{"id":778,"date":"2021-01-03T13:36:47","date_gmt":"2021-01-03T13:36:47","guid":{"rendered":"http:\/\/lapsed.ordinary\/?page_id=778"},"modified":"2023-12-01T19:11:20","modified_gmt":"2023-12-01T19:11:20","slug":"writing","status":"publish","type":"page","link":"http:\/\/lapsed.ordinary\/writing\/","title":{"rendered":"Writing"},"content":{"rendered":"\n

I have been writing non-fiction for as long as I can reminder, from popular science articles as a mathematics student to various kinds of music journalism in the late 1990s and early 2000s.<\/p>\n\n\n\n

I started writing about digital security in 2007 next to my regular duties, with hundreds of blog posts published on Virus Bulletin’s blog<\/a>. I also kept a popular weekly threat intelligence newsletter<\/a> in 2018 and 2019.<\/p>\n\n\n\n

This page contains a selection of my writing at Virus Bulletin and elsewhere on digital security, some of which can also be found on my Medium page<\/a>. More personal writing can be found on my blog<\/a>.<\/p>\n\n\n\n


\n\n\n\n

Field Guide to Incident Response for Civil Society and Media<\/a> (with Internews<\/em>, November 2023)<\/p>\n\n\n\n

Global Trends in Digital Security: Civil Society and Media<\/a>, as well as country threat landscape reports for Armenia<\/a>, Brazil<\/a>, Mexico<\/a>, Serbia<\/a> and Ukraine<\/a> (with Internews <\/em>and Afef Abrougui, November 2023)<\/p>\n\n\n\n

Malware Campaigns Targeting Armenian Infrastructure and Users<\/a> (with CyberHUB-AM<\/em>, October 2023)<\/p>\n\n\n\n

Privacy tools (not) for you<\/a> (Silent Push<\/em>, December 2021)<\/p>\n\n\n\n

Chapter (on stalkerware) in 97 Things Every Information Security Professional Should Know<\/a> (O’Reilly<\/em>, September 2021; book edited by Christina Morillo) <\/p>\n\n\n

\n
\"97<\/figure><\/div>\n\n\n

IcedID Command and Control Infrastructure<\/a> (Silent Push<\/em>, March 2021)<\/p>\n\n\n\n

David Epstein \u2014 Range (book review)<\/a> (Medium<\/em>, January 2021)<\/p>\n\n\n\n

It\u2019s Always DNS \u2013 But Not in the Way You May Think<\/a> (Tripwire<\/em>, January 2021)<\/p>\n\n\n\n

The promises of secure email<\/a> (Medium<\/em>, December 2020)<\/p>\n\n\n\n

IoT Devices: Privacy and Security in Abusive Relationships<\/a> (Tripwire<\/em>, October 2020)<\/p>\n\n\n

\n
\"Article<\/figure><\/div>\n\n\n

PhantomLance Android malware highlights the complexity of the mobile threat<\/a> (Civilsphere<\/em>, May 2020)<\/p>\n\n\n\n

Cybersecurity as a social science<\/a> (Virus Bulletin<\/em>, December 2019)<\/p>\n\n\n\n

Stalkerware poses particular challenges to anti-virus products<\/a> (Virus Bulletin<\/em>, October 2019)<\/p>\n\n\n\n

Threat intelligence teams should consider recruiting journalists<\/a> (Virus Bulletin<\/em>, January 2019)<\/p>\n\n\n\n

The security industry is genuinely willing to help you do good work<\/a> (Virus Bulletin<\/em>, August 2018)<\/p>\n\n\n\n

Brave Move Good For Tor And Privacy<\/a> (Forbes<\/em>, July 2018)<\/p>\n\n\n\n

Turkish Twitter users targeted with mobile FinFisher spyware<\/a> (Virus Bulletin<\/em>, May 2018)<\/p>\n\n\n\n

A crime against statistics that is probably worse than the cyber attacks faced in County Durham<\/a> (Virus Bulletin<\/em>, February 2018)<\/p>\n\n\n\n

There is no evidence in-the-wild malware is using Meltdown or Spectre<\/a> (Virus Bulletin<\/em>, February 2018)<\/p>\n\n\n\n

Book review: Serious Cryptography<\/a> (Virus Bulletin<\/em>, January 2018)<\/p>\n\n\n\n

Tips on researching tech support scams<\/a> (Virus Bulletin<\/em>, January 2018)<\/p>\n\n\n\n

Vulnerabilities play only a tiny role in the security risks that come with mobile phones<\/a> (Virus Bulletin<\/em>, November 2017)<\/p>\n\n\n\n

The case against running Windows XP is more subtle than we think it is<\/a> (Virus Bulletin<\/em>, September 2017)<\/p>\n\n\n\n

Patching is important even when it only shows the maturity of your security process<\/a> (Virus Bulletin<\/em>, September 2017)<\/p>\n\n\n\n

By removing VPNs from its Chinese App Store, Apple turns its biggest security asset against its users<\/a> (Virus Bulletin<\/em>, August 2017)<\/p>\n\n\n\n

WannaCry shows we need to understand why organizations don’t patch<\/a> (Virus Bulletin<\/em>, May 2017)<\/p>\n\n\n\n

Why the SHA-1 collision means you should stop using the algorithm<\/a> (Virus Bulletin<\/em>, March 2017)<\/p>\n\n\n\n

Security products and HTTPS: let’s do it better<\/a> (Virus Bulletin<\/em>, February 2017)<\/p>\n\n\n\n

We shouldn’t forget those most vulnerable in our digital world<\/a> (Virus Bulletin<\/em>, February 2017)<\/p>\n\n\n\n

To make Tor work better on the web, we need to be honest about it<\/a> (Virus Bulletin<\/em>, May 2016)<\/p>\n\n\n\n

It’s fine for vulnerabilities to have names \u2014 we just need not to take them too seriously<\/a> (Virus Bulletin,<\/em> April 2016)<\/p>\n\n\n\n

Security vendors should embrace those hunting bugs in their products<\/a> (Virus Bulletin<\/em>, February 2016)<\/p>\n\n\n\n

(How) did they break Diffie-Hellman?<\/a> (Ars Technica<\/em>, November 2015)<\/p>\n\n\n

\n
\"Op-ed<\/figure><\/div>\n\n\n

\u2018Why I fell victim to a LinkedIn scam \u2013 and why I would do so again tomorrow\u2019<\/a> (grahamcluley.com<\/em>, September 2015)<\/p>\n\n\n\n

You are your own threat model<\/a> (Virus Bulletin<\/em>, May 2015)<\/p>\n\n\n\n

What would Cameron’s ‘anti-terrorism’ proposals mean for the UK?<\/a> (Virus Bulletin<\/em>, January 2015)<\/p>\n\n\n\n

Book review: Countdown to Zero Day<\/a> (Virus Bulletin<\/em>, December 2014)<\/p>\n\n\n\n

How the NSA cheated cryptography<\/a> (Lapsed Ordinary<\/em>, September 2013)<\/p>\n\n\n\n

And the devil is six: the security consequences of the switch to IPv6<\/a> (Virus Bulletin<\/em> February 2012)<\/p>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

I have been writing non-fiction for as long as I can reminder, from popular science articles as a mathematics student to various kinds of music journalism in the late 1990s and early 2000s. I started writing about digital security in 2007 next to my regular duties, with hundreds of blog posts published on Virus Bulletin’s […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"http:\/\/lapsed.ordinary\/wp-json\/wp\/v2\/pages\/778"}],"collection":[{"href":"http:\/\/lapsed.ordinary\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/lapsed.ordinary\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/lapsed.ordinary\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/lapsed.ordinary\/wp-json\/wp\/v2\/comments?post=778"}],"version-history":[{"count":27,"href":"http:\/\/lapsed.ordinary\/wp-json\/wp\/v2\/pages\/778\/revisions"}],"predecessor-version":[{"id":1032,"href":"http:\/\/lapsed.ordinary\/wp-json\/wp\/v2\/pages\/778\/revisions\/1032"}],"wp:attachment":[{"href":"http:\/\/lapsed.ordinary\/wp-json\/wp\/v2\/media?parent=778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}