Open in app

Sign In

Write

Sign In

John-Paul Power
John-Paul Power

341 Followers

Home

About

Published in Threat Intel

·Jun 27, 2018

More than Human: Six Body Hacks that Give You Superpowers, Kinda

In today’s modern world we often hear about hacking computers, hacking smartphones, hacking email. But how about hacking your body? I’m not talking full-on Neo from The Matrix here — no plugging a USB cable into the back of your head to become a kung-fu master — but some of…

Technology

5 min read

More than Human: Six Body Hacks that Give You Superpowers, Kinda
More than Human: Six Body Hacks that Give You Superpowers, Kinda
Technology

5 min read


Published in Threat Intel

·Apr 12, 2018

Maliciously Mobile: A Brief History of Mobile Malware

Threat Intel’s ‘History of…’ series will look at the origins and evolution of notable developments in cyber security. — It’s difficult to remember a time when you could sit in a café where people were having real-life conversations with other people sitting in the same café. These days, most coffee drinkers are too busy staring down at the tiny computer held in their hands. …

Security

7 min read

Maliciously Mobile: A Brief History of Mobile Malware
Maliciously Mobile: A Brief History of Mobile Malware
Security

7 min read


Published in Threat Intel

·Dec 14, 2017

After the Hack: Where Are These 5 Famous Hackers Now?

These days, cyber crime is a regular part of the news, with mega breaches, malware outbreaks, and cyber heists making headlines. And while black hat hackers may achieve notoriety when they commit their crimes or, more accurately, when they get caught, journalists are a fickle bunch and tend to quickly…

Cybersecurity

9 min read

After the Hack: Where Are These 5 Famous Hackers Now?
After the Hack: Where Are These 5 Famous Hackers Now?
Cybersecurity

9 min read


Published in Threat Intel

·Aug 23, 2017

Quantum leap: What will quantum computing mean for encryption?

Welcome to Threat Intel’s #WednesdayWisdom column, which aims to help improve your cyber security knowledge and keep you informed on important developments. What do IBM, Google, Lockheed Martin, the National Security Agency, Microsoft, AT&T, Airbus, and Fujitsu have in common? They all want a piece of the quantum cake. All…

Science

6 min read

Quantum leap: What will quantum computing mean for encryption?
Quantum leap: What will quantum computing mean for encryption?
Science

6 min read


Published in Threat Intel

·Aug 16, 2017

The Incredible Hack: Five of the worst on-screen hacking scenes

It seems like every film and TV show these days has some reference to hacking. After all, computers are a ubiquitous part of modern life. Some of us work all day on a computer then go home and play games on one, watch TV on one, have one strapped to…

Movies

7 min read

The Incredible Hack: Five of the worst on-screen hacking scenes
The Incredible Hack: Five of the worst on-screen hacking scenes
Movies

7 min read


Published in Threat Intel

·Jul 12, 2017

Celebrity vulnerabilities: A short history of bug branding

Threat Intel’s ‘History of…’ series will look at the origins and evolution of notable developments in cyber security. Cyber security folks were giving names to malware for decades, while vulnerabilities had to make do with plain old Common Vulnerabilities and Exposures (CVE) numbers, but that all changed in 2014, when…

Security

6 min read

Celebrity vulnerabilities: A short history of bug branding
Celebrity vulnerabilities: A short history of bug branding
Security

6 min read


Published in Threat Intel

·Jun 14, 2017

Level up: Game safely by following these 6 top tips

Welcome to Threat Intel’s #WednesdayWisdom column, which aims to help improve your cybersecurity knowledge and keep you informed on important developments. Whether you’re partial to a bit of zombie slaying in the latest installment in the Resident Evil franchise, prefer hunting something a little less scary and a lot more…

Tech

6 min read

Level up: Game safely by following these 6 top tips
Level up: Game safely by following these 6 top tips
Tech

6 min read


Published in Threat Intel

·May 4, 2017

Social climbing: How social engineering became a dangerous cyber threat

Threat Intel’s ‘History of…’ series will look at the origins and evolution of notable developments in cyber security. Humans and software really aren’t that different when it comes to being exploited. Vulnerabilities in both software and people can be taken advantage of by attackers to get what they want. …

Cybersecurity

9 min read

Social climbing: How social engineering became a dangerous cyber threat
Social climbing: How social engineering became a dangerous cyber threat
Cybersecurity

9 min read

John-Paul Power

John-Paul Power

341 Followers
Following
  • Rhett Allain

    Rhett Allain

  • Ethan Siegel

    Ethan Siegel

  • Ryan Kazanciyan

    Ryan Kazanciyan

  • Medium

    Medium

  • Hon Lau

    Hon Lau

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech