John-Paul PowerinThreat IntelMore than Human: Six Body Hacks that Give You Superpowers, KindaWe often hear about hacking computers, hacking smartphones, hacking email. But how about hacking your body?Jun 27, 2018Jun 27, 2018
John-Paul PowerinThreat IntelMaliciously Mobile: A Brief History of Mobile MalwareThreat Intel’s ‘History of…’ series looks at the origins and evolution of notable developments in cyber security. This week: mobile…Apr 12, 20182Apr 12, 20182
John-Paul PowerinThreat IntelAfter the Hack: Where Are These 5 Famous Hackers Now?These days, cyber crime is a regular part of the news, with mega breaches, malware outbreaks, and cyber heists making headlines. And while…Dec 14, 2017Dec 14, 2017
John-Paul PowerinThreat IntelQuantum leap: What will quantum computing mean for encryption?As further advances are made in the area of quantum computing, John-Paul Power ponders how developments in this area will impact encryption…Aug 23, 20172Aug 23, 20172
John-Paul PowerinThreat IntelThe Incredible Hack: Five of the worst on-screen hacking scenesPortraying hacking in film and on TV has always been tricky. We take a look at some of the worst hacking scenes ever produced.Aug 16, 2017Aug 16, 2017
John-Paul PowerinThreat IntelCelebrity vulnerabilities: A short history of bug brandingHeartbleed is one of the most famous “branded bugs” to have emerged over the years, but it is far from the only one.Jul 12, 2017Jul 12, 2017
John-Paul PowerinThreat IntelLevel up: Game safely by following these 6 top tipsFollow these 6 top tips to ensure you and your family stay safe when gaming online.Jun 14, 2017Jun 14, 2017
John-Paul PowerinThreat IntelSocial climbing: How social engineering became a dangerous cyber threatSocial engineering is often used to great success by cyber attackers. We take a look back at the history of the techniques it employs.May 4, 2017May 4, 2017