{"id":778,"date":"2021-01-03T13:36:47","date_gmt":"2021-01-03T13:36:47","guid":{"rendered":"http:\/\/lapsed.ordinary\/?page_id=778"},"modified":"2023-12-01T19:11:20","modified_gmt":"2023-12-01T19:11:20","slug":"writing","status":"publish","type":"page","link":"http:\/\/lapsed.ordinary\/writing\/","title":{"rendered":"Writing"},"content":{"rendered":"\n
I have been writing non-fiction for as long as I can reminder, from popular science articles as a mathematics student to various kinds of music journalism in the late 1990s and early 2000s.<\/p>\n\n\n\n
I started writing about digital security in 2007 next to my regular duties, with hundreds of blog posts published on Virus Bulletin’s blog<\/a>. I also kept a popular weekly threat intelligence newsletter<\/a> in 2018 and 2019.<\/p>\n\n\n\n This page contains a selection of my writing at Virus Bulletin and elsewhere on digital security, some of which can also be found on my Medium page<\/a>. More personal writing can be found on my blog<\/a>.<\/p>\n\n\n\n Field Guide to Incident Response for Civil Society and Media<\/a> (with Internews<\/em>, November 2023)<\/p>\n\n\n\n Global Trends in Digital Security: Civil Society and Media<\/a>, as well as country threat landscape reports for Armenia<\/a>, Brazil<\/a>, Mexico<\/a>, Serbia<\/a> and Ukraine<\/a> (with Internews <\/em>and Afef Abrougui, November 2023)<\/p>\n\n\n\n Malware Campaigns Targeting Armenian Infrastructure and Users<\/a> (with CyberHUB-AM<\/em>, October 2023)<\/p>\n\n\n\n Privacy tools (not) for you<\/a> (Silent Push<\/em>, December 2021)<\/p>\n\n\n\n Chapter (on stalkerware) in 97 Things Every Information Security Professional Should Know<\/a> (O’Reilly<\/em>, September 2021; book edited by Christina Morillo) <\/p>\n\n\n IcedID Command and Control Infrastructure<\/a> (Silent Push<\/em>, March 2021)<\/p>\n\n\n\n David Epstein \u2014 Range (book review)<\/a> (Medium<\/em>, January 2021)<\/p>\n\n\n\n It\u2019s Always DNS \u2013 But Not in the Way You May Think<\/a> (Tripwire<\/em>, January 2021)<\/p>\n\n\n\n The promises of secure email<\/a> (Medium<\/em>, December 2020)<\/p>\n\n\n\n IoT Devices: Privacy and Security in Abusive Relationships<\/a> (Tripwire<\/em>, October 2020)<\/p>\n\n\n PhantomLance Android malware highlights the complexity of the mobile threat<\/a> (Civilsphere<\/em>, May 2020)<\/p>\n\n\n\n Cybersecurity as a social science<\/a> (Virus Bulletin<\/em>, December 2019)<\/p>\n\n\n\n Stalkerware poses particular challenges to anti-virus products<\/a> (Virus Bulletin<\/em>, October 2019)<\/p>\n\n\n\n Threat intelligence teams should consider recruiting journalists<\/a> (Virus Bulletin<\/em>, January 2019)<\/p>\n\n\n\n The security industry is genuinely willing to help you do good work<\/a> (Virus Bulletin<\/em>, August 2018)<\/p>\n\n\n\n Brave Move Good For Tor And Privacy<\/a> (Forbes<\/em>, July 2018)<\/p>\n\n\n\n Turkish Twitter users targeted with mobile FinFisher spyware<\/a> (Virus Bulletin<\/em>, May 2018)<\/p>\n\n\n\n A crime against statistics that is probably worse than the cyber attacks faced in County Durham<\/a> (Virus Bulletin<\/em>, February 2018)<\/p>\n\n\n\n There is no evidence in-the-wild malware is using Meltdown or Spectre<\/a> (Virus Bulletin<\/em>, February 2018)<\/p>\n\n\n\n Book review: Serious Cryptography<\/a> (Virus Bulletin<\/em>, January 2018)<\/p>\n\n\n\n Tips on researching tech support scams<\/a> (Virus Bulletin<\/em>, January 2018)<\/p>\n\n\n\n Vulnerabilities play only a tiny role in the security risks that come with mobile phones<\/a> (Virus Bulletin<\/em>, November 2017)<\/p>\n\n\n\n The case against running Windows XP is more subtle than we think it is<\/a> (Virus Bulletin<\/em>, September 2017)<\/p>\n\n\n\n Patching is important even when it only shows the maturity of your security process<\/a> (Virus Bulletin<\/em>, September 2017)<\/p>\n\n\n\n By removing VPNs from its Chinese App Store, Apple turns its biggest security asset against its users<\/a> (Virus Bulletin<\/em>, August 2017)<\/p>\n\n\n\n WannaCry shows we need to understand why organizations don’t patch<\/a> (Virus Bulletin<\/em>, May 2017)<\/p>\n\n\n\n Why the SHA-1 collision means you should stop using the algorithm<\/a> (Virus Bulletin<\/em>, March 2017)<\/p>\n\n\n\n Security products and HTTPS: let’s do it better<\/a> (Virus Bulletin<\/em>, February 2017)<\/p>\n\n\n\n We shouldn’t forget those most vulnerable in our digital world<\/a> (Virus Bulletin<\/em>, February 2017)<\/p>\n\n\n\n To make Tor work better on the web, we need to be honest about it<\/a> (Virus Bulletin<\/em>, May 2016)<\/p>\n\n\n\n It’s fine for vulnerabilities to have names \u2014 we just need not to take them too seriously<\/a> (Virus Bulletin,<\/em> April 2016)<\/p>\n\n\n\n Security vendors should embrace those hunting bugs in their products<\/a> (Virus Bulletin<\/em>, February 2016)<\/p>\n\n\n\n (How) did they break Diffie-Hellman?<\/a> (Ars Technica<\/em>, November 2015)<\/p>\n\n\n \u2018Why I fell victim to a LinkedIn scam \u2013 and why I would do so again tomorrow\u2019<\/a> (grahamcluley.com<\/em>, September 2015)<\/p>\n\n\n\n You are your own threat model<\/a> (Virus Bulletin<\/em>, May 2015)<\/p>\n\n\n\n What would Cameron’s ‘anti-terrorism’ proposals mean for the UK?<\/a> (Virus Bulletin<\/em>, January 2015)<\/p>\n\n\n\n Book review: Countdown to Zero Day<\/a> (Virus Bulletin<\/em>, December 2014)<\/p>\n\n\n\n How the NSA cheated cryptography<\/a> (Lapsed Ordinary<\/em>, September 2013)<\/p>\n\n\n\n
\n\n\n\n<\/figure><\/div>\n\n\n
<\/figure><\/div>\n\n\n
<\/figure><\/div>\n\n\n