible Marla talking doll hack. Fiction stranger than truth for once
06 Oct 2015
My Friend Cayla. Updated app; Updated security fails. How to make her swear (again!)
22 Jun 2015
Encrypting the database has done virtually nothing to secure the doll and app.
Change your password to smiling, winking, pensive, sleepy….
17 Jun 2015
Or not. Why I think emoji PINs are mostly pointless.
Common coding fails when writing Android mobile apps
17 Jun 2015
It’s amazing how many simple issues create significant security holes.
Bring Your Own Device or Bring Your Own Security Disaster? Some simple MDM policy advice
29 Nov 2014
Adobe, eBay and other breaches. Should you change your password? Yes, but only if it’s a lousy password
05 Aug 2014
Is everything actually broken? Software will always be flawed, but here’s what you can do about it
17 Jun 2014
One-way password hashing is essential, but it’s even better if you select the right algorithm
12 Jun 2014
How to scrape plain text from an encrypted Android phone OR why most MDM products just don’t cut it
04 Jun 2014
WTF Heartbleed? Don’t make me move all my HTTPS services to HTTP and ditch SSL completely
09 Apr 2014
Keylogging domain creds; who needs a hash? Lock the victim’s workstation to order and snarf them immediately
03 Mar 2014
Cyber security kite mark being touted, but for what exactly? People? Passwords? Patches?
12 Dec 2013
iOS phone users still vulnerable to old PIN bypass vulnerabilities: Lesson – Update your stuff
09 Dec 2013