Free Online Website Malware Scanner
check website for malware and vulnerability exploits online

No Malware Detected By Free Online Website Scan On This Website.

A free external scan did not find malicious activity on your website. If you still think that your website is infected with malware or hacked, please subscribe to a plan, we will scan your website internally and perform a full manual audit of your site as well as clean any infection that our free scanner didn't pick up.

Protect Your Website Now!

Is this plan for me?

website security plans and features
Normalized URL:  http://benthamsgaze.org:80
Submission date: Mon Jan 29 03:28:41 2018
Server IP address: 128.16.12.199
Country: United Kingdom
Server: Apache/2.2.15
Malicious files: 0
Suspicious files: 0
Potentially Suspicious files: 0
Clean files: 101
External links detected: 1390
Iframes scanned: 8
Blacklisted: No

No Malware Detected By Free Online Website Scan On This Website.

A free external scan did not find malicious activity on your website. If you still think that your website is infected with malware or hacked, please subscribe to a plan, we will scan your website internally and perform a full manual audit of your site as well as clean any infection that our free scanner didn't pick up.

Protect Your Website Now!

Is this plan for me?

website security plans and features
/xmlrpc.php?rsd
Severity:
Clean
Reason:
No significant issues detected.
Details:
No significant issues detected.
File size[byte]:
860
File type:
XML
Page/File MD5:
B47487392231795F3416134E4BBF6D24
Scan duration[sec]:
0.018
/xmlrpc.php
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
42
File type:
ASCII
Page/File MD5:
1A172802B8EA33D47692EA6782F4FAF1
Scan duration[sec]:
0.011
/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
131110
File type:
HTML
Page/File MD5:
F3586BEC013BA03FD7F7844236FB9122
Scan duration[sec]:
1.639
/#content
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
131110
File type:
HTML
Page/File MD5:
F3586BEC013BA03FD7F7844236FB9122
Scan duration[sec]:
0.981
/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
131110
File type:
HTML
Page/File MD5:
F3586BEC013BA03FD7F7844236FB9122
Scan duration[sec]:
0.919
/wp-json/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
54748
File type:
ASCII
Page/File MD5:
2D884F422DE3B49B277373FE5C4AA4DB
Scan duration[sec]:
0.356
/feed/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
No significant issues detected.
File size[byte]:
127200
File type:
XML
Page/File MD5:
70AD818FC7A91871F349F487942E6B64
Scan duration[sec]:
0.679
/subscribing-to-benthams-gaze/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
39111
File type:
HTML
Page/File MD5:
05983CE3B59D5AE4A50BDE39C65C27C5
Scan duration[sec]:
0.353
/about/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
40523
File type:
HTML
Page/File MD5:
F13DFEE0B089837DEF105936834358CD
Scan duration[sec]:
0.288
/wp-includes/wlwmanifest.xml
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
1045
File type:
XML
Page/File MD5:
DFD490B6F383EA02A269031FF05E8896
Scan duration[sec]:
0.001
/contribution-policy/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
37191
File type:
HTML
Page/File MD5:
E42BB68FBBC7C9C7FD073CC36E0A42BA
Scan duration[sec]:
0.312
/2016/01/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
58167
File type:
HTML
Page/File MD5:
9262A0C1C68E29CBEB9640E9B9DC0AB1
Scan duration[sec]:
0.457
/2016/09/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
46352
File type:
HTML
Page/File MD5:
A7E9B41ACFB76C2F833058AFA14E4D4D
Scan duration[sec]:
0.361
/2016/11/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
75600
File type:
HTML
Page/File MD5:
ED60CE8EF07C407C0A39ED9981722D89
Scan duration[sec]:
0.693
/2016/02/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
56377
File type:
HTML
Page/File MD5:
2018A0851F382FF5139A0D6018C67041
Scan duration[sec]:
0.381
/2016/07/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
62224
File type:
HTML
Page/File MD5:
B72034B1199C2161DF0EEE0DE2054196
Scan duration[sec]:
0.846
/2016/10/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
45954
File type:
HTML
Page/File MD5:
FB373C4F367D666B33BC1B3E9E877E71
Scan duration[sec]:
0.615
/2016/05/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
46486
File type:
HTML
Page/File MD5:
8EC6D2A58E70F71F25F505998A14002F
Scan duration[sec]:
0.47
/2016/04/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
38892
File type:
HTML
Page/File MD5:
BE5B6BA92E164151B28E93276B87CC23
Scan duration[sec]:
0.45
/2016/08/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
51503
File type:
HTML
Page/File MD5:
ADA59D4FB0EE0EF23B41468A0F03C868
Scan duration[sec]:
0.647
/2016/12/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
43259
File type:
HTML
Page/File MD5:
7073EB179A7A0EB4951DEFC79E938EB5
Scan duration[sec]:
0.51
/2016/06/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
61431
File type:
HTML
Page/File MD5:
A61E2A4E808586B8B665F8EC4CFEA35E
Scan duration[sec]:
0.838
/2016/03/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
49748
File type:
HTML
Page/File MD5:
C8FFF7845C07A80C4479C4A144BF591C
Scan duration[sec]:
0.49
/2015/01/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
41266
File type:
HTML
Page/File MD5:
B0A4C548F629F55CA430C1517F086D8B
Scan duration[sec]:
1.217
/2015/09/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
41894
File type:
HTML
Page/File MD5:
C2C3690D24E0AF822B0E25BC04DEFFA7
Scan duration[sec]:
0.555
/2015/11/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
53584
File type:
HTML
Page/File MD5:
76DF8FB7E2429E9DE5D78ECD2ABCDA3E
Scan duration[sec]:
0.625
/2015/02/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
50033
File type:
HTML
Page/File MD5:
7EBD184DF2236CC4D364B919D8AADC66
Scan duration[sec]:
0.504
/2015/07/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
38080
File type:
HTML
Page/File MD5:
ABA205C2C20A0B2E8F674C1F75A444C5
Scan duration[sec]:
0.4
/2015/10/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
59120
File type:
HTML
Page/File MD5:
60385A7D31D5C02735B3ED27AAA14137
Scan duration[sec]:
0.62
/2015/05/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
50167
File type:
HTML
Page/File MD5:
D4C6967EDA158CA19D1CE157A88E2BE3
Scan duration[sec]:
0.715
/2015/04/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
42965
File type:
HTML
Page/File MD5:
FBFD91962B1A13FAF83F5FECB31614D2
Scan duration[sec]:
0.856
/2015/08/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
37223
File type:
HTML
Page/File MD5:
739AC77033F0086344EDE61BDA995A14
Scan duration[sec]:
0.416
/2015/12/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
60709
File type:
HTML
Page/File MD5:
ACFBDD7AB9E4F2CE3721102AC40DA756
Scan duration[sec]:
0.558
/2015/06/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
39447
File type:
HTML
Page/File MD5:
519BBE2A3CCCC0F979EFCE060B200F07
Scan duration[sec]:
0.468
/2015/03/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
48043
File type:
HTML
Page/File MD5:
2069E7D639FC8719B1FE9395BBF96B8E
Scan duration[sec]:
0.649
/2018/01/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
45315
File type:
HTML
Page/File MD5:
CA3DBB97C0241520BF9201697E4606AB
Scan duration[sec]:
0.447
/2017/01/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
58817
File type:
HTML
Page/File MD5:
67BB6372F0D4B6E956DB3849CA28D021
Scan duration[sec]:
0.932
/2017/11/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
40749
File type:
HTML
Page/File MD5:
119EF7E245D422BA5FB8FAB3D55A6C36
Scan duration[sec]:
0.32
/2017/02/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
39665
File type:
HTML
Page/File MD5:
18FEB186648A9B1B0FD189F8CCE2DED3
Scan duration[sec]:
0.425
/2017/07/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
63306
File type:
HTML
Page/File MD5:
F4A4263E5B2ABB1B456C6005CA3C9069
Scan duration[sec]:
0.904
/2017/10/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
55846
File type:
HTML
Page/File MD5:
339CD3393631EE8A2C96102CE2327D3C
Scan duration[sec]:
0.491
/2017/05/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
87771
File type:
HTML
Page/File MD5:
29F517886AC1412FA4922E340B415401
Scan duration[sec]:
0.677
/2017/04/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
38530
File type:
HTML
Page/File MD5:
D1344D5F3B51A974D9BD412613D757D1
Scan duration[sec]:
0.308
/2017/08/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
78824
File type:
HTML
Page/File MD5:
6FE1478B9D446C4A6B71A6EDF4CEE228
Scan duration[sec]:
0.641
/2017/12/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
43092
File type:
HTML
Page/File MD5:
89CAAD86DF98B6F367D9D50763100EB5
Scan duration[sec]:
0.348
/2017/03/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
54612
File type:
HTML
Page/File MD5:
06CED14A5D53F3EB2FAE97DBF5908E76
Scan duration[sec]:
0.399
/comments/feed/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
No significant issues detected.
File size[byte]:
14862
File type:
XML
Page/File MD5:
39953B5964F6AC9E47D6458EC528F260
Scan duration[sec]:
0.087
/category/crime-science/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
71156
File type:
HTML
Page/File MD5:
7A54E265B2E9905DADD912BE05457202
Scan duration[sec]:
0.564
/category/censorship-resistance/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
68649
File type:
HTML
Page/File MD5:
ED52D7859A65438A3FF044B17997E1DB
Scan duration[sec]:
0.396
/category/operating-systems/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
46607
File type:
HTML
Page/File MD5:
8F50232F10AAC84A88F6E87A1AD4F49B
Scan duration[sec]:
0.291
/category/genomics/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
63553
File type:
HTML
Page/File MD5:
0F4F965683784DF28ED75C0E03B4E046
Scan duration[sec]:
0.461
/category/blockchain/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
109186
File type:
HTML
Page/File MD5:
D0F67E48F2BBCDE85DABB8F7EAF0454E
Scan duration[sec]:
0.673
/category/measurement/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
109248
File type:
HTML
Page/File MD5:
CC6819FC912313F8E9CB84992DCF35CE
Scan duration[sec]:
0.749
/category/cryptocurrencies/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
113089
File type:
HTML
Page/File MD5:
9EF5242487E1D176FEB85797535305A5
Scan duration[sec]:
0.849
/category/the-conversation/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
94138
File type:
HTML
Page/File MD5:
97A821BF47ED448B608AABC7BC333D5E
Scan duration[sec]:
0.687
/category/talks-and-panels/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
69848
File type:
HTML
Page/File MD5:
EF61532FD287E3E697BB33BA03EEA342
Scan duration[sec]:
0.554
/category/infosec/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
90474
File type:
HTML
Page/File MD5:
768ABB645D099F8AF2449AF58085DD8A
Scan duration[sec]:
0.692
/category/malware/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
121906
File type:
HTML
Page/File MD5:
3A81D226E6155D2E82928F3A369C1B07
Scan duration[sec]:
0.755
/category/education/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
107212
File type:
HTML
Page/File MD5:
B8E65223BE3B141B787EFD32A57B4D79
Scan duration[sec]:
1.062
/category/inside-infosec/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
66110
File type:
HTML
Page/File MD5:
840EF7A9C2D69E59F67C3A0652E6242C
Scan duration[sec]:
0.522
/category/networking/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
49470
File type:
HTML
Page/File MD5:
65243BD4671C81E9BDAB84FF5AA02187
Scan duration[sec]:
0.313
/category/public-policy/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
131383
File type:
HTML
Page/File MD5:
6CDB46E4DD98486D87DFBA905C60986B
Scan duration[sec]:
0.905
/category/internet-security/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
116505
File type:
HTML
Page/File MD5:
0A05A567C3735B2908DD2CF5CDF8FFCC
Scan duration[sec]:
0.746
/category/cyber-crime/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
123096
File type:
HTML
Page/File MD5:
6DB74088265C25E2D91297833205C1C6
Scan duration[sec]:
0.764
/category/banking-security/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
108641
File type:
HTML
Page/File MD5:
3E054E29D22F64021CEA21DBFC0C52FF
Scan duration[sec]:
1.214
/category/social-networks/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
44640
File type:
HTML
Page/File MD5:
FDA144A5E845BBAC628B8F5AC6250FC0
Scan duration[sec]:
0.404
/category/hardware/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
51214
File type:
HTML
Page/File MD5:
7F5914C34E843E309D97695D92BFC68E
Scan duration[sec]:
0.366
/category/meta/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
42832
File type:
HTML
Page/File MD5:
BA4EB20BB209E97268FE265004BD4743
Scan duration[sec]:
0.296
/category/cryptography/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
114113
File type:
HTML
Page/File MD5:
8A06F78A7FFE8BC17DB592FF921B4F30
Scan duration[sec]:
0.838
/category/research-projects/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
56279
File type:
HTML
Page/File MD5:
F40BBC8D93FBD74E6FDE2CDFCC7831C6
Scan duration[sec]:
0.822
/category/advertising/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
85966
File type:
HTML
Page/File MD5:
A44FF10EA562ED3C5EA189F75836B9F8
Scan duration[sec]:
0.686
/category/law-enforcement/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
107158
File type:
HTML
Page/File MD5:
514A033605D70A27E42BD4526DC3C148
Scan duration[sec]:
0.696
/category/authentication/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
119795
File type:
HTML
Page/File MD5:
FD7674033F55910BE02852DF23828C69
Scan duration[sec]:
1.027
/category/mobile/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
101301
File type:
HTML
Page/File MD5:
1910D894FCA571412C3031B3D4F5F7F2
Scan duration[sec]:
0.689
/category/biometrics/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
45933
File type:
HTML
Page/File MD5:
3723B74FC7ABF314D62785BD25A585F2
Scan duration[sec]:
0.314
/category/modelling/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
57121
File type:
HTML
Page/File MD5:
4744383B45856C8297E675146818DDD4
Scan duration[sec]:
0.417
/category/privacy/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
117757
File type:
HTML
Page/File MD5:
BC2D4D2A066461530A20C799E173AE1F
Scan duration[sec]:
1.057
/category/security-usability/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
122660
File type:
HTML
Page/File MD5:
8DC8976AC82E3554EFB47E71834717CA
Scan duration[sec]:
0.881
/category/security-economics/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
119249
File type:
HTML
Page/File MD5:
AD8E7452EBC1C9FB21DC6D88C2E31172
Scan duration[sec]:
0.769
/category/legal-issues/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
99762
File type:
HTML
Page/File MD5:
10E9D1BD6211D50AB7365FBEBDDFE90B
Scan duration[sec]:
0.833
/2018/01/16/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
41607
File type:
HTML
Page/File MD5:
F923D1E1052151735A9C9319B867EF1D
Scan duration[sec]:
0.29
/2018/01/23/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
36970
File type:
HTML
Page/File MD5:
4CB3D4084902AE77FD0617A81C126744
Scan duration[sec]:
0.249
/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
10056
File type:
ASCII
Page/File MD5:
7121994EEC5320FBE6586463BF9651C2
Scan duration[sec]:
0.123
/wp-includes/js/jquery/jquery.js?ver=1.12.4
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
97184
File type:
ASCII
Page/File MD5:
8610F03FE77640DEE8C4CC924E060F12
Scan duration[sec]:
2.376
/wp-content/themes/twentyfifteen/style.css?ver=4.9.1
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
97828
File type:
ASCII
Page/File MD5:
0C593A8F03F794AF0C75A72E0646AE61
Scan duration[sec]:
1.14
/wp-content/themes/twentyfifteen-child/style.css?ver=4.9.1
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
3323
File type:
ASCII
Page/File MD5:
FE1BEB62CCBEE48FE622C5C85DB026A8
Scan duration[sec]:
0.03
/wp-content/themes/twentyfifteen-child/fonts.css
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
10328
File type:
ASCII
Page/File MD5:
9D74186A57E2044F7FD415FAC0E4A00F
Scan duration[sec]:
0.081
/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-82830
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
68859
File type:
HTML
Page/File MD5:
6736D30A73C9763529AF3E37ED2ADA82
Scan duration[sec]:
0.433
/2018/01/16/practicing-a-science-of-security/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
45389
File type:
HTML
Page/File MD5:
A8A139FF52DBA1EEED5686D791573701
Scan duration[sec]:
0.315
/2018/01/23/smart-contracts-and-bribes/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
46788
File type:
HTML
Page/File MD5:
55D52BDFC8BC26A43B90D2996D26FD40
Scan duration[sec]:
0.322
/2017/11/13/systematizing-consensus-in-the-age-of-blockchains/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
44725
File type:
HTML
Page/File MD5:
26340FA7C5E49C7893CC64A0A59A332E
Scan duration[sec]:
0.28
/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-82505
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
74274
File type:
HTML
Page/File MD5:
84037929A9D7672B55EB5FD7DA2D390A
Scan duration[sec]:
0.534
/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
74273
File type:
HTML
Page/File MD5:
CFA21AE2FDB275BE008DE6D7F37D14FF
Scan duration[sec]:
0.543
/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-82084
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
59430
File type:
HTML
Page/File MD5:
7C610CF09DF3969D591624B2A7DB1039
Scan duration[sec]:
0.396
/2017/08/22/should-you-phish-your-own-employees/#comment-79575
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
56065
File type:
HTML
Page/File MD5:
DB713341396C7612EAFF9305E0E2CF27
Scan duration[sec]:
0.39
/2017/08/22/should-you-phish-your-own-employees/#comment-79517
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
56065
File type:
HTML
Page/File MD5:
043C7D18B3BA853486FEEDE53DEFD27F
Scan duration[sec]:
0.394
/2017/12/13/a-critical-analysis-of-genome-privacy-research/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
55374
File type:
HTML
Page/File MD5:
825A7F34A2DC1EE2AADD83F4B894BCF1
Scan duration[sec]:
0.402
/wp-content/themes/twentyfifteen/genericons/genericons.css?ver=3.2
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
27519
File type:
ASCII
Page/File MD5:
C4A5F119C255C653E1FF74AF2B021BAF
Scan duration[sec]:
0.001
/wp-content/themes/twentyfifteen/js/html5.js
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
2432
File type:
ASCII
Page/File MD5:
E95CA1122287C8B6889B126AC893B750
Scan duration[sec]:
0.001
/wp-content/themes/twentyfifteen/css/ie.css?ver=20141010
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
14134
File type:
ASCII
Page/File MD5:
711F3D7BE79B01A20EED7B0AC82CAEA5
Scan duration[sec]:
0.107
/wp-content/themes/twentyfifteen/css/ie7.css?ver=20141010
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
1159
File type:
ASCII
Page/File MD5:
6468F9823D831D5B4B4D37D5C52C88AC
Scan duration[sec]:
0.001

No Malware Detected By Free Online Website Scan On This Website.

A free external scan did not find malicious activity on your website. If you still think that your website is infected with malware or hacked, please subscribe to a plan, we will scan your website internally and perform a full manual audit of your site as well as clean any infection that our free scanner didn't pick up.

Protect Your Website Now!

Is this plan for me?

website security plans and features
https://www.iacr.org/misc/us-immigration-ban.html
https://www.computer.org/cms/computer.org/computingnow/pdfs/ieeesecurityprivacy-spearphishing-jan-feb2014.pdf
https://github.com/stonecoldpat/briberycontracts/blob/master/historyrevisioncon.sol
https://www.genomicsengland.co.uk/
https://eugenekolo.com/static/paybreak.pdf
https://www.benthamsgaze.org/comments/feed/
https://theintercept.com/2015/09/28/death-athens-rogue-nsa-operation/
https://www.benthamsgaze.org/2017/03/24/battery-status-not-included-assessing-privacy-in-w3c-web-standards/
https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
http://www.emvco.com/download_agreement.aspx?id%3D1023
https://www.benthamsgaze.org/2015/02/09/sequencing-your-genome-is-becoming-an-affordable-reality-but-at-what-personal-cost/
http://www0.cs.ucl.ac.uk/staff/s.meiklejohn/files/ndss16.pdf
https://www.cesg.gov.uk/news/awareness-only-first-step
https://www.benthamsgaze.org/category/security-economics/page/2/
https://blog.lukaszolejnik.com/
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-74488
http://freehaven.net/doc/wupss04/usability.pdf
https://www.benthamsgaze.org/2015/03/30/banks-undermine-security/
http://www.ucl.ac.uk/bentham-project/who/autoicon
https://www.benthamsgaze.org/wp-content/uploads/2016/11/privkeypubkeypubadd.png
https://www.youtube.com/channel/ucddgde-emc-tsyp7xy4pk9w
https://www.benthamsgaze.org/about/feed/
https://en.wikipedia.org/wiki/rice%27s_theorem
https://www.benthamsgaze.org/2015/05/06/understanding-online-dating-scams/#respond
http://arxiv.org/pdf/1605.05077v1
https://www.w3.org/tr/battery-status/
https://www.benthamsgaze.org/2015/12/08/new-eu-itn-privacy-and-us/#respond
https://www.benthamsgaze.org/2016/08/
http://sec.cs.ucl.ac.uk/ace_csr/news_announcements/article/luca_melis_prof_danezis_and_dr_de_cristofaro_awarded_the_data_protection_by_design_award/
https://www.benthamsgaze.org/wp-content/uploads/2016/09/ttd320k-medians.png
http://resources.sei.cmu.edu/library/asset-view.cfm?assetid%3D52324
https://www.benthamsgaze.org/category/law-enforcement/page/2/
benthamsgaze.org/mailto:cs-infosec-news-join@ucl.ac.uk
https://www.benthamsgaze.org/category/education/page/2/
https://www.benthamsgaze.org/2017/03/
https://www.benthamsgaze.org/2016/03/04/privately-gathering-statistics-and-training-simple-models/#respond
https://www.benthamsgaze.org/author/lonwuzur/
https://trac.torproject.org/projects/tor/wiki/org/doc/listofservicesblockingtor
http://blogs.bmj.com/bmj/2017/07/18/emiliano-cristofaro-genome-data-can-never-be-fully-anonymised/
http://j00ru.vexillium.org/?p%3D1695
https://www.benthamsgaze.org/2017/12/
https://www.informatics.indiana.edu/xw7/papers/wang2009learning.pdf
https://www.benthamsgaze.org/2015/03/06/why-benthams-gaze/#comments
https://theconversation.com/the-talktalk-hack-story-shows-uk-cybersecurity-in-disarray-49909
https://www.benthamsgaze.org/category/malware/feed/
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/js/functions.js?ver%3D20150330
https://www.ncsc.gov.uk/blog-post/what-does-ncsc-think-password-managers
https://www.benthamsgaze.org/2017/07/04/epfl-blockchain-summer-school/#respond
https://www.eff.org/cases/re-warrant-microsoft-email-stored-dublin-ireland
http://www.theukcardsassociation.org.uk/news/response-to-bbc.asp
https://www.benthamsgaze.org/2017/05/03/online-security-wont-improve-until-companies-stop-passing-the-buck-to-the-customer/#comments
http://www0.cs.ucl.ac.uk/staff/s.meiklejohn/
https://www.benthamsgaze.org/?p%3D1957
https://secure.gravatar.com/avatar/209d8131fd2b6499f9a0923cedca31c5?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2015/11/03/category-errors-in-information-security-how-logic-can-help/#more-364
https://ghr.nlm.nih.gov/condition/beta-thalassemia
http://genomeprivacy.org
http://en.chessbase.com/post/the-magical-che-experiment
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic4.png
http://news.microsoft.com/europe/2015/11/11/45283/#sm.0001fs08oxb4de92t4n20e8ziiysa
http://www.independent.co.uk/news/uk/politics/uk-cyber-security-chief-gchq-internet-passwords-guidelines-ciaran-martin-national-centre-a7578976.html
https://www.benthamsgaze.org/wp-content/uploads/2016/06/figure_1-300x172.png
https://arxiv.org/abs/1705.06947
http://www.hps.pitt.edu/profile/mitchell.php
https://www.benthamsgaze.org/2016/07/29/
https://www.benthamsgaze.org/2016/04/21/come-work-with-us/#respond
https://sensorsprivacy.com/
http://discovery.ucl.ac.uk/1475820/
https://www.benthamsgaze.org/2015/10/14/
https://www.eff.org/document/digital-rights-ireland-limited-liberty-open-rights-group-second-circuit-amicus-brief
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation-meilof-veeningen.pdf
https://www.cs.columbia.edu/~smb/blog/2017-05/2017-05-16.html
http://z.cash/
http://curia.europa.eu/jcms/upload/docs/application/pdf/2014-04/cp140054en.pdf
https://www.benthamsgaze.org/2017/05/23/find-security-champions-in-blends-of-organisational-culture/
https://eugenekolo.com/static/desert.jpg
http://lukaszolejnik.com/rtbdesc2
benthamsgaze.org/#content
https://www.benthamsgaze.org/category/internet-security/
https://www.emvco.com/documents/emvco_response_to_cambridge_report.pdf
https://www.benthamsgaze.org/category/operating-systems/
https://emilianodc.com/papers/wgs-privacy.pdf
https://lucamelis.github.io/
https://www.benthamsgaze.org/page/2/
https://secure.gravatar.com/avatar/a77161b7ffca01157f5d45da3932a3cc?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2016/02/09/jens-groth-non-interactive-zero-knowledge-proofs-efficient-enough-to-be-used-in-practice/#more-357
http://dictionary.cambridge.org/dictionary/english/authorize
https://www.benthamsgaze.org/wp-content/uploads/2016/09/393617_alastair_clark_aclark_2360661_860598830.pdf
https://www.benthamsgaze.org/2015/09/29/mathematical-modelling-in-the-two-cultures/
https://www.youtube-nocookie.com/embed/4s4pkcggiw4
https://www.benthamsgaze.org/author/jgroth/
https://www.wsj.com/articles/the-man-who-wrote-those-password-rules-has-a-new-tip-n3v-r-m1-d-1502124118
https://www.benthamsgaze.org/2017/05/09/underground-abracardabra-understanding-carding-forums/#respond
https://www.benthamsgaze.org/wp-content/uploads/2016/11/detailedblockchain.png
https://www.benthamsgaze.org/2017/05/23/find-security-champions-in-blends-of-organisational-culture/#more-1571
http://www0.cs.ucl.ac.uk/staff/a.sonnino/
https://www.benthamsgaze.org/2015/03/
https://www.benthamsgaze.org/2016/03/11/biometrics-for-payments/
https://www.benthamsgaze.org/2016/01/12/ace-csr-opening-event-201516-talks-on-malware-location-privacy-and-wiretap-law/#more-632
https://www.benthamsgaze.org/2015/01/07/
https://feedly.com/
https://www.benthamsgaze.org/2017/05/03/
https://www.benthamsgaze.org/2017/11/13/systematizing-consensus-in-the-age-of-blockchains/feed/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78468#respond
http://sec.cs.ucl.ac.uk/ace_csr/seminars_calendar/seminar_details/article/how-double-fetch-situations-turn-into-double-fetch-vulnerabilities-a-study-of-double-fetches-in-the-linux-kernel/
https://www.benthamsgaze.org/category/security-economics/feed/
https://www.benthamsgaze.org/2016/08/05/
https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fabout%2f
https://explorer.zcha.in/statistics
https://blog.velcommuta.de/wp-content/uploads/2015/07/nfcgate-extended-abstract.pdf
https://www.benthamsgaze.org/wp-content/uploads/2015/06/davm-150x150.jpg
https://www.benthamsgaze.org/2017/03/08/what-the-cia-hack-and-leak-teaches-us-about-the-bankruptcy-of-current-cyber-doctrines/#more-1462
https://simons.berkeley.edu/workshops/crypto2015-boot-camp
http://plato.stanford.edu/entries/biology-experiment/
http://fc16.ifca.ai/bitcoin/papers/hbg16.pdf
https://www.benthamsgaze.org/2017/02/07/
http://randomwalker.info
https://www.benthamsgaze.org/wp-json/
http://nicolascourtois.com/
https://www.benthamsgaze.org/author/smurdoch/
https://www.benthamsgaze.org/2017/01/24/
https://pomcor.com/2014/09/20/apple-pay-must-be-using-the-mag-stripe-mode-of-the-emv-contactless-specifications/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/pol-example-threads_large-270x300.png
https://www.benthamsgaze.org/subscribing-to-benthams-gaze/#comment-75190
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/pet07ixanalysis.pdf
https://www.benthamsgaze.org/wp-includes/js/wp-embed.min.js?ver%3D4.9.1
https://www.cerias.purdue.edu/site/blog/post/password-change-myths/
https://www.benthamsgaze.org/category/modelling/
https://www.benthamsgaze.org/author/jbootle/
https://www.benthamsgaze.org/2015/02/18/is-sending-shoppers-ads-by-bluetooth-just-a-bit-creepy/#more-62
http://blog.bettercrypto.com/?p%3D3226
https://www.nicehash.com/
https://www.benthamsgaze.org/wp-content/uploads/2015/07/08-ga17-data-anonymization.pptx
https://www.aclu.org/blog/guide-what-we-now-know-about-nsas-dragnet-searches-your-communications
https://www.benthamsgaze.org/author/pchaidos/
http://www.cs.ucl.ac.uk/students/syllabus/undergrad/3096_research_group_project/
http://discovery.ucl.ac.uk/1419506/
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/?replytocom%3D74394#respond
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_carmit_hazay.pdf
http://www.ucl.ac.uk/bentham-project/who
http://www.4chan.org/
https://www.benthamsgaze.org/wp-content/uploads/2016/05/wired-anti-adblocking-1024x585.png
http://pmg.csail.mit.edu/papers/osdi99.pdf
https://www.benthamsgaze.org/wp-content/uploads/2017/10/timeline_final_combined_2.compressed2.png
https://megele.io/
https://www.benthamsgaze.org/2017/08/22/
https://twitter.com/hashtag/fnn?src%3Dhash&%3Bref_src%3Dtwsrc%5etfw
http://fc16.ifca.ai/
https://secure.gravatar.com/avatar/3d9a9cdd01c97c37f335e8377116ecf1?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://ischool.illinois.edu/people/faculty/vcs
https://www.benthamsgaze.org/2017/01/24/on-the-security-and-privacy-of-the-ultrasound-tracking-ecosystem/#respond
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen-child/fonts.css
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#more-1822
http://fc16.ifca.ai/bitcoin/papers/kls16.pdf
http://www.cert.org/vulnerability-analysis/research/coordination.cfm
https://conspicuouschatter.wordpress.com/
https://www.benthamsgaze.org/2017/01/17/inaugural-lecture-zero-knowledge-proofs/#more-1399
https://eprint.iacr.org/2001/069
https://www.benthamsgaze.org/2016/06/06/
http://weis2016.econinfosec.org/
https://www.benthamsgaze.org/2017/10/
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation_david_evans.pdf
https://www.benthamsgaze.org/2015/09/10/what-are-the-social-costs-of-contactless-fraud/#more-300
https://www.researchgate.net/publication/238731788_users_are_not_the_enemy_why_users_compromise_security_mechanisms_and_how_to_take_remedial_measures
http://www.ibeacon.com/what-is-ibeacon-a-guide-to-beacons/
https://www.schneier.com/blog/archives/2015/05/online_dating_s.html
https://www.benthamsgaze.org/2016/01/26/
http://sec.cs.ucl.ac.uk/ace_csr/news_announcements/article/dr_murdoch_interviewed_about_the_security_of_internet_of_things/
http://www.hyperledger.org/
http://www.reuters.com/article/us-microsoft-usa-warrant-iduskcn0zu1rj
https://www.benthamsgaze.org/about/?replytocom%3D35995#respond
https://mediacenter.23andme.com/company/about-us/
https://en.wikipedia.org/wiki/honeypot_(computing)
https://www.benthamsgaze.org/category/privacy/page/4/
https://www.benthamsgaze.org/category/authentication/page/2/
https://www.benthamsgaze.org/2015/12/08/new-eu-itn-privacy-and-us/#more-584
https://www.benthamsgaze.org/2015/05/14/measuring-internet-censorship/#respond
http://www.ioccc.org/
https://www.benthamsgaze.org/2015/05/14/measuring-internet-censorship/
https://www.benthamsgaze.org/author/jblackburn/
https://www.benthamsgaze.org/author/kkkrol/
https://z.cash/
https://vimeo.com/8241248
https://www.researchgate.net/publication/240359084_tranforming_the
https://petsymposium.org/
https://www.benthamsgaze.org/2017/03/08/what-the-cia-hack-and-leak-teaches-us-about-the-bankruptcy-of-current-cyber-doctrines/
https://www.benthamsgaze.org/wp-includes/images/rss.png
https://www.benthamsgaze.org/2017/08/18/chainspace-a-sharded-smart-contracts-platform/#respond
https://decodeproject.eu/blog/creating-scalable-distributed-ledgers-decode
https://www.ncbi.nlm.nih.gov/pmc/articles/pmc1448265/#r2
http://www.laser-workshop.org/
https://hbr.org/2017/03/the-potential-for-blockchain-to-transform-electronic-health-records
https://www.benthamsgaze.org/2018/01/23/smart-contracts-and-bribes/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D82830#respond
https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/#more-616
http://www.cs.ucl.ac.uk/students/syllabus/mscisec/ga17_privacy_enhancing_technologies/
https://www.benthamsgaze.org/2016/02/17/are-payment-card-contracts-unfair/#comments
https://www.benthamsgaze.org/2016/09/07/battery-status-readout-as-a-privacy-risk/#more-1128
https://www.benthamsgaze.org/2016/01/12/ace-csr-opening-event-201516-talks-on-malware-location-privacy-and-wiretap-law/
https://www.benthamsgaze.org/wp-login.php
https://www.benthamsgaze.org/2016/01/12/ace-csr-opening-event-201516-talks-on-malware-location-privacy-and-wiretap-law/#respond
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/
http://hpe-enterpriseforward.com/awareness-first-step/
https://www.benthamsgaze.org/category/social-networks/
http://www.cs.ucl.ac.uk/staff/j.krinke/
https://github.com/stonecoldpat/briberycontracts/blob/master/censorshipcon.sol
https://blog.velcommuta.de/wp-content/uploads/2015/07/nfcgate-poster.pdf
https://secure.gravatar.com/avatar/9779090bfb7bb108f40bdd341eaba95a?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://fc16.ifca.ai/bitcoin/papers/bon16b.pdf
https://www.benthamsgaze.org/2017/04/
https://www.benthamsgaze.org/2015/12/10/how-tors-privacy-was-momentarily-broken-and-the-questions-it-raises/
https://www.cl.cam.ac.uk/~rja14/papers/bpa12-fc-banking_pin_security.pdf
benthamsgaze.org//2017/11/13/systematizing-consensus-in-the-age-of-blockchains/#respond
https://www.benthamsgaze.org/2015/11/10/sarah-meiklejohn-security-and-cryptography/#more-470
https://www.benthamsgaze.org/2015/11/24/program-obfuscation/
https://www.benthamsgaze.org/2016/03/11/
https://www.benthamsgaze.org/wp-content/uploads/2017/03/figure1.png
https://www.gov.uk/government/people/sally-davies
http://boards.4chan.org/pol/
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/pets08metrics.pdf
https://conspicuouschatter.wordpress.com
https://www.benthamsgaze.org/wp-content/uploads/2017/08/design.jpg
https://www.benthamsgaze.org/2015/03/13/a-digital-magna-carta/
https://www.benthamsgaze.org/wp-content/uploads/2015/03/panopticam.jpg
https://www.benthamsgaze.org/wp-content/uploads/2017/12/23andme-short-results1-300x215.jpg
https://www.benthamsgaze.org/category/hardware/feed/
https://www.benthamsgaze.org/2016/01/26/first-ucl-team-competes-in-the-international-capture-the-flag-competition/#respond
https://www.benthamsgaze.org/about/
https://www.ethereum.org/dao
http://www.cs.ucl.ac.uk/staff/s.murdoch/papers/oakland14chipandskim.pdf
https://www.benthamsgaze.org/category/infosec/
https://blockchain-summer.epfl.ch/
https://www.nature.com/articles/gim2015167
http://www.buzzfeed.com/josephbernstein/chinas-ingenious-online-dating-scams-put-ours-to-shame
https://www.benthamsgaze.org/2018/01/16/
https://www.benthamsgaze.org/2015/05/06/understanding-online-dating-scams/
https://www.benthamsgaze.org/2017/01/
https://www.benthamsgaze.org/?p%3D1884
https://privacyus.eu/
http://www.cs.ucl.ac.uk/students/syllabus/mscisec/compga18_cryptanalysis/
http://www.nytimes.com/2016/11/01/business/dealbook/zcash-a-harder-to-trace-virtual-currency-generates-price-frenzy.html?_r%3D1&%3Breferer%3D
http://en.rsf.org/
http://mittos.me/2017/12/13/a-critical-analysis-of-genome-privacy-research-list-of-papers/
https://www.benthamsgaze.org/2016/11/01/
https://www.benthamsgaze.org/2016/10/25/
https://www.benthamsgaze.org/wp-content/uploads/2015/07/10-ga17-privacy-by-design-case-studies-copy.pptx
http://earlbarr.com/
https://secure.gravatar.com/avatar/a1c40831bf20061fc6598f8884e5108f?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://sec.cs.ucl.ac.uk/ace_csr/news_announcements/article/vasilios_mavroudis_featured_in_a_new_scientist_article_about_malicious_colluding_apps/
http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/lm-white-paper-intel-driven-defense.pdf
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation_michael_zohner.pdf
https://www.benthamsgaze.org/2016/03/04/privately-gathering-statistics-and-training-simple-models/#more-758
https://www.benthamsgaze.org/2017/10/04/
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_aaron_johnson.pdf
https://usec.cispa.uni-saarland.de/eurousec17/
https://github.com/stonecoldpat/briberycontracts/blob/master/goldfingercon.sol
http://sec.cs.ucl.ac.uk/people/simon_parkin/
https://www.ncsc.gov.uk/documents/cpa-security-characteristic-secure-real-time-communications-gateway
http://www.cs.ucl.ac.uk/prospective_students/msc_information_security/
https://www.benthamsgaze.org/category/banking-security/feed/
https://idash.ucsd.edu/
https://www.benthamsgaze.org/wp-content/uploads/2018/01/goldfingerbtc.jpg
https://www.youtube.com/embed/ty3wsqgoz28?feature%3Doembed
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/oakland10chipbroken.pdf
https://mitpress.mit.edu/books/discovering-complexity
http://www.theguardian.com/world/2016/apr/11/european-court-to-consider-legality-of-uk-surveillance-laws
https://www.benthamsgaze.org/category/cryptocurrencies/page/2/
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-82084
https://www.benthamsgaze.org/2016/07/05/
https://blog.lukaszolejnik.com/battery-status-readout-as-a-privacy-risk/
https://www.benthamsgaze.org/2016/05/12/on-the-hunt-for-facebooks-army-of-fake-likes/
http://www.which.co.uk/news/2015/07/which-reveals-contactless-card-flaw-409322/
https://www.benthamsgaze.org/2018/01/
https://www.benthamsgaze.org/category/inside-infosec/feed/
http://www0.cs.ucl.ac.uk/staff/m.albassam/
https://www.benthamsgaze.org/wp-includes/js/comment-reply.min.js?ver%3D4.9.1
https://www.washingtonpost.com/world/national-security/prosecutors-to-seek-indictment-against-former-nsa-contractor-as-early-as-this-week/2017/02/06/362a22ca-ec83-11e6-9662-6eedf1627882_story.html?utm_term%3D.92d88d91f4ac
http://lukaszolejnik.com/
https://en.wikipedia.org/wiki/blockchain
https://www.benthamsgaze.org/2015/11/03/category-errors-in-information-security-how-logic-can-help/
https://www.internetsociety.org/sites/default/files/blogs-media/efficient-private-statistics-with-succinct-sketches.pdf
https://www.benthamsgaze.org/category/networking/
http://fc16.ifca.ai/bitcoin/papers/tvr16.pdf
https://genomeprivacy.org/
https://www.benthamsgaze.org/2017/12/13/a-critical-analysis-of-genome-privacy-research/#respond
https://www.benthamsgaze.org/type/video/
https://www.benthamsgaze.org/2016/02/02/
https://www.benthamsgaze.org/category/cryptography/
https://www.benthamsgaze.org/category/advertising/feed/
https://www.benthamsgaze.org/2017/12/13/a-critical-analysis-of-genome-privacy-research/feed/
http://www.nytimes.com/2016/08/15/arts/music/the-rise-of-the-internet-fan-bully.html
http://www.tombom.co.uk/blog/?p%3D262
http://www.apple.com/customer-letter/answers/
http://discovery.ucl.ac.uk/20247/2/cacm%20final.pdf
https://www.torproject.org/docs/hidden-services.html.en
https://www.benthamsgaze.org/category/cyber-crime/page/2/
https://www.benthamsgaze.org/wp-content/uploads/2015/07/03-ga17-private-computations.pdf
http://www.wsj.com/articles/silk-road-creator-found-guilty-of-cybercrimes-1423083107
https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/#more-525
https://www.benthamsgaze.org/author/aclark/
https://www.benthamsgaze.org/category/the-conversation/
https://www.benthamsgaze.org/2016/06/02/international-comparison-of-bank-fraud-reimbursement-customer-perceptions-and-contractual-terms/
https://www.benthamsgaze.org/2017/12/13/a-critical-analysis-of-genome-privacy-research/
https://www.benthamsgaze.org/2015/04/
https://secure.gravatar.com/avatar/ae3dcc28a0c0180f0ed3c30d897b01b8?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2015/03/06/
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/feed/
http://mediafutures.cs.ucl.ac.uk/people/ingemarcox/
https://www.benthamsgaze.org/2017/03/08/
https://www.benthamsgaze.org/2016/01/26/first-ucl-team-competes-in-the-international-capture-the-flag-competition/
https://ctftime.org/
benthamsgaze.org//2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#respond
https://www.benthamsgaze.org/wp-content/uploads/2017/10/4chan-ok.jpg
benthamsgaze.org/#
http://arxiv.org/abs/1505.06895
https://www.benthamsgaze.org/2017/05/19/
http://gmpg.org/xfn/11
https://www.benthamsgaze.org/category/censorship-resistance/feed/
https://www.benthamsgaze.org/2017/08/18/
http://www.lancaster.ac.uk/steps/events/public-lecture-in-the-digital-era---do-we-still-have-privacy/
https://www.benthamsgaze.org/category/security-usability/feed/
https://secure.gravatar.com/avatar/1a8ce462a151b76e544a5f3d7981d608?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://www.bbc.co.uk/programmes/b097sc13
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/?replytocom%3D74448#respond
https://conspicuouschatter.wordpress.com/2015/12/05/three-public-policy-recommendation-for-it-security/
https://www.benthamsgaze.org/2017/07/18/caveat-emptor-privacy-could-turn-uks-genomic-dream-into-a-nightmare/
https://github.com/ubeacsec/silverdog
https://www.benthamsgaze.org/2015/10/14/just-how-sophisticated-will-card-fraud-techniques-become/#respond
http://www.nhs.uk/conditions/anticoagulants-warfarin-/pages/introduction.aspx
https://www.benthamsgaze.org/2016/05/12/on-the-hunt-for-facebooks-army-of-fake-likes/#more-853
https://en.wikipedia.org/wiki/flame_(malware)
https://www.benthamsgaze.org/2016/10/25/how-to-do-zero-knowledge-from-discrete-logs-in-under-7kb/
http://www.genome.gov/11006943
https://www.benthamsgaze.org/2016/11/01/a-privacy-enhancing-architecture-for-secure-wearable-devices/
https://www.benthamsgaze.org/2016/09/
https://www.benthamsgaze.org/author/smeiklej/
https://www.benthamsgaze.org/2016/06/28/user-centred-security-awareness-empowers-employees-to-be-the-strongest-defense/#more-962
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/#comments
http://events.ccc.de/congress/2014/fahrplan/events/6140.html
https://www.benthamsgaze.org/?p%3D1708
benthamsgaze.org//contribution-policy/#respond
https://www.benthamsgaze.org/2015/10/
https://www.benthamsgaze.org/2018/01/23/
https://www.benthamsgaze.org/subscribing-to-benthams-gaze/
https://www.benthamsgaze.org/2015/09/10/
https://consolia-comic.com/comics/ransomware
https://www.nytimes.com/2014/12/11/health/architects-of-cia-interrogation-drew-on-psychology-to-induce-helplessness.html
https://www.benthamsgaze.org/author/onaolapo/
https://www.benthamsgaze.org/category/public-policy/feed/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/diverge.png
https://www.theverge.com/2017/4/19/15363800/ihg-credit-card-breach-details-lookup-tool
https://www.benthamsgaze.org/2016/01/
http://www.publications.parliament.uk/pa/cm201516/cmselect/cmsctech/573/573.pdf
https://www.benthamsgaze.org/category/cryptography/feed/
https://www.benthamsgaze.org/2015/06/
https://www.reddit.com/r/ethereum/comments/4oj7ql/personal_statement_regarding_the_fork/
https://www.w3.org/tr/vibration/
https://www.benthamsgaze.org/category/education/feed/
https://www.benthamsgaze.org/subscribing-to-benthams-gaze/?replytocom%3D75190#respond
http://ctic.au.dk
https://www.benthamsgaze.org/2015/08/20/experimenting-with-ssl-vulnerabilities-in-android-apps/#respond
http://httpd.apache.org/
https://www.nature.com/news/privacy-protections-the-genome-hacker-1.12940
https://www.benthamsgaze.org/2015/04/20/
https://gist.github.com/eugenekolo/fe229be2a4230cf8322bf5537e291812
https://www.benthamsgaze.org/2017/05/16/paybreak-able-to-defeat-wannacrywannacryptor-ransomware/#comments
http://www0.cs.ucl.ac.uk/staff/d.pym/
https://shadow.github.io/
http://www.wsj.com/articles/visa-mastercard-to-roll-out-new-cybersecurity-features-1423834542
http://citeseerx.ist.psu.edu/showciting?cid%3D531406
http://drops.dagstuhl.de/opus/volltexte/2014/4426/pdf/dagrep_v003_i010_p025_s13412.pdf
https://www.benthamsgaze.org/wp-content/uploads/2017/05/wannacry_genrandom.png
https://www.benthamsgaze.org/2016/08/05/moving-towards-security-and-privacy-experiments-for-the-real-world/
http://blog.talosintelligence.com/2017/07/the-medoc-connection.html?m%3D1
https://www.benthamsgaze.org/2016/11/22/
https://twitter.com/realdonaldtrump/status/881503147168071680?ref_src%3Dtwsrc%5etfw
https://ghr.nlm.nih.gov/primer/precisionmedicine/definition
https://www.benthamsgaze.org/2017/07/12/
https://www.theguardian.com/uk-news/2017/feb/12/uk-government-accused-full-frontal-attack-prison-whistleblowers-media-journalists
https://www.nsf.gov/events/event_summ.jsp?cntn_id%3D133229&%3Borg%3Dnsf
http://cybersecurity.oxfordjournals.org/content/early/2017/01/04/cybsec.tyw012.abstract?ijkey%3Dmtdzx6c7cvqaudw&%3Bkeytype%3Dref
https://eprint.iacr.org/2011/618.pdf
https://www.benthamsgaze.org/2015/10/14/just-how-sophisticated-will-card-fraud-techniques-become/#more-361
http://online.wsj.com/articles/sb10001424052970203687504577001911398596328
https://eprint.iacr.org/2013/451
https://developers.google.com/apps-script/
https://www.benthamsgaze.org/2017/07/25/top-ten-obstacles-along-distributed-ledgers-path-to-adoption/
https://www.benthamsgaze.org/category/banking-security/page/2/
https://www.benthamsgaze.org/wp-content/uploads/2017/10/percent_events_difference_drop.png
https://www.benthamsgaze.org/?p%3D1822
https://en.wikipedia.org/wiki/alt-right
https://www.benthamsgaze.org/wp-content/uploads/2016/06/photo-1024x576.jpg
https://www.benthamsgaze.org/author/enricom/
https://rabu-salma.github.io/
https://t.co/wyunhjjujg
https://www.benthamsgaze.org/2017/08/01/creating-scalable-distributed-ledgers-for-decode/#respond
http://www.computerweekly.com/news/2240181208/what-to-do-next-windows-xp-end-of-support
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/fc16cardcontracts-eba.pdf
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78468
http://www.forbes.com/sites/andygreenberg/2011/12/26/meet-telecomix-the-hackers-bent-on-exposing-those-who-censor-and-surveil-the-internet/
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/?replytocom%3D79517#respond
https://www.benthamsgaze.org/wp-content/uploads/2016/08/image-20160802-17177-12o458d.png
http://sites.computer.org/debull/a16mar/p39.pdf
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_michael_walfish.pdf
http://www.bbc.co.uk/blogs/newsnight/susanwatts/2010/02/new_flaws_in_chip_and_pin_syst.html
https://wikileaks.org/ciav7p1/files/org-chart.png
https://doi.org/10.1017/cbo9780511498442.014
https://www.benthamsgaze.org/2016/11/14/understanding-the-use-of-leaked-webmail-credentials-in-the-wild/
https://www.coindesk.com/the-two-topics-in-law-blockchain/
http://soc1024.ece.illinois.edu/permacoin.pdf
https://www.benthamsgaze.org/author/tsigler/
https://twitter.com/uclisec
https://www.benthamsgaze.org/2016/11/08/
https://decodeproject.eu/
https://www.theregister.co.uk/2016/12/14/microsoft_windows_10_dhcp/
http://www.computerworld.com/article/2932371/cybercrime-hacking/medjack-hackers-hijacking-medical-devices-to-create-backdoors-in-hospital-networks.html
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-74394
https://www.benthamsgaze.org/contribution-policy/feed/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/pcb_preview-e1477929203860-825x229.png
http://www0.cs.ucl.ac.uk/staff/s.meiklejohn/files/login13.pdf
http://www.cs.ucl.ac.uk/staff/tomaso_aste/
https://www.benthamsgaze.org/2017/03/28/mamadroid-detecting-android-malware-by-building-markov-chains-of-behavioral-models/#more-1472
http://lukaszolejnik.com/battery
http://www.bbc.co.uk/iplayer
https://www.benthamsgaze.org/2015/02/06/tor-the-last-bastion-of-online-anonymity/#more-28
http://commons.wikimedia.org/wiki/file:tor-onion-network.png
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/
https://www.theregister.co.uk/2016/12/08/windows_xp_nhs_still/
https://www.benthamsgaze.org/wp-content/uploads/2015/07/09-ga17-storage-retrieval.pptx
https://www.benthamsgaze.org/2017/07/25/
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_christina_brzuska.pdf
http://discovery.ucl.ac.uk/1475655/1/isba2016.pdf
https://www.benthamsgaze.org/author/asonnino/
https://www.mafialeaks.org/en/
https://www.benthamsgaze.org/about/#comment-35995
https://www.benthamsgaze.org/tag/cybercrime/
http://gow.epsrc.ac.uk/ngboviewgrant.aspx?grantref%3Dep/n028104/1
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen-child/style.css?ver%3D4.9.1
https://www.benthamsgaze.org/2017/12/13/a-critical-analysis-of-genome-privacy-research/#more-1884
https://www.benthamsgaze.org/category/education/
https://www.benthamsgaze.org/about/?replytocom%3D35971#respond
https://secure.gravatar.com/avatar/3efa170d1947a6733f2d6230ebdb7a2f?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://blogs.ucl.ac.uk/panopticam/
https://www.benthamsgaze.org/2016/05/28/adblocking-and-counter-blocking-a-slice-of-the-arms-race/#respond
https://www.benthamsgaze.org/2017/05/03/online-security-wont-improve-until-companies-stop-passing-the-buck-to-the-customer/#more-1524
https://www.benthamsgaze.org/feed/
https://www.benthamsgaze.org/2016/04/
https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
https://www.theguardian.com/technology/2016/sep/09/facebook-reinstates-napalm-girl-photo
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/style.css?ver%3D4.9.1
https://www.eugenekolo.com/blog/paybreak-able-to-defeat-wannacry-wannacryptor-ransomware/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78450
https://www.reddit.com/r/ethereum/comments/4oif2x/dao_attack_exchanges_please_pause_eth_and_dao/
https://www.internetsociety.org/sites/default/files/blogs-media/better-the-devil-you-know-user-study-of-two-captchas-a-possible-replacement-technology.pdf
https://www.benthamsgaze.org/2017/08/01/
https://www.nature.com/articles/ng.288
http://discovery.ucl.ac.uk/1496993/
http://users.encs.concordia.ca/~clark/index.php
https://www.petsymposium.org/2008/hotpets/udp-tor.pdf
https://www.genome.gov/27565109/the-cost-of-sequencing-a-human-genome/
https://www.benthamsgaze.org/tag/social-networks/
https://www.scientificlinux.org/
https://www.benthamsgaze.org/wp-content/uploads/2015/12/picture_munichdec15.jpg
http://www0.cs.ucl.ac.uk/staff/n.courtois/
https://www.benthamsgaze.org/2016/07/19/
https://www.benthamsgaze.org/2015/07/21/teaching-privacy-enhancing-technologies-at-ucl/
https://www.benthamsgaze.org/2015/05/
https://www.benthamsgaze.org/2016/08/05/moving-towards-security-and-privacy-experiments-for-the-real-world/#more-1069
https://www.benthamsgaze.org/wp-content/uploads/2015/10/963-000-825x221.jpg
http://arstechnica.com/security/2013/11/repeated-attacks-hijack-huge-chunks-of-internet-traffic-researchers-warn/
http://www.emvco.com/download_agreement.aspx?id%3D1238
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-76941
https://www.finextra.com/news/fullstory.aspx?newsitemid%3D16466
http://www.alexa.com/
https://www.benthamsgaze.org/wp-content/uploads/2017/03/figure2.png
https://www.caida.org/publications/papers/2012/menlo_report_actual_formatted/
https://www.benthamsgaze.org/author/vmavroud/
https://philosophy.artsci.wustl.edu/people/carl_craver
http://www.vox.com/2016/4/18/11434098/alt-right-explained
https://www.benthamsgaze.org/wp-content/uploads/2016/11/pol-example-threads_large.png
benthamsgaze.org//2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#respond
https://www.benthamsgaze.org/author/gdanezis/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f10%2f04%2fhow-4chan-and-the_donald-influence-the-fake-news-ecosystem%2f&%3Bformat%3Dxml
https://www.benthamsgaze.org/2017/01/31/diversity-is-our-strength/
https://www.nature.com/articles/ng.440
https://www.benthamsgaze.org/2017/03/24/battery-status-not-included-assessing-privacy-in-w3c-web-standards/#respond
https://www.benthamsgaze.org/2015/10/07/gianluca-stringhini-cyber-criminal-operations-and-developing-systems-to-defend-against-them/
http://eur-lex.europa.eu/legal-content/en/all/?uri%3Dcelex:32006l0024
https://www.benthamsgaze.org/wp-content/uploads/2015/12/tor-onion-network.png
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78441
https://www.riscs.org.uk/2017/08/11/the-end-of-the-billion-user-passwordimpossible/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f11%2f13%2fsystematizing-consensus-in-the-age-of-blockchains%2f&%3Bformat%3Dxml
http://www0.cs.ucl.ac.uk/staff/a.hicks/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78448
http://www.ucl.ac.uk/~ucfamus/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78448#respond
https://wordpress.org/
https://www.benthamsgaze.org/2016/02/09/jens-groth-non-interactive-zero-knowledge-proofs-efficient-enough-to-be-used-in-practice/
https://www.benthamsgaze.org/wp-content/uploads/2017/05/credit-card-1211409_1280-825x510-1-825x251.png
https://www.benthamsgaze.org/2016/09/29/
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic2.png
https://www.theregister.co.uk/2017/05/17/ransomware_wannacrypt_how_not_to_warn_against_it/
http://www.bbc.co.uk/news/technology-28488155
https://secure.gravatar.com/avatar/4298396fc037fccc7ed0673fe41817e6?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://www.bbc.co.uk/news/technology-31508932
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D35344#respond
http://www.cs.ucl.ac.uk/staff/j.groth
http://www.personalgenomes.org/uk/sign-up
http://www0.cs.ucl.ac.uk/people/d.pym.html
https://www.benthamsgaze.org/author/wendy-m-grossman/
http://daserste.ndr.de/panorama/xkeyscorerules100.txt
https://www.benthamsgaze.org/2016/12/
https://www.benthamsgaze.org/2015/12/17/
https://www.benthamsgaze.org/about/#comment-35971
https://bitcoin.org/en/
https://royalsociety.org/events/2015/02/cyber-panel/
http://homepages.cs.ncl.ac.uk/patrick.mccorry/minerbribery.pdf
http://sec.cs.ucl.ac.uk/users/smurdoch/
https://qz.com/1039809/amd-shares-are-soaring-ethereum-miners-are-renting-boeing-747s-to-ship-graphics-cards-to-mines/
https://www.youtube.com/embed/osnymmhp-o8?feature%3Doembed
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-35257
https://en.wikipedia.org/wiki/genome-wide_association_study
https://addons.mozilla.org/en-us/firefox/extensions/?sort%3Dusers
https://www.benthamsgaze.org/category/security-usability/page/2/
https://www.benthamsgaze.org/2015/02/18/is-sending-shoppers-ads-by-bluetooth-just-a-bit-creepy/
https://metrics.torproject.org/userstats-relay-country.html
http://www.thisismoney.co.uk/money/smallbusiness/article-3260681/small-firms-told-stay-alert-fraudsters-bypass-chip-pin-security-steal-20k-goods-using-stolen-credit-card.html
https://www.benthamsgaze.org/2017/05/16/
https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/#respond
http://heartbleed.com/
http://people.cs.ksu.edu/~eyv/papers/latency_leak-ccs07.pdf
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78444#respond
https://www.benthamsgaze.org/wp-content/uploads/2017/05/wannacry_customaes.png
https://www.benthamsgaze.org/category/censorship-resistance/
https://www.bigbrotherwatch.org.uk/wp-content/uploads/2016/07/safe-in-police-hands.pdf
https://www.benthamsgaze.org/author/ahicks/
http://static.usenix.org/event/sec04/tech/full_papers/provos/provos_html/
https://www.benthamsgaze.org/2016/03/04/privately-gathering-statistics-and-training-simple-models/
https://www.youtube.com/watch?v%3Dx7pjuixkoec
https://www.benthamsgaze.org/wp-content/uploads/2017/10/4chan-ok-1024x519.jpg
https://www.benthamsgaze.org/2015/12/08/new-eu-itn-privacy-and-us/
http://motherboard.vice.com/read/hackers-stole-over-60-million-dropbox-accounts
http://www.modernhealthcare.com/article/20160914/news/160919950
https://www.benthamsgaze.org/2015/03/13/a-digital-magna-carta/#comments
https://www.benthamsgaze.org/2015/11/10/sarah-meiklejohn-security-and-cryptography/#respond
https://secure.gravatar.com/avatar/06bd9afacd436f381f5b77337d398454?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2016/11/01/a-privacy-enhancing-architecture-for-secure-wearable-devices/#more-1211
http://recode.net/2015/10/26/walmart-exec-anarchy-coming-in-holiday-transition-to-chip-credit-cards/
http://coccinelle.lip6.fr/papers.php
https://www.linkedin.com/grp/home?gid%3D8207869
https://www.benthamsgaze.org/2016/07/
https://www.schneier.com/blog/archives/2016/02/the_ads_vs_ad_b.html
https://www.benthamsgaze.org/2016/06/06/exceptional-access-provisions-in-the-investigatory-powers-bill/#comments
https://www.benthamsgaze.org/2016/11/16/a-longitudinal-measurement-study-of-4chans-politically-incorrect-forum-and-its-effect-on-the-web/#comments
http://www.zdnet.com/article/gooligan-android-malware-grabs-a-million-google-accounts-in-huge-google-play-fraud/
https://www.benthamsgaze.org/2015/11/
https://www.benthamsgaze.org/2015/02/09/
https://eprint.iacr.org/2016/263
https://cs.uwaterloo.ca/~iang/
http://www.emilianodc.com/
https://www.benthamsgaze.org/2015/02/
https://techcrunch.com/2017/11/07/a-major-vulnerability-has-frozen-hundreds-of-millions-of-dollars-of-ethereum/
https://www.benthamsgaze.org/wp-content/uploads/2017/05/countries_initially_affected_in_wannacry_ransomware_attack.png
https://www.benthamsgaze.org/category/privacy/
https://googleblog.blogspot.co.uk/2010/01/new-approach-to-china.html
https://www.benthamsgaze.org/category/hardware/
https://www.benthamsgaze.org/2015/06/24/ucl-code-breaking-competition/#respond
https://seclab.cs.ucsb.edu/media/uploads/papers/torpig.pdf
http://www0.cs.ucl.ac.uk/staff/g.danezis/papers/ndss16currencies.pdf
http://services.parliament.uk/bills/2015-16/investigatorypowers/documents.html
https://www.benthamsgaze.org/2015/10/27/
http://fc16.ifca.ai/bitcoin/papers/bhmw16.pdf
http://www0.cs.ucl.ac.uk/staff/g.stringhini/papers/shipping-ccs2015.pdf
https://www.benthamsgaze.org/wp-content/uploads/2016/01/csm_img_20151204_160423_00bd627744.jpg
https://www.benthamsgaze.org/author/gstringh/
https://www.benthamsgaze.org/category/social-networks/feed/
https://www.benthamsgaze.org/2015/12/10/
https://www.benthamsgaze.org/2015/09/10/what-are-the-social-costs-of-contactless-fraud/#respond
https://www.visa.co.uk/products/visa-contactless/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fcontribution-policy%2f
https://en.wikipedia.org/wiki/whole_genome_sequencing
https://www.benthamsgaze.org/2015/05/01/teaching-cybersecurity-to-criminologists/#respond
https://www.benthamsgaze.org/category/crime-science/
http://www.bbc.co.uk/news/health-40479533
https://www.benthamsgaze.org/tag/in/
https://www.benthamsgaze.org/2015/09/29/mathematical-modelling-in-the-two-cultures/#respond
http://www.cl.cam.ac.uk/research/security/banking/relay/
https://www.eba.europa.eu/news-press/calendar?p_p_id%3D8&%3B_8_struts_action%3D%2fcalendar%2fview_event&%3B_8_eventid%3D1303933
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f12%2f13%2fa-critical-analysis-of-genome-privacy-research%2f
http://discovery.ucl.ac.uk/1461425/1/01_1_4.pdf
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/?replytocom%3D82084#respond
http://www.legislation.gov.uk/uksi/2009/209/regulation/62/made
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comments
https://freedomhouse.org/
https://www.benthamsgaze.org/2018/01/23/smart-contracts-and-bribes/#respond
https://eprint.iacr.org/2015/934
https://www.benthamsgaze.org/wp-content/uploads/2016/03/img_2552-crop-825x315.jpg
https://www.benthamsgaze.org/2016/07/13/cybersecurity-supporting-a-resilient-and-trustworthy-system-for-the-uk/
http://arxiv.org/pdf/1605.05077v1.pdf
https://www.riscs.org.uk/2017/03/01/the-hardest-of-targets/
https://counter.theconversation.edu.au/content/63142/count.gif
http://homepages.cs.ncl.ac.uk/patrick.mc-corry/
https://petsymposium.org/2017/papers/issue2/paper18-2017-2-source.pdf
https://www.esat.kuleuven.be/cosic/?page_id%3D126
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic1.png
http://arxiv.org/abs/1605.05077
https://www.benthamsgaze.org/2015/11/24/
https://www.benthamsgaze.org/2016/11/01/a-privacy-enhancing-architecture-for-secure-wearable-devices/#respond
https://www.benthamsgaze.org/2015/10/20/george-danezis-smart-grid-privacy-peer-to-peer-and-social-network-security/
https://spqr.eecs.umich.edu/papers/rushanan-sok-oakland14.pdf
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2016%2f08%2f02%2fdo-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack%2f
https://www.benthamsgaze.org/2017/01/24/on-the-security-and-privacy-of-the-ultrasound-tracking-ecosystem/
https://www.benthamsgaze.org/2017/07/04/epfl-blockchain-summer-school/
https://www.benthamsgaze.org/2015/06/24/ucl-code-breaking-competition/
https://www.benthamsgaze.org/category/internet-security/page/2/
https://www.benthamsgaze.org/2015/10/07/gianluca-stringhini-cyber-criminal-operations-and-developing-systems-to-defend-against-them/#respond
https://www.benthamsgaze.org/2015/05/14/measuring-internet-censorship/#more-69
https://www.benthamsgaze.org/2015/10/14/just-how-sophisticated-will-card-fraud-techniques-become/
https://en.wikipedia.org/wiki/atomic_commit
https://www.benthamsgaze.org/2015/04/23/
https://www.benthamsgaze.org/category/cryptography/page/2/
https://www.benthamsgaze.org/category/measurement/page/2/
https://www.benthamsgaze.org/2016/03/11/biometrics-for-payments/#comments
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2018%2f01%2f23%2fsmart-contracts-and-bribes%2f
http://www0.cs.ucl.ac.uk/staff/g.danezis/infosecgraph/
https://www.benthamsgaze.org/2016/09/29/quux-a-quic-un-multiplexing-of-the-tor-relay-transport/#respond
https://www.benthamsgaze.org/2015/07/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D76941#respond
https://www.benthamsgaze.org/2018/01/23/smart-contracts-and-bribes/#more-1957
http://theconversation.com/institutions/ucl
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2016%2f08%2f02%2fdo-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack%2f&%3Bformat%3Dxml
https://genopri.org
https://www.benthamsgaze.org/2017/10/03/liability-for-push-payment-fraud-pushed-onto-the-victims/
http://www0.cs.ucl.ac.uk/staff/p.mccorry/
https://www.benthamsgaze.org/category/internet-security/feed/
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_ivan_damgaard.pdf
http://www.cs.ucl.ac.uk/admissions/msc_isec/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-82830
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2018%2f01%2f23%2fsmart-contracts-and-bribes%2f&%3Bformat%3Dxml
https://www.benthamsgaze.org/wp-includes/js/jquery/jquery-migrate.min.js?ver%3D1.4.1
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/feed/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fsubscribing-to-benthams-gaze%2f
https://www.benthamsgaze.org/2017/08/18/chainspace-a-sharded-smart-contracts-platform/
http://europa.eu/rapid/press-release_memo-15-5793_en.htm?locale%3Den
https://www.benthamsgaze.org/2016/06/17/smart-contracts-beyond-the-age-of-innocence/
https://www.benthamsgaze.org/author/eugene-kolo/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78450#respond
https://twitter.com/hashtag/fraudnewscnn?src%3Dhash&%3Bref_src%3Dtwsrc%5etfw
https://www.benthamsgaze.org/2016/03/04/
https://en.wikipedia.org/wiki/stuxnet
https://arxiv.org/abs/1711.03936
https://www.benthamsgaze.org/author/ibecker/
http://lukaszolejnik.com/stuff/proximity.html
http://nvlpubs.nist.gov/nistpubs/ir/2014/nist.ir.7983.pdf
https://www.cyberaware.gov.uk/
https://www.benthamsgaze.org/author/sk766/
http://www.techradar.com/news/phone-and-communications/what-is-nfc-and-why-is-it-in-your-phone-948410
https://www.benthamsgaze.org/2016/10/18/yes-we-have-no-receipts/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#more-1057
https://www.benthamsgaze.org/2017/07/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78441#respond
https://www.benthamsgaze.org/author/amittos/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fsubscribing-to-benthams-gaze%2f&%3Bformat%3Dxml
https://bitbucket.org/securechorus/
https://eprint.iacr.org/2013/516.pdf
https://www.benthamsgaze.org/category/infosec/page/2/
https://www.benthamsgaze.org/category/mobile/
https://duckduckgo.com/
https://www.benthamsgaze.org/category/biometrics/feed/
https://www.benthamsgaze.org/category/crime-science/feed/
http://www.ucl.ac.uk/
https://www.benthamsgaze.org/2017/08/18/chainspace-a-sharded-smart-contracts-platform/#more-1720
https://www.benthamsgaze.org/2017/03/08/what-the-cia-hack-and-leak-teaches-us-about-the-bankruptcy-of-current-cyber-doctrines/#respond
https://www.benthamsgaze.org/2015/12/08/
http://www.teenvogue.com/story/how-to-keep-messages-secure
https://www.benthamsgaze.org/2016/03/
https://www.benthamsgaze.org/2016/03/16/bitcoin-workshop-at-financial-crypto-2016/
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/fc16cardcontracts.pdf
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78471
http://sec.cs.ucl.ac.uk/ace_csr/
https://www.benthamsgaze.org/?p%3D1756
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation_yehuda_lindell.pdf
https://www.benthamsgaze.org/2015/05/06/
http://conferences2.sigcomm.org/imc/2014/papers/p347.pdf
http://senglehardt.com
https://en.wikipedia.org/wiki/wannacry_ransomware_attack
https://en.wikipedia.org/wiki/christopher_poole
https://nakedsecurity.sophos.com/2017/05/17/wannacry-the-ransomware-worm-that-didnt-arrive-on-a-phishing-hook/
https://www.benthamsgaze.org/wp-content/uploads/2016/05/farms.png
https://www.benthamsgaze.org/2017/08/01/creating-scalable-distributed-ledgers-for-decode/
https://www.benthamsgaze.org/category/blockchain/page/2/
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/
https://www.benthamsgaze.org/2018/01/16/practicing-a-science-of-security/feed/
https://www.coindesk.com/energy-sector-giants-turn-to-ethereum-to-test-blockchain-potential/
https://www.benthamsgaze.org/?p%3D1878
https://www.benthamsgaze.org/category/genomics/feed/
https://www.benthamsgaze.org/2016/05/28/adblocking-and-counter-blocking-a-slice-of-the-arms-race/
https://www.benthamsgaze.org/2016/02/02/our-contributions-to-the-uk-distributed-ledger-technology-report/#respond
http://fc16.ifca.ai/bitcoin/
https://www.benthamsgaze.org/2017/01/10/security-intrusions-as-mechanisms/
benthamsgaze.org//about/#respond
https://www.benthamsgaze.org/2017/02/07/double-fetch-situations-turn-into-double-fetch-vulnerabilities-a-study-of-double-fetches-in-the-linux-kernel/
https://www.benthamsgaze.org/2018/01/16/practicing-a-science-of-security/
https://www.facebook.com/notes/protect-the-graph/making-connections-to-facebook-more-secure/1526085754298237
http://digg.com/reader
https://fonts.gstatic.com
http://www.ndm.net/bluecoatstore/proxysg/bluecoat-sg9000
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D35231#respond
http://www.ucl.ac.uk/bentham-project/who/bentham_ucl
http://link.springer.com/article/10.1007/s13347-014-0164-9
https://www.youtube.com/embed/wabkb0kah6c?feature%3Doembed
https://www.benthamsgaze.org/wp-content/uploads/2015/07/02-ga17-anonymous-comms.pptx
https://www.benthamsgaze.org/2015/07/21/teaching-privacy-enhancing-technologies-at-ucl/#more-261
https://www.benthamsgaze.org/2015/11/03/category-errors-in-information-security-how-logic-can-help/#comments
http://drops.dagstuhl.de/opus/volltexte/2016/5698/pdf/dagrep_v005_i010_p050_s15431.pdf
http://cordis.europa.eu/programme/rcn/665457_en.html
http://www.economist.com/news/united-states/21707201-how-donald-trump-ushered-hateful-fringe-movement-mainstream-pepe-and
https://en.wikipedia.org/wiki/the_two_cultures
https://www.benthamsgaze.org/2016/05/12/on-the-hunt-for-facebooks-army-of-fake-likes/#comments
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/genericons/genericons.css?ver%3D3.2
http://www.dailydot.com/crime/silk-road-ross-ulbricht-evidence-list/
https://www.torproject.org/
https://www.benthamsgaze.org/category/mobile/feed/
https://www.eff.org/deeplinks/2014/12/faulty-logic-heart-microsoft-ireland-email-dispute
https://www.benthamsgaze.org/2015/08/20/experimenting-with-ssl-vulnerabilities-in-android-apps/
http://www8.hp.com/uk/en/hp-news/press-release.html?id%3D2274472
https://secure.gravatar.com/avatar/a55873745fe0eecd8d9e541dd42126ae?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fabout%2f&%3Bformat%3Dxml
https://www.benthamsgaze.org/2017/05/
https://www.benthamsgaze.org/2015/07/21/teaching-privacy-enhancing-technologies-at-ucl/#respond
https://www.theguardian.com/technology/2015/oct/24/obfuscation-users-guide-for-privacy-and-protest-online-surveillance
https://www.benthamsgaze.org/category/operating-systems/feed/
https://www.benthamsgaze.org/author/ceyssucu/
https://www.benthamsgaze.org/category/cryptocurrencies/
https://www.ftc.gov/system/files/attachments/press-releases/ftc-issues-warning-letters-app-developers-using-silverpush-code/160317samplesilverpushltr.pdf
https://www.benthamsgaze.org/wp-content/uploads/2017/05/wannacry_genrandom-300x91.png
http://boards.4chan.org/pol/thread/40489590
http://fc16.ifca.ai/bitcoin/papers/cde+16.pdf
https://www.benthamsgaze.org/2015/02/06/tor-the-last-bastion-of-online-anonymity/
http://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/zchain.png
http://www0.cs.ucl.ac.uk/staff/b.karp/
benthamsgaze.org//2018/01/23/smart-contracts-and-bribes/#respond
https://www.benthamsgaze.org/2017/03/28/
https://secure.gravatar.com/avatar/f8ae58fe8ae7745b87cc524d5ace3265?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.ncsc.gov.uk/guidance/ransomware-latest-ncsc-guidance
http://sec.cs.ucl.ac.uk/people/kat_krol/
https://www.benthamsgaze.org/2017/07/12/preventing-phishing-wont-stop-ransomware-spreading/#respond
https://www.benthamsgaze.org/wp-content/uploads/2016/08/image-20160802-428-1e8u9u8-1024x550.png
http://www.bbc.co.uk/news/business-35609833
https://www.benthamsgaze.org/category/infosec/feed/
https://www.benthamsgaze.org/2016/06/02/international-comparison-of-bank-fraud-reimbursement-customer-perceptions-and-contractual-terms/#comments
http://ctic.au.dk/events/workshops-conferences/mpc-2016/
https://royalsociety.org/topics-policy/projects/cybersecurity-research/
https://www.benthamsgaze.org/2016/02/09/jens-groth-non-interactive-zero-knowledge-proofs-efficient-enough-to-be-used-in-practice/#respond
https://www.benthamsgaze.org/2015/12/01/
https://www.benthamsgaze.org/2015/01/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f08%2f22%2fshould-you-phish-your-own-employees%2f
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comments
https://www.benthamsgaze.org/2017/04/04/can-games-fix-whats-wrong-with-computer-security-education/#respond
http://discovery.ucl.ac.uk/1398382/
https://www.benthamsgaze.org/wp-content/uploads/2017/10/timeline_final_combined_2.compressed2-1024x476.png
http://www.armourcomms.com/solutions/
http://www.financialfraudaction.org.uk/cms/assets/1/2014%20annual%20fraud%20figures%20release%20-%20final.pdf
https://www.benthamsgaze.org/2016/11/14/
https://www.ethereum.org/
https://www.benthamsgaze.org/2017/05/19/observing-the-wannacry-fallout-confusing-advice-and-playing-the-blame-game/
https://www.benthamsgaze.org/2016/04/21/come-work-with-us/
http://www.cumhuriyet.com.tr/haber/dunya/659903/whatsapp_ta_korkutan_guvenlik_acigi_iddiasi__devlet__sifreli_mesaji_okuyabilir.html
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78471#respond
https://www.benthamsgaze.org/2017/07/12/preventing-phishing-wont-stop-ransomware-spreading/
https://www.benthamsgaze.org/2015/06/24/
https://www.benthamsgaze.org/?p%3D1846
https://eprint.iacr.org/2017/406.pdf
https://petsymposium.org/award/
http://jordan-wright.com/blog/2015/05/14/how-tor-works-part-three-the-consensus/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78499
https://ictf.cs.ucsb.edu/
https://www.youtube.com/embed/lfen7zoikyw?feature%3Doembed
https://www.benthamsgaze.org/2017/12/13/
https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20160209_isc_rpt_ipbill%28web%29.pdf?attachauth%3Danoy7coquvqxa77an9iumawucahpqx4_xf-plfxoppfuc5de5vjzonzngnul8nwx6rzpp8coi128remdxzm_1xwxx0dhoouhayosoj6qvnrjidb0puqqj7oyluvn
https://en.wikipedia.org/wiki/lolcat
https://theconversation.com/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack-63142
http://www.ncl.ac.uk/press/news/legacy/2014/11/contactlesscardsfailtorecogniseforeigncurrency.html
https://www.benthamsgaze.org/2015/07/21/
https://www.benthamsgaze.org/category/measurement/
https://www.harpercollins.com/9780062362490/digital-gold
http://litecoin.org/
https://www.benthamsgaze.org/2016/02/17/
https://www.benthamsgaze.org/2017/04/04/
https://www.benthamsgaze.org/2016/06/02/
https://www.benthamsgaze.org/2016/10/18/yes-we-have-no-receipts/#more-1153
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_abhi_shelat.pdf
http://events.ccc.de/tag/angels/
https://www.benthamsgaze.org/2017/05/09/underground-abracardabra-understanding-carding-forums/
https://www.benthamsgaze.org/2016/09/29/quux-a-quic-un-multiplexing-of-the-tor-relay-transport/
https://www.benthamsgaze.org/author/edecrist/
http://www.cs.ucl.ac.uk/degrees/msc_isec/
https://www.benthamsgaze.org/wp-content/uploads/2017/10/vlcsnap-2017-10-03-13h37m41s379-1024x576.png
http://cacr.uwaterloo.ca/techreports/2013/cacr2013-09.pdf
https://www.youtube.com/embed/1xiektnix00?feature%3Doembed
http://www.newstatesman.com/politics/june2017/2017/05/will-dark-ads-facebook-really-swing-2017-general-election
https://www.benthamsgaze.org/2015/12/01/forced-authorisation-chip-and-pin-hitting-high-end-retailers/#comments
https://www.benthamsgaze.org/category/voting/
http://www.town-crier.org/
https://secure.gravatar.com/avatar/ed7151d730cd3b14422835be172beaaa?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2015/01/07/introducing-the-expanded-ucl-information-security-group/#respond
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation_martin-hirt.pdf
https://www.benthamsgaze.org/2016/02/02/our-contributions-to-the-uk-distributed-ledger-technology-report/
https://www.benthamsgaze.org/wp-content/uploads/2017/11/graph2-1024x750.png
https://www.benthamsgaze.org/wp-content/uploads/2017/10/qe0cbgz.jpg
https://www.benthamsgaze.org/category/public-policy/
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation-sharemind.pdf
https://www.internetsociety.org/sites/default/files/eurousec2017_07_becker_paper.pdf
http://eprint.iacr.org/2015/963
https://www.benthamsgaze.org/2017/05/16/paybreak-able-to-defeat-wannacrywannacryptor-ransomware/
https://www.benthamsgaze.org/2016/05/12/
http://cra.org/resources/taulbee-survey/
https://www.physics.harvard.edu/people/facpages/galison
https://www.benthamsgaze.org/category/malware/
https://www.computer.org/csdl/mags/sp/2016/05/msp2016050011.html
https://secure.gravatar.com/avatar/334c38f112b717113e098f0972dea52c?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://sec.cs.ucl.ac.uk/ace_csr/news_announcements/article/dr_murdoch_was_interviewed_by_bbc_news_about_the_introduction_of_an_app_store_register_in_china/
http://krebsonsecurity.com/tag/target-data-breach/
https://www.benthamsgaze.org/2015/10/20/
https://www.usatoday.com/story/tech/2017/10/02/las-vegas-shooting-google-spread-stories-wrong-suspect-4-chan/724109001/
https://www.benthamsgaze.org/2016/10/18/
https://secure.gravatar.com/avatar/e941fa3a3c4f5a8ebb5fcac4dd89d20b?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.youtube.com/watch?v%3D82zko_k1xq4&%3Bfeature%3Dyoutu.be&%3Bt%3D2m53s
https://www.benthamsgaze.org/category/blockchain/
https://www.benthamsgaze.org/2015/12/01/forced-authorisation-chip-and-pin-hitting-high-end-retailers/
https://www.benthamsgaze.org/?p%3D1057
http://ieeexplore.ieee.org/abstract/document/7163041/
https://www.benthamsgaze.org/2016/07/13/cybersecurity-supporting-a-resilient-and-trustworthy-system-for-the-uk/#respond
https://alexanderlhicks.com/
http://mathworld.wolfram.com/hawkesprocess.html
https://www.benthamsgaze.org/2016/06/06/exceptional-access-provisions-in-the-investigatory-powers-bill/
https://www.benthamsgaze.org/category/biometrics/
https://fc18.ifca.ai/bitcoin/
https://www.benthamsgaze.org/2017/07/04/
https://www.benthamsgaze.org/author/lmelis/
https://www.benthamsgaze.org/wp-content/uploads/2017/06/img-20170624-wa0008.jpg
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_ariel_nof.pdf
https://www.benthamsgaze.org/2016/11/22/blockchains-and-why-we-need-privacy/
http://en.wikipedia.org/wiki/initial_coin_offering
https://www.benthamsgaze.org/category/security-economics/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78470
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/#comment-79517
https://www.benthamsgaze.org/category/networking/feed/
https://www.benthamsgaze.org/author/rmercer/
https://www.benthamsgaze.org/category/privacy/page/2/
https://www.benthamsgaze.org/2016/05/
https://www.cl.cam.ac.uk/~mgk25/sc2005-distance.pdf
https://www.benthamsgaze.org/2015/12/01/forced-authorisation-chip-and-pin-hitting-high-end-retailers/#more-541
https://www.benthamsgaze.org/2015/05/01/
https://www.benthamsgaze.org/2017/05/03/online-security-wont-improve-until-companies-stop-passing-the-buck-to-the-customer/
https://www.benthamsgaze.org/2015/08/20/experimenting-with-ssl-vulnerabilities-in-android-apps/#more-291
https://w3c.github.io/proximity/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2018%2f01%2f16%2fpracticing-a-science-of-security%2f&%3Bformat%3Dxml
https://en.wikipedia.org/wiki/maurice_wilkes
https://www.benthamsgaze.org/2016/03/16/bitcoin-workshop-at-financial-crypto-2016/#more-818
http://www0.cs.ucl.ac.uk/staff/j.bootle/fosad.pdf
https://www.forbes.com/sites/matthewherper/2011/01/05/the-first-child-saved-by-dna-sequencing/
http://discovery.ucl.ac.uk/1434146/1/sasse-technology-2014.pdf
https://www.benthamsgaze.org/2016/08/23/steven-murdoch-privacy-and-financial-security/#more-990
https://www.benthamsgaze.org/wp-content/uploads/2015/02/vlcsnap-2015-02-28-23h03m54s253-1024x576.png
https://www.benthamsgaze.org/author/ncourtois/
http://eur-lex.europa.eu/legal-content/en/txt/html/?uri%3Dcelex:32015l2366&%3Bfrom%3Den#d1e4868-35-1
https://www.ucl.ac.uk/uclic/people/a_blandford
https://www.benthamsgaze.org/wp-content/plugins/akismet/_inc/form.js?ver%3D4.0.1
http://www0.cs.ucl.ac.uk/staff/j.groth/
https://www.benthamsgaze.org/2015/11/03/
https://eprints.biblio.unitn.it/1629/1/tr-disi-08-041_v1.1.pdf
http://www.nicolascourtois.com/papers/front_indocrypt08_2p.pdf
https://eprint.iacr.org/2012/610
https://www.benthamsgaze.org/2016/11/
https://www.ncsc.gov.uk/guidance/password-guidance-simplifying-your-approach
https://www.benthamsgaze.org/category/meta/feed/
https://www.benthamsgaze.org/2016/11/14/understanding-the-use-of-leaked-webmail-credentials-in-the-wild/#more-1321
https://www.benthamsgaze.org/category/legal-issues/
https://wikileaks.org/ciav7p1/
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic6.png
https://www.benthamsgaze.org/category/advertising/
http://www.chyp.com/podcasts/sarah-meiklejohn-ucl/
http://sts.cornell.edu/peter-robert-dear
https://lamport.azurewebsites.net/pubs/paxos-simple.pdf
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D77195#respond
http://www.publications.parliament.uk/pa/jt201617/jtselect/jtrights/104/104.pdf
https://eugenekolo.com/static/desert.jpg.wncry
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D35330#respond
https://arxiv.org/abs/1712.02193
https://www.benthamsgaze.org/category/talks-and-panels/
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/?replytocom%3D74836#respond
https://www.benthamsgaze.org/xmlrpc.php?rsd
https://www.benthamsgaze.org/2015/10/27/an-analysis-of-reshipping-mule-scams/#comments
http://www.bbc.co.uk/news/business-31164806
http://www.which.co.uk/news/2017/09/scams-super-complaint-consumers-still-at-risk-one-year-on/
http://theconversation.com/profiles/steven-j-murdoch-152093
https://www.benthamsgaze.org/2017/07/18/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-77195
http://www0.cs.ucl.ac.uk/staff/s.meiklejohn
https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages
https://www.benthamsgaze.org/wp-content/uploads/2016/02/bestbuy-825x330.png
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-35334
https://www.benthamsgaze.org/category/cyber-crime/feed/
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/feed/
https://www.benthamsgaze.org/2016/04/21/
https://socialsciences.exeter.ac.uk/sociology/staff/leonelli/
https://arxiv.org/abs/1708.03778
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f08%2f11%2fthe-end-of-the-billion-user-passwordimpossible%2f
https://www.benthamsgaze.org/category/research-projects/feed/
https://www.benthamsgaze.org/2017/07/18/caveat-emptor-privacy-could-turn-uks-genomic-dream-into-a-nightmare/#respond
https://www.benthamsgaze.org/2017/04/04/can-games-fix-whats-wrong-with-computer-security-education/
https://www.benthamsgaze.org/wp-content/uploads/2017/10/hawkes_diagram.png
benthamsgaze.org//2018/01/16/practicing-a-science-of-security/#respond
https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/#more-740
https://www.keylength.com/en/4/
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-74836
http://www.americanbanker.com/news/law-regulation/how-zcash-tries-to-balance-privacy-transparency-in-blockchain-1092198-1.html?zkprintable%3D1&%3Bnopagination%3D1
https://www.internetsociety.org/events/ndss-symposium-2016
https://www.benthamsgaze.org/wp-content/uploads/2015/06/6689260_s-300x212.jpg
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f08%2f11%2fthe-end-of-the-billion-user-passwordimpossible%2f&%3Bformat%3Dxml
http://www.secureerpinc.com
http://sec.cs.ucl.ac.uk/users/smurdoch/talks/ccc07relayattacks.pdf
http://www0.cs.ucl.ac.uk/staff/g.stringhini/
https://opennet.net/
https://citizenlab.org/
https://en.wikipedia.org/wiki/byzantine_fault_tolerance
https://www.benthamsgaze.org/2016/11/16/a-longitudinal-measurement-study-of-4chans-politically-incorrect-forum-and-its-effect-on-the-web/
https://www.securecomputing.com/
https://www.benthamsgaze.org/2018/01/16/practicing-a-science-of-security/#respond
https://secure.gravatar.com/avatar/e51e6ac1e889e26c779b0e5bbbb391ea?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/?p%3D4
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78498
http://www0.cs.ucl.ac.uk/staff/g.stringhini/papers/dating-dimva2015.pdf
https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/
https://www.benthamsgaze.org/2015/02/09/sequencing-your-genome-is-becoming-an-affordable-reality-but-at-what-personal-cost/#more-45
https://www.benthamsgaze.org/wp-content/uploads/2016/11/zchain-1024x524.png
https://secure.gravatar.com/avatar/5af381d8301b755638fd97740c25b872?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/624628/cmo_annual_report_generation_genome.pdf
https://youtu.be/fvfbmludidk?t%3D22m26s
http://www.theregister.co.uk/2016/04/23/anti_ad_blockers_face_legal_challenges/
https://www.benthamsgaze.org/2017/11/13/systematizing-consensus-in-the-age-of-blockchains/#respond
http://www0.cs.ucl.ac.uk/staff/j.onaolapo/papers/ecrime17carding.pdf
https://www.benthamsgaze.org/wp-content/uploads/2015/10/rtemagicc_ace-meiklejohn.jpg-300x200.jpg
https://www.benthamsgaze.org/2015/02/11/
https://www.benthamsgaze.org/2015/10/20/george-danezis-smart-grid-privacy-peer-to-peer-and-social-network-security/#respond
https://www.cs.columbia.edu/~angelos/papers/2004/tmreview.pdf
https://github.com/musalbas/chainspace
http://krebsonsecurity.com/2016/05/as-scope-of-2012-breach-expands-linkedin-to-again-reset-passwords-for-some-users/
https://news.vice.com/story/alt-right-trolls-are-getting-23andme-genetic-tests-to-prove-their-whiteness
https://www.benthamsgaze.org/2017/05/13/the-politics-of-the-nhs-wannacrypt-ransomware-outbreak/#respond
https://www.benthamsgaze.org/2016/06/17/smart-contracts-beyond-the-age-of-innocence/#comments
https://www.benthamsgaze.org/2016/06/28/user-centred-security-awareness-empowers-employees-to-be-the-strongest-defense/#comments
http://tech.newstatesman.com/guest-opinion/phishing-employees
https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D35334#respond
https://www.benthamsgaze.org/contribution-policy/
https://www.benthamsgaze.org/category/talks-and-panels/feed/
http://research.microsoft.com/pubs/155185/goldwasserr07.pdf
https://www.benthamsgaze.org/wp-content/uploads/2017/01/spectrum.png
https://www.benthamsgaze.org/2016/06/17/
http://sec.cs.ucl.ac.uk/people/m_angela_sasse/
https://www.theguardian.com/technology/2017/jun/15/university-college-london-hit-by-ransomware-attack-hospitals-email-phishing
https://www.benthamsgaze.org/2016/11/08/strong-customer-authentication-in-the-payment-services-directive-2/#more-1259
https://research.torproject.org/techreports/datagram-comparison-2011-11-07.pdf
https://www.benthamsgaze.org/wp-content/uploads/2016/12/proximitydump4.png
https://sensorsprivacy.com/proximity-sensor
https://www.benthamsgaze.org/2016/09/07/
https://www.benthamsgaze.org/author/jspring/
https://www.benthamsgaze.org/2016/12/15/
https://www.benthamsgaze.org/category/inside-infosec/
https://www.benthamsgaze.org/2015/09/29/
http://www0.cs.ucl.ac.uk/staff/s.azouvi/
http://cacr.uwaterloo.ca/techreports/2014/cacr2014-10.pdf
http://sec.cs.ucl.ac.uk/?id%3D6436&%3Btype%3D100
https://trust.cispa.saarland/~bugiel/publications/pdfs/androidsok-sp16.pdf
https://www.benthamsgaze.org/author/lolejnik/
https://uwspace.uwaterloo.ca/bitstream/handle/10012/4011/thesis.pdf?sequence%3D1&%3Bisallowed%3Dy
http://cacr.uwaterloo.ca/techreports/2011/cacr2011-06.pdf
https://www-users.cs.umn.edu/~hopper/imux-wpes14.pdf
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/js/html5.js
https://www.benthamsgaze.org/2017/02/
http://erc.europa.eu/starting-grants
https://www.benthamsgaze.org/2017/08/11/
https://www.benthamsgaze.org/2016/07/19/microsoft-ireland-winning-the-battle-for-privacy-but-losing-the-war/
http://fortune.com/2015/04/30/facebook-small-business/
https://www.benthamsgaze.org/wp-content/uploads/2015/10/reshipping-locations1-825x198.png
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/css/ie7.css?ver%3D20141010
https://www.benthamsgaze.org/tag/measurement-studies/
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/#comment-79575
https://www.benthamsgaze.org/wp-content/uploads/2015/06/gemmb-150x150.jpg
https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/
http://www.privacyink.org/
http://ace-csr-lectures.eventbrite.com/
http://cs-people.bu.edu/wfkoch/
http://www.ethereum.org/
https://www.linkedin.com/profile/view?id%3D2823558
https://www.benthamsgaze.org/author/sazouvi/
http://www.ieee-isba2016.org/
https://www.commerce.senate.gov/public/_cache/files/24d3c229-4f2f-405d-b8db-a3a67f183883/23e30aa955b5c00fe57cfd709621592c.2014-0325-target-kill-chain-analysis.pdf
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/?replytocom%3D74488#respond
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/css/ie.css?ver%3D20141010
https://www.lightbluetouchpaper.org/2016/05/28/adblocking-and-counter-blocking-a-slice-of-the-arms-race/
https://bravenewcoin.com/assets/whitepapers/ethereum-a-secure-decentralised-generalised-transaction-ledger-yellow-paper.pdf
https://www.benthamsgaze.org/wp-content/uploads/2017/10/percent_events_difference_drop-1024x751.png
https://www.usenix.org/system/files/conference/foci13/foci13-nowlan.pdf
http://steemit.com/
https://www.lightbluetouchpaper.org/2017/05/13/bad-malware-worse-reporting/
https://www.benthamsgaze.org/2015/12/17/nicolas-courtois-algebraic-cryptanalysis/#respond
http://privacy.cs.cmu.edu/
http://technosociology.org/?page_id%3D1687
https://www.benthamsgaze.org/2016/07/19/microsoft-ireland-winning-the-battle-for-privacy-but-losing-the-war/#respond
https://www.benthamsgaze.org/2015/04/23/one-out-of-many-proofs-or-how-to-leak-a-secret-and-spend-a-coin/#respond
https://www.theguardian.com/news/2017/may/24/how-facebook-flouts-holocaust-denial-laws-except-where-it-fears-being-sued
https://www.benthamsgaze.org/2017/08/
https://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/
https://www.benthamsgaze.org/2015/11/10/
https://www.benthamsgaze.org/2016/05/28/
https://www.benthamsgaze.org/2016/11/16/
http://www.internetsociety.org/events/ndss-symposium-2016
https://www.benthamsgaze.org/2016/11/08/strong-customer-authentication-in-the-payment-services-directive-2/#respond
http://www.cs.ucl.ac.uk/staff/s.murdoch
https://secure.gravatar.com/avatar/01868f9dadc966a293cfc6567e14a7b9?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://sec.cs.ucl.ac.uk/
https://www.benthamsgaze.org/2017/10/03/
https://www.benthamsgaze.org/2018/01/23/smart-contracts-and-bribes/feed/
http://www.uniscon.de/
https://emilianodc.com
https://secure.gravatar.com/avatar/18aa40829947d25a6b2db7b80a20fb9f?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.riscs.org.uk/2017/05/19/observing-the-wannacry-fallout-confusing-advice-and-playing-the-blame-game/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78498#respond
https://www.benthamsgaze.org/category/authentication/feed/
https://simons.berkeley.edu/
http://www.ucl.ac.uk/news/news-articles/1209/05092012-record-support-early-career-researchers
https://www.digitaltrends.com/computing/bitcoin-ethereum-mining-use-significant-electrical-power/
https://www.benthamsgaze.org/wp-content/uploads/2016/09/freedom-data.png
https://www.benthamsgaze.org/2015/02/18/
https://www.benthamsgaze.org/2017/03/24/battery-status-not-included-assessing-privacy-in-w3c-web-standards/#more-1486
http://www.cl.cam.ac.uk/~sk766/publications/ndss16_tor_differential.pdf
http://www.csl.sri.com/users/neumann/cacm231.pdf
https://eprint.iacr.org/2014/764
http://spectrum.ieee.org/telecom/security/the-athens-affair
https://www.benthamsgaze.org/category/law-enforcement/feed/
https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/#respond
https://kclpure.kcl.ac.uk/portal/en/persons/david-kohan-marzagao%28f6515225-6d18-48bd-96d4-4e493988cec7%29.html
https://www.benthamsgaze.org/page/10/
http://www.slate.com/articles/health_and_science/medical_examiner/2017/09/genetic_testing_data_reveals_the_irrationality_of_human_behavior.html
https://www.benthamsgaze.org/xmlrpc.php
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f08%2f22%2fshould-you-phish-your-own-employees%2f&%3Bformat%3Dxml
https://www.benthamsgaze.org/2015/02/11/on-line-lecture-dp5-private-presence-31c3/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78489#respond
http://www.beaconforfreedom.org/liste.html?tid%3D415&%3Bart_id%3D475
https://www.bleepingcomputer.com/news/security/hummingbad-android-malware-found-in-20-google-play-store-apps/
https://www.benthamsgaze.org/category/cryptocurrencies/feed/
http://www0.cs.ucl.ac.uk/staff/y.desmedt/
https://web.eecs.umich.edu/~kevinfu/
https://www.documentcloud.org/documents/2511925-farrell-nov-2015-motion.html#document/p2/a260739
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D82505#respond
https://www.blackhat.com/
https://www.fireeye.com/blog/threat-research/2017/03/still_getting_served.html
https://www.benthamsgaze.org/2016/11/22/blockchains-and-why-we-need-privacy/#respond
https://www.benthamsgaze.org/category/cryptography/page/3/
https://events.ccc.de/congress/2014/fahrplan/system/attachments/2535/original/dp5-31c3.pdf
http://sec.cs.ucl.ac.uk/ace_csr/seminars_calendar/seminar_details/article/cyber-security-in-practice-detecting-real-attacks-on-real-networks/
https://www.benthamsgaze.org/2015/08/20/
https://www.benthamsgaze.org/2016/07/13/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f11%2f13%2fsystematizing-consensus-in-the-age-of-blockchains%2f
https://www.benthamsgaze.org/2017/04/04/can-games-fix-whats-wrong-with-computer-security-education/#more-1391
https://www.benthamsgaze.org/wp-content/uploads/2016/10/complete_architecture.png
benthamsgaze.org//2017/12/13/a-critical-analysis-of-genome-privacy-research/#respond
http://fc16.ifca.ai/preproceedings/25_lang.pdf
https://www.benthamsgaze.org/category/cyber-crime/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78499#respond
https://www.benthamsgaze.org/2016/11/08/strong-customer-authentication-in-the-payment-services-directive-2/
https://en.wikipedia.org/wiki/pure_function
https://www.benthamsgaze.org/2016/12/15/privacy-analysis-of-the-w3c-proximity-sensor-specification/#respond
https://www.benthamsgaze.org/wp-content/uploads/2015/10/reshippinggraphic-580x328.png
https://www.vasco.com/
https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/
https://www.benthamsgaze.org/2015/09/29/mathematical-modelling-in-the-two-cultures/#more-332
http://www.economist.com/news/leaders/21647285-more-and-more-money-being-spent-higher-education-too-little-known-about-whether-it
https://allofus.nih.gov/
https://www.benthamsgaze.org/2016/07/29/analyzing-privacy-aspects-of-the-w3c-vibration-api/#more-1001
http://ec.europa.eu/internal_market/payments/docs/framework/framework-workingdoc-contrib/barclays_en.pdf
https://www.benthamsgaze.org/2017/11/13/systematizing-consensus-in-the-age-of-blockchains/
https://www.benthamsgaze.org/2015/12/10/how-tors-privacy-was-momentarily-broken-and-the-questions-it-raises/#respond
https://www.benthamsgaze.org/
https://www.benthamsgaze.org/2017/05/23/find-security-champions-in-blends-of-organisational-culture/#respond
https://www.benthamsgaze.org/wp-content/uploads/2015/06/vasm-150x150.jpg
https://www.benthamsgaze.org/2015/11/24/program-obfuscation/#respond
https://www.benthamsgaze.org/2017/07/25/top-ten-obstacles-along-distributed-ledgers-path-to-adoption/#respond
http://blogs.royalsociety.org/in-verba/2016/06/06/exceptional-access-provisions-and-the-investigatory-powers-bill/
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/js/skip-link-focus-fix.js?ver%3D20141010
https://www.benthamsgaze.org/2016/03/16/bitcoin-workshop-at-financial-crypto-2016/#respond
http://znjp.com
https://www.benthamsgaze.org/wp-content/uploads/2016/11/4chan-011-825x175.png
https://github.com/aliclark/tor
http://www.ucl.ac.uk/bentham-project/who/panopticon
https://www.benthamsgaze.org/2016/07/05/workshop-theory-and-practice-of-secure-multiparty-computation/#respond
https://www.benthamsgaze.org/2015/04/20/msc-information-security-ucl/#respond
https://www.benthamsgaze.org/wp-content/uploads/2017/12/screen-shot-2017-12-13-at-14.14.13-1024x538.png
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_samuel_ranellucci.pdf
https://www.benthamsgaze.org/2015/05/14/
https://www.cosic.esat.kuleuven.be/eurocrypt_2015/
https://secure.gravatar.com/avatar/248e42d88c4828539a1bc2debb23f364?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://www.eba.europa.eu/documents/10180/1548183/consultation+paper+on+draft+rts+on+sca+and+csc+%28eba-cp-2016-11%29.pdf
https://tylermoore.ens.utulsa.edu/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78444
https://www.benthamsgaze.org/2017/03/28/mamadroid-detecting-android-malware-by-building-markov-chains-of-behavioral-models/#comments
http://blogs.microsoft.com/blog/2014/12/15/business-media-civil-society-speak-key-privacy-case/
http://www.publications.parliament.uk/pa/jt201516/jtselect/jtinvpowers/93/93.pdf
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_yuvai_ishai.pdf
https://xkcd.com/936/
https://www.benthamsgaze.org/2016/07/29/analyzing-privacy-aspects-of-the-w3c-vibration-api/#respond
https://www.benthamsgaze.org/2015/01/07/introducing-the-expanded-ucl-information-security-group/
https://www.benthamsgaze.org/wp-content/uploads/2015/03/panopticam-1024x514.jpg
benthamsgaze.org//a
http://blogs.oii.ox.ac.uk/policy/the-blockchain-paradox-why-distributed-ledger-technologies-may-do-little-to-transform-the-economy/
https://qz.com/956139/uber-drivers-are-comparing-fares-with-riders-to-check-their-pay-from-the-company/
https://www.benthamsgaze.org/2015/03/06/why-benthams-gaze/
http://sheharbano.com/
https://www.benthamsgaze.org/2016/08/23/
https://www.benthamsgaze.org/2015/10/20/george-danezis-smart-grid-privacy-peer-to-peer-and-social-network-security/#more-354
http://www.eba.europa.eu/-/eba-seeks-input-on-strong-customer-authentication-and-secure-communication-under-psd2
https://www.benthamsgaze.org/wp-content/uploads/2015/10/nopin-poc-1024x386.jpg
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78574#respond
https://twitter.com/mavroudisv
https://www.benthamsgaze.org/2015/02/18/is-sending-shoppers-ads-by-bluetooth-just-a-bit-creepy/#respond
https://www.gov.uk/government/publications/distributed-ledger-technology-blackett-review
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-35330
http://www.bankofengland.co.uk/research/documents/onebank/discussion.pdf
http://fortune.com/2016/03/01/brazil-facebook-arrest/
https://www.benthamsgaze.org/author/angela/
https://en.wikipedia.org/wiki/file:countries_initially_affected_in_wannacry_ransomware_attack.png
https://validator.w3.org/feed/check.cgi?url%3Dhttp%3a%2f%2fwww.benthamsgaze.org%2ffeed
https://www.benthamsgaze.org/wp-content/uploads/2015/07/01-ga17-introcomms.pptx
https://www.benthamsgaze.org/2015/12/
https://www.youtube-nocookie.com/embed/x7pjuixkoec
https://www.eff.org/issues/national-security-letters
https://www.benthamsgaze.org/2017/10/03/liability-for-push-payment-fraud-pushed-onto-the-victims/#comments
https://www.benthamsgaze.org/2017/07/25/top-ten-obstacles-along-distributed-ledgers-path-to-adoption/#more-1691
https://blockchain-summer.epfl.ch/#program
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fcontribution-policy%2f&%3Bformat%3Dxml
http://conferences.sigcomm.org/imc/2016/
http://www.nspw.org/2017/program
https://research.microsoft.com/apps/pubs/?id%3D217510
https://www.benthamsgaze.org/category/malware/page/2/
http://www.saardrimer.com/sd410/
http://www.emvco.com/about_emvco.aspx?id%3D202
http://dropsafe.crypticide.com/aboutalecm
https://www.benthamsgaze.org/2016/01/19/
https://www.benthamsgaze.org/2016/02/17/are-payment-card-contracts-unfair/
https://snowdenarchive.cjfe.org/greenstone/cgi-bin/library.cgi
https://www.benthamsgaze.org/2016/03/16/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78489
https://www.benthamsgaze.org/wp-content/uploads/2017/05/wannacry_customaes-184x300.png
http://www.leparisien.fr/faits-divers/l-imparable-escroquerie-a-la-carte-bancaire-24-01-2012-1826971.php
http://www0.cs.ucl.ac.uk/staff/g.danezis/
https://www.benthamsgaze.org/2017/11/13/
https://www.benthamsgaze.org/2016/11/14/understanding-the-use-of-leaked-webmail-credentials-in-the-wild/#comments
https://www.benthamsgaze.org/2015/09/10/what-are-the-social-costs-of-contactless-fraud/
https://www.benthamsgaze.org/2016/07/05/workshop-theory-and-practice-of-secure-multiparty-computation/
https://www.internetsociety.org/doc/mamadroid-detecting-android-malware-building-markov-chains-behavioral-models
https://www.benthamsgaze.org/category/measurement/feed/
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic5.png
https://www.benthamsgaze.org/2015/12/17/nicolas-courtois-algebraic-cryptanalysis/
http://ec.europa.eu/finance/payments/framework/index_en.htm
http://www.thinkmind.org/download.php?articleid%3Dcomputation_tools_2012_1_40_80034
https://www.benthamsgaze.org/wp-content/uploads/2017/12/screen-shot-2017-12-13-at-14.24.02-880x1024.png
http://mattmettler.com
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/feed/
https://www.benthamsgaze.org/category/meta/
http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/
https://theintercept.com/2015/02/19/great-sim-heist/
http://sec.cs.ucl.ac.uk/ace_csr/news_announcements/article/dr_murdoch_interviewed_by_the_register_on_biometric_payment_cards/
https://www.benthamsgaze.org/2016/08/02/
https://www.benthamsgaze.org/wp-content/uploads/2016/10/complete_architecture-300x219.png
https://www.benthamsgaze.org/2015/04/20/msc-information-security-ucl/#more-113
https://www.benthamsgaze.org/category/legal-issues/feed/
https://www.benthamsgaze.org/2017/11/
https://www.benthamsgaze.org/category/banking-security/
http://www.cs.ucl.ac.uk/staff/s.murdoch/papers/oakland10chipbroken.pdf
https://www.benthamsgaze.org/category/law-enforcement/
http://www.theguardian.com/technology/2014/jul/22/is-tor-truly-anonymising-conference-cancelled
https://www.benthamsgaze.org/author/sparkin/
https://www.benthamsgaze.org/2017/01/17/
https://www.benthamsgaze.org/wp-content/uploads/2015/07/05-ga17-selective-disclosure.pptx
https://fc18.ifca.ai/
https://www.benthamsgaze.org/2017/01/31/
https://www.benthamsgaze.org/category/genomics/
https://secure.gravatar.com/avatar/467488d9fdbe7da980bc0964a6d8a8aa?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2016/10/
https://www.benthamsgaze.org/2016/11/16/a-longitudinal-measurement-study-of-4chans-politically-incorrect-forum-and-its-effect-on-the-web/#more-1278
https://www.benthamsgaze.org/?p%3D1514
http://www.forbes.com/sites/matthewherper/2011/01/05/the-first-child-saved-by-dna-sequencing/
https://www.benthamsgaze.org/2016/02/09/
https://apwg.org/apwg-events/ecrime2017/
https://www.benthamsgaze.org/subscribing-to-benthams-gaze/feed/
https://www.openrightsgroup.org/blog/2016/the-revised-investigatory-powers-bill-what-has-changed
https://www.benthamsgaze.org/2015/04/20/msc-information-security-ucl/
http://www0.cs.ucl.ac.uk/staff/g.stringhini/hacking.html
https://www.benthamsgaze.org/2016/06/06/exceptional-access-provisions-in-the-investigatory-powers-bill/#more-912
https://www.benthamsgaze.org/category/privacy/feed/
https://www.benthamsgaze.org/2017/05/09/
https://tools.ietf.org/html/rfc6509
https://www.benthamsgaze.org/wp-content/uploads/2017/06/img-20170624-wa0008-1024x768.jpg
http://www.r3.com/
https://www.benthamsgaze.org/2015/03/30/
http://2016.laser-workshop.org/
https://twitter.com/panoptistream
https://medium.com/@privacyint/the-home-office-only-listens-when-we-dont-want-them-to-7f961deb0ee8#.9r4g9cv4s
http://www.forbes.com/sites/sarahjeong/2015/01/14/the-dhs-agent-who-infiltrated-silk-road-to-take-down-its-kingpin/
https://www.benthamsgaze.org/2016/02/23/
https://www.benthamsgaze.org/category/modelling/feed/
https://www.benthamsgaze.org/2016/08/05/moving-towards-security-and-privacy-experiments-for-the-real-world/#respond
http://www.comp.nus.edu.sg/~prateeks/papers/bitcoin-scaling.pdf
http://www.riscs.org.uk/
https://bitcoin.org/en/developer-guide#block-chain
https://www.benthamsgaze.org/2017/05/19/observing-the-wannacry-fallout-confusing-advice-and-playing-the-blame-game/#respond
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f10%2f04%2fhow-4chan-and-the_donald-influence-the-fake-news-ecosystem%2f
http://sec.cs.ucl.ac.uk/home/
http://services.parliament.uk/bills/2016-17/investigatorypowers.html
https://www.theregister.co.uk/2017/05/13/wannacrypt_ransomware_worm/
https://www.blackhat.com/docs/asia-15/materials/asia-15-vandenbreekel-relaying-emv-contactless-transactions-using-off-the-shelf-android-devices-wp.pdf
http://www.webopedia.com/term/d/ddos_attack.html
https://www.benthamsgaze.org/author/davidpym/
http://www.cs.ucl.ac.uk/staff/d.pym/nspw2017.pdf
https://www.benthamsgaze.org/2017/03/24/
https://www.howtogeek.com/186754/microsoft-is-still-making-security-updates-for-windows-xp-but-you-cant-have-them/
https://secure.gravatar.com/avatar/e17465b53ab649618619c6e5e5326848?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/wp-content/uploads/2017/09/img_3489.jpg
https://www.benthamsgaze.org/2015/03/30/banks-undermine-security/#more-106
http://fortune.com/2017/01/09/amazon-echo-alexa-dollhouse/
https://www.ft.com/content/e96924f0-3722-11e7-99bd-13beb0903fa3
https://www.benthamsgaze.org/2016/07/29/analyzing-privacy-aspects-of-the-w3c-vibration-api/
https://www.benthamsgaze.org/2015/03/30/banks-undermine-security/#respond
benthamsgaze.org//2017/08/11/the-end-of-the-billion-user-passwordimpossible/#respond
https://www.benthamsgaze.org/2017/01/31/diversity-is-our-strength/#respond
https://www.benthamsgaze.org/category/public-policy/page/2/
https://secure.gravatar.com/avatar/6fb09f94fea112fab154cc612f8bf740?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.theguardian.com/technology/2017/may/13/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack
https://drive.google.com/open?id%3D0byp5a__khv0dm1zsy3yxqwf2n2c
https://www.benthamsgaze.org/wp-content/uploads/2016/11/imc16gmailmap-825x124.png
benthamsgaze.org//subscribing-to-benthams-gaze/#respond
http://www.dimva2015.it
https://www.benthamsgaze.org/wp-includes/wlwmanifest.xml
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-74448
https://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/
https://arstechnica.com/security/2016/08/code-dumped-online-came-from-omnipotent-nsa-tied-hacking-group/
https://www.benthamsgaze.org/wp-content/uploads/2016/06/photo.jpg
https://www.benthamsgaze.org/2015/10/27/an-analysis-of-reshipping-mule-scams/
https://www.benthamsgaze.org/2015/04/23/one-out-of-many-proofs-or-how-to-leak-a-secret-and-spend-a-coin/
https://www.benthamsgaze.org/2017/05/23/
https://twitter.com/jepaynemsft/status/880495498179694592
http://www.bankofengland.co.uk/research/pages/onebank/cbdc.aspx
https://www.benthamsgaze.org/2015/02/06/tor-the-last-bastion-of-online-anonymity/#respond
http://www.europarl.europa.eu/stoa/webdav/site/cms/shared/2_events/workshops/2015/20151208/top-3%20policy%20recommendations_04-01-2016-ok-v2.pdf
https://www.benthamsgaze.org/wp-content/uploads/2016/01/2275723713_ccf72809ec_b-e1453067447130-825x325.jpg
https://www.benthamsgaze.org/wp-content/uploads/2016/01/secure_voice_at_official.pdf
http://research.microsoft.com/en-us/people/markulf/
https://www.benthamsgaze.org/category/blockchain/feed/
https://www.benthamsgaze.org/wp-content/uploads/2016/05/farms-1024x524.png
https://www.benthamsgaze.org/2015/02/09/sequencing-your-genome-is-becoming-an-affordable-reality-but-at-what-personal-cost/#respond
benthamsgaze.org//2017/08/22/should-you-phish-your-own-employees/#respond
https://ec.europa.eu/programmes/horizon2020/en/h2020-section/marie-sklodowska-curie-actions
https://twitter.com/jeffreycrowell
https://www.benthamsgaze.org/2015/02/06/
https://www.w3.org/2017/process-20170301/#reports
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-35231
https://www.benthamsgaze.org/tag/fraud/
http://discovery.ucl.ac.uk/1349987/
https://cdecker.github.io/btcresearch/
https://www.benthamsgaze.org/2017/05/13/
https://www.eff.org/deeplinks/2013/05/blue-coat-syria-scandal-next-shoe-drops-computerlinks-fzco
https://www.prism.ucl.ac.uk/#!/?institution%3D5243
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-82505
https://en.wikipedia.org/wiki/distributed_hash_table
https://www.benthamsgaze.org/2017/01/17/inaugural-lecture-zero-knowledge-proofs/
https://www.benthamsgaze.org/2016/10/18/yes-we-have-no-receipts/#respond
https://www.benthamsgaze.org/2015/11/10/sarah-meiklejohn-security-and-cryptography/
https://www.benthamsgaze.org/2015/09/
https://insights.sei.cmu.edu/cert/2014/03/why-cybersecurity-is-not-like-the-immune-system.html
http://www.legislation.gov.uk/ukpga/2014/27/enacted
https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/solongandnothanks.pdf
http://www.ucl.ac.uk/museums/jeremy-bentham/about/bentham-head
https://twitter.com/panopticam
https://www.benthamsgaze.org/wp-content/uploads/2016/09/tor-data.png
https://www.benthamsgaze.org/?p%3D54
http://motherboard.vice.com/read/court-docs-show-a-university-helped-fbi-bust-silk-road-2-child-porn-suspects
http://cfem.au.dk/
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic3-300x216.png
http://www0.cs.ucl.ac.uk/staff/d.clark/
http://discovery.ucl.ac.uk/20247/
http://dx.doi.org/10.1093/cybsec/tyw012
http://www.nicolascourtois.com/papers/ucl_cipher_champion_2013.pdf
https://www.benthamsgaze.org/2016/10/25/how-to-do-zero-knowledge-from-discrete-logs-in-under-7kb/#respond
https://www.benthamsgaze.org/2015/12/17/nicolas-courtois-algebraic-cryptanalysis/#more-542
http://news.bbc.co.uk/1/hi/business/4692566.stm
http://arstechnica.com/tech-policy/2015/01/friend-who-helped-ulbricht-build-silk-road-testifies-against-him/
https://github.com/nfcgate/nfcgate
https://www.benthamsgaze.org/2016/06/
https://www.benthamsgaze.org/wp-content/uploads/2015/10/nopin-poc.jpg
https://www.benthamsgaze.org/2015/11/17/
https://www.facebook.com/uclmscisec/
https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/#comments
https://www.dropbox.com/help/security/ransomware-recovery
https://en.wikipedia.org/wiki/presidio_modelo
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-35344
https://www.benthamsgaze.org/wp-includes/js/jquery/jquery.js?ver%3D1.12.4
https://www.benthamsgaze.org/category/security-usability/
http://www.cl.cam.ac.uk/~sjm217/
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/weis16fraudreimbursement.pdf
https://www.benthamsgaze.org/2015/05/01/teaching-cybersecurity-to-criminologists/
https://www.benthamsgaze.org/2016/02/
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comments
https://www.benthamsgaze.org/2016/01/12/
https://www.benthamsgaze.org/2015/12/10/how-tors-privacy-was-momentarily-broken-and-the-questions-it-raises/#more-606
http://www.ieee-security.org/tc/sp2016/index.html
https://www.benthamsgaze.org/2015/08/
https://arxiv.org/pdf/1510.02037.pdf
https://www.benthamsgaze.org/2016/09/07/battery-status-readout-as-a-privacy-risk/#respond
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/?replytocom%3D79575#respond
https://www.benthamsgaze.org/wp-content/uploads/2017/12/15431.01.l-300x225.jpg
http://cybersecuritychallenge.org.uk/
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_claudio_orlandi.pdf
http://www0.cs.ucl.ac.uk/staff/g.stringhini/papers/socialnet-spam.pdf
https://www.benthamsgaze.org/tag/like-farming/
https://www.benthamsgaze.org/2017/07/04/epfl-blockchain-summer-school/#more-1641
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2018%2f01%2f16%2fpracticing-a-science-of-security%2f
http://cointelegraph.com/news/dao-makes-history-raises-130-million-breaking-all-records
http://www.rfc-editor.org/rfc/rfc6962.txt
https://www.proofpoint.com/us/threat-insight/post/adgholas-malvertising-campaign-using-astrum-ek-deliver-mole-ransomware
https://www.internetsociety.org/doc/fixing-security-together-leveraging-trust-relationships-improve-security-organizations
https://www.benthamsgaze.org/2016/06/28/user-centred-security-awareness-empowers-employees-to-be-the-strongest-defense/
https://www.benthamsgaze.org/2016/08/23/steven-murdoch-privacy-and-financial-security/
https://blog.ethcore.io/attack-on-thedao-what-will-be-your-response/
https://www.benthamsgaze.org/2017/01/17/inaugural-lecture-zero-knowledge-proofs/#respond
https://www.lightbluetouchpaper.org/2016/07/12/royal-society-report-on-cybersecurity-research/
https://fas.org/irp/agency/dod/jason/cyber.pdf
https://www.benthamsgaze.org/2015/03/13/
https://www.routledge.com/the-routledge-handbook-of-mechanisms-and-mechanical-philosophy/glennan-illari/p/book/9781138841697
https://global.oup.com/academic/product/explaining-the-brain-9780199299317
https://www.benthamsgaze.org/2016/09/07/battery-status-readout-as-a-privacy-risk/
https://arxiv.org/pdf/1610.03452.pdf
http://www.heraldsun.com.au/news/law-order/police-in-talks-with-banks-to-fight-tap-and-go-crime-wave/story-fni0fee2-1227187587553
https://scholar.google.co.uk/citations?user%3Dye3axuoaaaaj
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D35257#respond
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78574
https://www.benthamsgaze.org/wp-content/uploads/2017/05/c-cxrkbu0aaxhgr.jpg-large-864x1024.jpeg
http://events.ccc.de/category/31c3/
https://www.benthamsgaze.org/2015/10/07/
https://www.benthamsgaze.org/2017/01/10/
https://blogs.ancestry.com/cm/what-over-6-million-people-learned-when-they-took-ancestrydna-tests/
https://en.wikipedia.org/wiki/smart_contract
https://bitcoin.org/bitcoin.pdf
https://www.benthamsgaze.org/2017/01/10/security-intrusions-as-mechanisms/#respond
https://eprint.iacr.org/2013/454
https://theintercept.com/2014/12/13/belgacom-hack-gchq-inside-story/
http://www.theguardian.com/media-network/media-network-blog/2014/sep/04/beacon-technology-house-of-fraser-waitrose
https://www.benthamsgaze.org/2016/12/15/privacy-analysis-of-the-w3c-proximity-sensor-specification/
https://blog.slock.it/no-dao-funds-at-risk-following-the-ethereum-smart-contract-recursive-call-bug-discovery-29f482d348b#.f5pv6v6iz
https://www.benthamsgaze.org/2016/08/23/steven-murdoch-privacy-and-financial-security/#respond
https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-jansen.pdf
https://www.benthamsgaze.org/2017/02/07/double-fetch-situations-turn-into-double-fetch-vulnerabilities-a-study-of-double-fetches-in-the-linux-kernel/#respond
https://notoimmigrationban.com/
https://www.benthamsgaze.org/wp-content/uploads/2015/07/04-ga17-zeroknowlegde.pptx
https://www.benthamsgaze.org/category/the-conversation/feed/
https://www.benthamsgaze.org/2016/06/28/
https://www.benthamsgaze.org/2015/10/07/gianluca-stringhini-cyber-criminal-operations-and-developing-systems-to-defend-against-them/#more-345
https://www.benthamsgaze.org/category/research-projects/
https://www.benthamsgaze.org/wp-content/uploads/2017/05/password_strength.png
https://www.coindesk.com/short-guide-bitcoin-forks-explained/
https://www.youtube.com/embed/8tjjmbtbxse?feature%3Doembed
https://www.benthamsgaze.org/category/authentication/
https://www.benthamsgaze.org/wp-content/uploads/2015/04/dsc_0016.jpg
https://www.benthamsgaze.org/2017/03/28/mamadroid-detecting-android-malware-by-building-markov-chains-of-behavioral-models/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78470#respond
https://www.benthamsgaze.org/2017/05/13/the-politics-of-the-nhs-wannacrypt-ransomware-outbreak/
https://www.theguardian.com/business/2017/jul/06/cyber-attack-nurofen-durex-reckitt-benckiser-petya-ransomware
https://blog.torproject.org/blog/some-statistics-about-onions
http://www.internetsociety.org/sites/default/files/eurousec2017_06_abu-salma_paper.pdf
https://www.tilburguniversity.edu/webwijs/show/e.kosta-2.htm
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f12%2f13%2fa-critical-analysis-of-genome-privacy-research%2f&%3Bformat%3Dxml
http://www.ref.ac.uk/
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic3.png
https://www.benthamsgaze.org/wp-content/uploads/2016/11/animine.png
https://www.benthamsgaze.org/2015/02/11/on-line-lecture-dp5-private-presence-31c3/#respond
<iframe width="660" height="371" src="https://www.youtube.com/embed/1XIekTniX00?feature=oembed" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube.com/embed/wAbKB0kaH6c?feature=oembed" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube.com/embed/TY3wsqGOZ28?feature=oembed" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube-nocookie.com/embed/4s4pKcggiW4" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube.com/embed/Lfen7ZOIkYw?feature=oembed" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube-nocookie.com/embed/X7pjUIxKoEc" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube.com/embed/oSnYmMHp-o8?feature=oembed" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube.com/embed/8tJJmbTbxsE?feature=oembed" frameborder="0" allowfullscreen>

No Malware Detected By Free Online Website Scan On This Website.

A free external scan did not find malicious activity on your website. If you still think that your website is infected with malware or hacked, please subscribe to a plan, we will scan your website internally and perform a full manual audit of your site as well as clean any infection that our free scanner didn't pick up.

Protect Your Website Now!

Is this plan for me?

website security plans and features
StopBadware - domain is Clean. more info
Google - domain is Clean. more info
Quttera Labs - domain is Clean.

"The malware entry is cached and may not reflect the current status of the domain. You can request re-consideration by Quttera malware research team."

MalwareDomainList - domain is Clean. more info
ZeusTracker - domain is Clean. more info
Phishtank - domain is Clean. more info
Yandex Safebrowsing - domain is Clean. more info

Website Firewall

Malware & blacklist removal

customers showcase

Have an idea or want to provide feedback? Welcome to our feedback & support site!

Is your website secure? Check yourself for Top 7 common website security bad practices on our Blog

Review Threat severity assessment classification

Report incorrect detection on helpdesk.quttera.com or send an email to support@quttera.com (expect a reply within 72 hrs)

Newsletter

Join our mailing list to receive free email updates

Subscribe now

Magento Skimmer in Google Analytics Plugin | Quttera

Blog: Magento Skimmer in Google Analytics Plugin

A credit card skimmer inserts a request for credit card information and sends the response to the attacker's site. Recently we found another variant on the same trick, using the Google Analytics Pro plugin.

READ MORE

Finding and Stopping Malicious HTTP Redirection | Quttera

Blog: Finding and Stopping Malicious HTTP Redirection

If malicious redirects infiltrate a website, it's important to get rid of them. It's equally important to find and fix the vulnerabilities that allowed them and improve website protection.

READ MORE

Quttera Web Application Firewall Statistics for 2018
 | Quttera

Blog: Quttera Web Application Firewall Statistics for 2018

In the period from July through December, Quttera Firewall handled 48,180,062 requests and blocked 617,074 attacks. The majority (62%) of the attacks originated from IP addresses in the United States.

READ MORE



© 2019 Quttera Ltd. All rights reserved.