Free Online Website Malware Scanner
check website for malware and vulnerability exploits online

No Malware Detected By Free Online Website Scan On This Website.

A free external scan did not find malicious activity on your website. If you still think that your website is infected with malware or hacked, please subscribe to a plan, we will scan your website internally and perform a full manual audit of your site as well as clean any infection that our free scanner didn't pick up.

Protect Your Website Now!

Is this plan for me?

website security plans and features
Normalized URL:  http://benthamsgaze.org:80
Submission date: Mon Jan 29 02:28:41 2018
Server IP address: 128.16.12.199
Country: United Kingdom
Server: Apache/2.2.15
CMS: proprietary
Malicious files: 0
Suspicious files: 0
Potentially Suspicious files: 0
Clean files: 101
External links detected: 1390
Iframes scanned: 8
Blacklisted: No
SSL Certificate details: Available via API only.

No Malware Detected By Free Online Website Scan On This Website.

A free external scan did not find malicious activity on your website. If you still think that your website is infected with malware or hacked, please subscribe to a plan, we will scan your website internally and perform a full manual audit of your site as well as clean any infection that our free scanner didn't pick up.

Protect Your Website Now!

Is this plan for me?

website security plans and features
/xmlrpc.php?rsd
Severity:
Clean
Reason:
No significant issues detected.
Details:
No significant issues detected.
File size[byte]:
860
File type:
XML
Page/File MD5:
B47487392231795F3416134E4BBF6D24
Scan duration[sec]:
0.018
/xmlrpc.php
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
42
File type:
ASCII
Page/File MD5:
1A172802B8EA33D47692EA6782F4FAF1
Scan duration[sec]:
0.011
/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
131110
File type:
HTML
Page/File MD5:
F3586BEC013BA03FD7F7844236FB9122
Scan duration[sec]:
1.639
/#content
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
131110
File type:
HTML
Page/File MD5:
F3586BEC013BA03FD7F7844236FB9122
Scan duration[sec]:
0.981
/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
131110
File type:
HTML
Page/File MD5:
F3586BEC013BA03FD7F7844236FB9122
Scan duration[sec]:
0.919
/wp-json/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
54748
File type:
ASCII
Page/File MD5:
2D884F422DE3B49B277373FE5C4AA4DB
Scan duration[sec]:
0.356
/feed/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
No significant issues detected.
File size[byte]:
127200
File type:
XML
Page/File MD5:
70AD818FC7A91871F349F487942E6B64
Scan duration[sec]:
0.679
/subscribing-to-benthams-gaze/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
39111
File type:
HTML
Page/File MD5:
05983CE3B59D5AE4A50BDE39C65C27C5
Scan duration[sec]:
0.353
/about/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
40523
File type:
HTML
Page/File MD5:
F13DFEE0B089837DEF105936834358CD
Scan duration[sec]:
0.288
/wp-includes/wlwmanifest.xml
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
1045
File type:
XML
Page/File MD5:
DFD490B6F383EA02A269031FF05E8896
Scan duration[sec]:
0.001
/contribution-policy/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
37191
File type:
HTML
Page/File MD5:
E42BB68FBBC7C9C7FD073CC36E0A42BA
Scan duration[sec]:
0.312
/2016/01/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
58167
File type:
HTML
Page/File MD5:
9262A0C1C68E29CBEB9640E9B9DC0AB1
Scan duration[sec]:
0.457
/2016/09/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
46352
File type:
HTML
Page/File MD5:
A7E9B41ACFB76C2F833058AFA14E4D4D
Scan duration[sec]:
0.361
/2016/11/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
75600
File type:
HTML
Page/File MD5:
ED60CE8EF07C407C0A39ED9981722D89
Scan duration[sec]:
0.693
/2016/02/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
56377
File type:
HTML
Page/File MD5:
2018A0851F382FF5139A0D6018C67041
Scan duration[sec]:
0.381
/2016/07/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
62224
File type:
HTML
Page/File MD5:
B72034B1199C2161DF0EEE0DE2054196
Scan duration[sec]:
0.846
/2016/10/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
45954
File type:
HTML
Page/File MD5:
FB373C4F367D666B33BC1B3E9E877E71
Scan duration[sec]:
0.615
/2016/05/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
46486
File type:
HTML
Page/File MD5:
8EC6D2A58E70F71F25F505998A14002F
Scan duration[sec]:
0.47
/2016/04/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
38892
File type:
HTML
Page/File MD5:
BE5B6BA92E164151B28E93276B87CC23
Scan duration[sec]:
0.45
/2016/08/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
51503
File type:
HTML
Page/File MD5:
ADA59D4FB0EE0EF23B41468A0F03C868
Scan duration[sec]:
0.647
/2016/12/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
43259
File type:
HTML
Page/File MD5:
7073EB179A7A0EB4951DEFC79E938EB5
Scan duration[sec]:
0.51
/2016/06/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
61431
File type:
HTML
Page/File MD5:
A61E2A4E808586B8B665F8EC4CFEA35E
Scan duration[sec]:
0.838
/2016/03/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
49748
File type:
HTML
Page/File MD5:
C8FFF7845C07A80C4479C4A144BF591C
Scan duration[sec]:
0.49
/2015/01/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
41266
File type:
HTML
Page/File MD5:
B0A4C548F629F55CA430C1517F086D8B
Scan duration[sec]:
1.217
/2015/09/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
41894
File type:
HTML
Page/File MD5:
C2C3690D24E0AF822B0E25BC04DEFFA7
Scan duration[sec]:
0.555
/2015/11/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
53584
File type:
HTML
Page/File MD5:
76DF8FB7E2429E9DE5D78ECD2ABCDA3E
Scan duration[sec]:
0.625
/2015/02/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
50033
File type:
HTML
Page/File MD5:
7EBD184DF2236CC4D364B919D8AADC66
Scan duration[sec]:
0.504
/2015/07/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
38080
File type:
HTML
Page/File MD5:
ABA205C2C20A0B2E8F674C1F75A444C5
Scan duration[sec]:
0.4
/2015/10/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
59120
File type:
HTML
Page/File MD5:
60385A7D31D5C02735B3ED27AAA14137
Scan duration[sec]:
0.62
/2015/05/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
50167
File type:
HTML
Page/File MD5:
D4C6967EDA158CA19D1CE157A88E2BE3
Scan duration[sec]:
0.715
/2015/04/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
42965
File type:
HTML
Page/File MD5:
FBFD91962B1A13FAF83F5FECB31614D2
Scan duration[sec]:
0.856
/2015/08/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
37223
File type:
HTML
Page/File MD5:
739AC77033F0086344EDE61BDA995A14
Scan duration[sec]:
0.416
/2015/12/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
60709
File type:
HTML
Page/File MD5:
ACFBDD7AB9E4F2CE3721102AC40DA756
Scan duration[sec]:
0.558
/2015/06/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
39447
File type:
HTML
Page/File MD5:
519BBE2A3CCCC0F979EFCE060B200F07
Scan duration[sec]:
0.468
/2015/03/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
48043
File type:
HTML
Page/File MD5:
2069E7D639FC8719B1FE9395BBF96B8E
Scan duration[sec]:
0.649
/2018/01/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
45315
File type:
HTML
Page/File MD5:
CA3DBB97C0241520BF9201697E4606AB
Scan duration[sec]:
0.447
/2017/01/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
58817
File type:
HTML
Page/File MD5:
67BB6372F0D4B6E956DB3849CA28D021
Scan duration[sec]:
0.932
/2017/11/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
40749
File type:
HTML
Page/File MD5:
119EF7E245D422BA5FB8FAB3D55A6C36
Scan duration[sec]:
0.32
/2017/02/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
39665
File type:
HTML
Page/File MD5:
18FEB186648A9B1B0FD189F8CCE2DED3
Scan duration[sec]:
0.425
/2017/07/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
63306
File type:
HTML
Page/File MD5:
F4A4263E5B2ABB1B456C6005CA3C9069
Scan duration[sec]:
0.904
/2017/10/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
55846
File type:
HTML
Page/File MD5:
339CD3393631EE8A2C96102CE2327D3C
Scan duration[sec]:
0.491
/2017/05/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
87771
File type:
HTML
Page/File MD5:
29F517886AC1412FA4922E340B415401
Scan duration[sec]:
0.677
/2017/04/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
38530
File type:
HTML
Page/File MD5:
D1344D5F3B51A974D9BD412613D757D1
Scan duration[sec]:
0.308
/2017/08/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
78824
File type:
HTML
Page/File MD5:
6FE1478B9D446C4A6B71A6EDF4CEE228
Scan duration[sec]:
0.641
/2017/12/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
43092
File type:
HTML
Page/File MD5:
89CAAD86DF98B6F367D9D50763100EB5
Scan duration[sec]:
0.348
/2017/03/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
54612
File type:
HTML
Page/File MD5:
06CED14A5D53F3EB2FAE97DBF5908E76
Scan duration[sec]:
0.399
/comments/feed/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
No significant issues detected.
File size[byte]:
14862
File type:
XML
Page/File MD5:
39953B5964F6AC9E47D6458EC528F260
Scan duration[sec]:
0.087
/category/crime-science/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
71156
File type:
HTML
Page/File MD5:
7A54E265B2E9905DADD912BE05457202
Scan duration[sec]:
0.564
/category/censorship-resistance/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
68649
File type:
HTML
Page/File MD5:
ED52D7859A65438A3FF044B17997E1DB
Scan duration[sec]:
0.396
/category/operating-systems/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
46607
File type:
HTML
Page/File MD5:
8F50232F10AAC84A88F6E87A1AD4F49B
Scan duration[sec]:
0.291
/category/genomics/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
63553
File type:
HTML
Page/File MD5:
0F4F965683784DF28ED75C0E03B4E046
Scan duration[sec]:
0.461
/category/blockchain/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
109186
File type:
HTML
Page/File MD5:
D0F67E48F2BBCDE85DABB8F7EAF0454E
Scan duration[sec]:
0.673
/category/measurement/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
109248
File type:
HTML
Page/File MD5:
CC6819FC912313F8E9CB84992DCF35CE
Scan duration[sec]:
0.749
/category/cryptocurrencies/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
113089
File type:
HTML
Page/File MD5:
9EF5242487E1D176FEB85797535305A5
Scan duration[sec]:
0.849
/category/the-conversation/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
94138
File type:
HTML
Page/File MD5:
97A821BF47ED448B608AABC7BC333D5E
Scan duration[sec]:
0.687
/category/talks-and-panels/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
69848
File type:
HTML
Page/File MD5:
EF61532FD287E3E697BB33BA03EEA342
Scan duration[sec]:
0.554
/category/infosec/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
90474
File type:
HTML
Page/File MD5:
768ABB645D099F8AF2449AF58085DD8A
Scan duration[sec]:
0.692
/category/malware/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
121906
File type:
HTML
Page/File MD5:
3A81D226E6155D2E82928F3A369C1B07
Scan duration[sec]:
0.755
/category/education/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
107212
File type:
HTML
Page/File MD5:
B8E65223BE3B141B787EFD32A57B4D79
Scan duration[sec]:
1.062
/category/inside-infosec/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
66110
File type:
HTML
Page/File MD5:
840EF7A9C2D69E59F67C3A0652E6242C
Scan duration[sec]:
0.522
/category/networking/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
49470
File type:
HTML
Page/File MD5:
65243BD4671C81E9BDAB84FF5AA02187
Scan duration[sec]:
0.313
/category/public-policy/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
131383
File type:
HTML
Page/File MD5:
6CDB46E4DD98486D87DFBA905C60986B
Scan duration[sec]:
0.905
/category/internet-security/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
116505
File type:
HTML
Page/File MD5:
0A05A567C3735B2908DD2CF5CDF8FFCC
Scan duration[sec]:
0.746
/category/cyber-crime/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
123096
File type:
HTML
Page/File MD5:
6DB74088265C25E2D91297833205C1C6
Scan duration[sec]:
0.764
/category/banking-security/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
108641
File type:
HTML
Page/File MD5:
3E054E29D22F64021CEA21DBFC0C52FF
Scan duration[sec]:
1.214
/category/social-networks/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
44640
File type:
HTML
Page/File MD5:
FDA144A5E845BBAC628B8F5AC6250FC0
Scan duration[sec]:
0.404
/category/hardware/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
51214
File type:
HTML
Page/File MD5:
7F5914C34E843E309D97695D92BFC68E
Scan duration[sec]:
0.366
/category/meta/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
42832
File type:
HTML
Page/File MD5:
BA4EB20BB209E97268FE265004BD4743
Scan duration[sec]:
0.296
/category/cryptography/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
114113
File type:
HTML
Page/File MD5:
8A06F78A7FFE8BC17DB592FF921B4F30
Scan duration[sec]:
0.838
/category/research-projects/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
56279
File type:
HTML
Page/File MD5:
F40BBC8D93FBD74E6FDE2CDFCC7831C6
Scan duration[sec]:
0.822
/category/advertising/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
85966
File type:
HTML
Page/File MD5:
A44FF10EA562ED3C5EA189F75836B9F8
Scan duration[sec]:
0.686
/category/law-enforcement/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
107158
File type:
HTML
Page/File MD5:
514A033605D70A27E42BD4526DC3C148
Scan duration[sec]:
0.696
/category/authentication/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
119795
File type:
HTML
Page/File MD5:
FD7674033F55910BE02852DF23828C69
Scan duration[sec]:
1.027
/category/mobile/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
101301
File type:
HTML
Page/File MD5:
1910D894FCA571412C3031B3D4F5F7F2
Scan duration[sec]:
0.689
/category/biometrics/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
45933
File type:
HTML
Page/File MD5:
3723B74FC7ABF314D62785BD25A585F2
Scan duration[sec]:
0.314
/category/modelling/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
57121
File type:
HTML
Page/File MD5:
4744383B45856C8297E675146818DDD4
Scan duration[sec]:
0.417
/category/privacy/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
117757
File type:
HTML
Page/File MD5:
BC2D4D2A066461530A20C799E173AE1F
Scan duration[sec]:
1.057
/category/security-usability/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
122660
File type:
HTML
Page/File MD5:
8DC8976AC82E3554EFB47E71834717CA
Scan duration[sec]:
0.881
/category/security-economics/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
119249
File type:
HTML
Page/File MD5:
AD8E7452EBC1C9FB21DC6D88C2E31172
Scan duration[sec]:
0.769
/category/legal-issues/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
99762
File type:
HTML
Page/File MD5:
10E9D1BD6211D50AB7365FBEBDDFE90B
Scan duration[sec]:
0.833
/2018/01/16/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
41607
File type:
HTML
Page/File MD5:
F923D1E1052151735A9C9319B867EF1D
Scan duration[sec]:
0.29
/2018/01/23/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
36970
File type:
HTML
Page/File MD5:
4CB3D4084902AE77FD0617A81C126744
Scan duration[sec]:
0.249
/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
10056
File type:
ASCII
Page/File MD5:
7121994EEC5320FBE6586463BF9651C2
Scan duration[sec]:
0.123
/wp-includes/js/jquery/jquery.js?ver=1.12.4
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
97184
File type:
ASCII
Page/File MD5:
8610F03FE77640DEE8C4CC924E060F12
Scan duration[sec]:
2.376
/wp-content/themes/twentyfifteen/style.css?ver=4.9.1
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
97828
File type:
ASCII
Page/File MD5:
0C593A8F03F794AF0C75A72E0646AE61
Scan duration[sec]:
1.14
/wp-content/themes/twentyfifteen-child/style.css?ver=4.9.1
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
3323
File type:
ASCII
Page/File MD5:
FE1BEB62CCBEE48FE622C5C85DB026A8
Scan duration[sec]:
0.03
/wp-content/themes/twentyfifteen-child/fonts.css
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
10328
File type:
ASCII
Page/File MD5:
9D74186A57E2044F7FD415FAC0E4A00F
Scan duration[sec]:
0.081
/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-82830
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
68859
File type:
HTML
Page/File MD5:
6736D30A73C9763529AF3E37ED2ADA82
Scan duration[sec]:
0.433
/2018/01/16/practicing-a-science-of-security/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
45389
File type:
HTML
Page/File MD5:
A8A139FF52DBA1EEED5686D791573701
Scan duration[sec]:
0.315
/2018/01/23/smart-contracts-and-bribes/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
46788
File type:
HTML
Page/File MD5:
55D52BDFC8BC26A43B90D2996D26FD40
Scan duration[sec]:
0.322
/2017/11/13/systematizing-consensus-in-the-age-of-blockchains/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
44725
File type:
HTML
Page/File MD5:
26340FA7C5E49C7893CC64A0A59A332E
Scan duration[sec]:
0.28
/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-82505
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
74274
File type:
HTML
Page/File MD5:
84037929A9D7672B55EB5FD7DA2D390A
Scan duration[sec]:
0.534
/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
74273
File type:
HTML
Page/File MD5:
CFA21AE2FDB275BE008DE6D7F37D14FF
Scan duration[sec]:
0.543
/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-82084
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
59430
File type:
HTML
Page/File MD5:
7C610CF09DF3969D591624B2A7DB1039
Scan duration[sec]:
0.396
/2017/08/22/should-you-phish-your-own-employees/#comment-79575
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
56065
File type:
HTML
Page/File MD5:
DB713341396C7612EAFF9305E0E2CF27
Scan duration[sec]:
0.39
/2017/08/22/should-you-phish-your-own-employees/#comment-79517
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
56065
File type:
HTML
Page/File MD5:
043C7D18B3BA853486FEEDE53DEFD27F
Scan duration[sec]:
0.394
/2017/12/13/a-critical-analysis-of-genome-privacy-research/#
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
55374
File type:
HTML
Page/File MD5:
825A7F34A2DC1EE2AADD83F4B894BCF1
Scan duration[sec]:
0.402
/wp-content/themes/twentyfifteen/genericons/genericons.css?ver=3.2
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
27519
File type:
ASCII
Page/File MD5:
C4A5F119C255C653E1FF74AF2B021BAF
Scan duration[sec]:
0.001
/wp-content/themes/twentyfifteen/js/html5.js
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
2432
File type:
ASCII
Page/File MD5:
E95CA1122287C8B6889B126AC893B750
Scan duration[sec]:
0.001
/wp-content/themes/twentyfifteen/css/ie.css?ver=20141010
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
14134
File type:
ASCII
Page/File MD5:
711F3D7BE79B01A20EED7B0AC82CAEA5
Scan duration[sec]:
0.107
/wp-content/themes/twentyfifteen/css/ie7.css?ver=20141010
Severity:
Clean
Reason:
No significant issues detected.
Details:
File is clean
File size[byte]:
1159
File type:
ASCII
Page/File MD5:
6468F9823D831D5B4B4D37D5C52C88AC
Scan duration[sec]:
0.001

No Malware Detected By Free Online Website Scan On This Website.

A free external scan did not find malicious activity on your website. If you still think that your website is infected with malware or hacked, please subscribe to a plan, we will scan your website internally and perform a full manual audit of your site as well as clean any infection that our free scanner didn't pick up.

Protect Your Website Now!

Is this plan for me?

website security plans and features
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D82830#respond
http://theconversation.com/institutions/ucl
https://www.benthamsgaze.org/2015/03/06/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f11%2f13%2fsystematizing-consensus-in-the-age-of-blockchains%2f
https://www.benthamsgaze.org/category/inside-infosec/
https://www.benthamsgaze.org/2016/02/09/jens-groth-non-interactive-zero-knowledge-proofs-efficient-enough-to-be-used-in-practice/#respond
https://arxiv.org/abs/1705.06947
https://ghr.nlm.nih.gov/condition/beta-thalassemia
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_abhi_shelat.pdf
http://www.cs.ucl.ac.uk/students/syllabus/mscisec/compga18_cryptanalysis/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2018%2f01%2f16%2fpracticing-a-science-of-security%2f&%3Bformat%3Dxml
https://www.benthamsgaze.org/2017/08/18/chainspace-a-sharded-smart-contracts-platform/#respond
https://www.benthamsgaze.org/wp-content/uploads/2015/07/10-ga17-privacy-by-design-case-studies-copy.pptx
https://www.benthamsgaze.org/2017/04/04/can-games-fix-whats-wrong-with-computer-security-education/#respond
https://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/
https://www.eff.org/document/digital-rights-ireland-limited-liberty-open-rights-group-second-circuit-amicus-brief
http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/lm-white-paper-intel-driven-defense.pdf
https://www.ncsc.gov.uk/documents/cpa-security-characteristic-secure-real-time-communications-gateway
https://www.benthamsgaze.org/category/internet-security/
http://fortune.com/2017/01/09/amazon-echo-alexa-dollhouse/
https://www.benthamsgaze.org/wp-content/uploads/2016/09/393617_alastair_clark_aclark_2360661_860598830.pdf
https://www.benthamsgaze.org/2015/07/
http://blog.bettercrypto.com/?p%3D3226
https://www.benthamsgaze.org/2017/07/25/top-ten-obstacles-along-distributed-ledgers-path-to-adoption/#respond
http://blogs.royalsociety.org/in-verba/2016/06/06/exceptional-access-provisions-and-the-investigatory-powers-bill/
https://www.benthamsgaze.org/2016/03/04/privately-gathering-statistics-and-training-simple-models/#respond
https://mitpress.mit.edu/books/discovering-complexity
https://www.washingtonpost.com/world/national-security/prosecutors-to-seek-indictment-against-former-nsa-contractor-as-early-as-this-week/2017/02/06/362a22ca-ec83-11e6-9662-6eedf1627882_story.html?utm_term%3D.92d88d91f4ac
https://www.benthamsgaze.org/author/lolejnik/
https://genopri.org
http://www.personalgenomes.org/uk/sign-up
https://www.benthamsgaze.org/wp-content/uploads/2016/11/zchain.png
https://github.com/nfcgate/nfcgate
https://blog.ethcore.io/attack-on-thedao-what-will-be-your-response/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2016%2f08%2f02%2fdo-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack%2f&%3Bformat%3Dxml
http://www.uniscon.de/
https://www.benthamsgaze.org/wp-includes/js/wp-embed.min.js?ver%3D4.9.1
https://www.benthamsgaze.org/category/public-policy/page/2/
https://www.benthamsgaze.org/category/research-projects/feed/
https://royalsociety.org/topics-policy/projects/cybersecurity-research/
http://www.dimva2015.it
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78499
http://www0.cs.ucl.ac.uk/staff/a.sonnino/
https://www.riscs.org.uk/2017/05/19/observing-the-wannacry-fallout-confusing-advice-and-playing-the-blame-game/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D35257#respond
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/?replytocom%3D74488#respond
http://www.cs.ucl.ac.uk/staff/tomaso_aste/
https://www.benthamsgaze.org/2016/06/06/exceptional-access-provisions-in-the-investigatory-powers-bill/#comments
https://www.benthamsgaze.org/2015/05/14/measuring-internet-censorship/#more-69
https://www.bleepingcomputer.com/news/security/hummingbad-android-malware-found-in-20-google-play-store-apps/
http://blogs.microsoft.com/blog/2014/12/15/business-media-civil-society-speak-key-privacy-case/
https://www.linkedin.com/profile/view?id%3D2823558
https://www.benthamsgaze.org/2016/05/28/adblocking-and-counter-blocking-a-slice-of-the-arms-race/#respond
https://www.benthamsgaze.org/2015/10/20/
https://scholar.google.co.uk/citations?user%3Dye3axuoaaaaj
https://www.benthamsgaze.org/2015/12/01/
https://www.benthamsgaze.org/2015/05/01/teaching-cybersecurity-to-criminologists/#respond
https://www.benthamsgaze.org/wp-includes/wlwmanifest.xml
https://events.ccc.de/congress/2014/fahrplan/system/attachments/2535/original/dp5-31c3.pdf
https://trust.cispa.saarland/~bugiel/publications/pdfs/androidsok-sp16.pdf
https://www.benthamsgaze.org/2016/01/19/
https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20160209_isc_rpt_ipbill%28web%29.pdf?attachauth%3Danoy7coquvqxa77an9iumawucahpqx4_xf-plfxoppfuc5de5vjzonzngnul8nwx6rzpp8coi128remdxzm_1xwxx0dhoouhayosoj6qvnrjidb0puqqj7oyluvn
https://www.eba.europa.eu/news-press/calendar?p_p_id%3D8&%3B_8_struts_action%3D%2fcalendar%2fview_event&%3B_8_eventid%3D1303933
http://www.techradar.com/news/phone-and-communications/what-is-nfc-and-why-is-it-in-your-phone-948410
https://insights.sei.cmu.edu/cert/2014/03/why-cybersecurity-is-not-like-the-immune-system.html
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/pet07ixanalysis.pdf
https://www.benthamsgaze.org/wp-content/uploads/2016/11/animine.png
http://sec.cs.ucl.ac.uk/ace_csr/news_announcements/article/vasilios_mavroudis_featured_in_a_new_scientist_article_about_malicious_colluding_apps/
http://www.ndm.net/bluecoatstore/proxysg/bluecoat-sg9000
https://www.benthamsgaze.org/?p%3D4
https://secure.gravatar.com/avatar/209d8131fd2b6499f9a0923cedca31c5?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://jordan-wright.com/blog/2015/05/14/how-tor-works-part-three-the-consensus/
http://arxiv.org/abs/1505.06895
https://www.benthamsgaze.org/wp-content/uploads/2017/01/spectrum.png
http://www.ucl.ac.uk/news/news-articles/1209/05092012-record-support-early-career-researchers
https://www.benthamsgaze.org/2016/11/01/a-privacy-enhancing-architecture-for-secure-wearable-devices/
https://www.benthamsgaze.org/2016/02/09/jens-groth-non-interactive-zero-knowledge-proofs-efficient-enough-to-be-used-in-practice/
http://www.ioccc.org/
http://www.ucl.ac.uk/bentham-project/who/autoicon
http://www.bbc.co.uk/news/technology-31508932
https://en.wikipedia.org/wiki/distributed_hash_table
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-82830
https://www.theguardian.com/news/2017/may/24/how-facebook-flouts-holocaust-denial-laws-except-where-it-fears-being-sued
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comments
https://conspicuouschatter.wordpress.com/2015/12/05/three-public-policy-recommendation-for-it-security/
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/
https://petsymposium.org/award/
https://www.benthamsgaze.org/2017/04/04/can-games-fix-whats-wrong-with-computer-security-education/
https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack
https://www.benthamsgaze.org/wp-content/uploads/2017/06/img-20170624-wa0008.jpg
http://fc16.ifca.ai/bitcoin/papers/bon16b.pdf
https://www.w3.org/2017/process-20170301/#reports
https://tools.ietf.org/html/rfc6509
http://dictionary.cambridge.org/dictionary/english/authorize
https://www.benthamsgaze.org/wp-content/uploads/2015/04/dsc_0016.jpg
http://httpd.apache.org/
https://www.eugenekolo.com/blog/paybreak-able-to-defeat-wannacry-wannacryptor-ransomware/
http://plato.stanford.edu/entries/biology-experiment/
http://www0.cs.ucl.ac.uk/staff/s.meiklejohn/files/login13.pdf
https://www.benthamsgaze.org/about/#comment-35971
http://tech.newstatesman.com/guest-opinion/phishing-employees
https://www.benthamsgaze.org/2015/04/
https://www.youtube.com/embed/8tjjmbtbxse?feature%3Doembed
https://www.benthamsgaze.org/2016/02/02/our-contributions-to-the-uk-distributed-ledger-technology-report/
https://www.ethereum.org/dao
https://www.benthamsgaze.org/2017/03/28/mamadroid-detecting-android-malware-by-building-markov-chains-of-behavioral-models/
https://www.finextra.com/news/fullstory.aspx?newsitemid%3D16466
https://www.benthamsgaze.org/wp-content/uploads/2017/05/c-cxrkbu0aaxhgr.jpg-large-864x1024.jpeg
http://www.chyp.com/podcasts/sarah-meiklejohn-ucl/
http://www.emilianodc.com/
https://www.benthamsgaze.org/2017/05/13/the-politics-of-the-nhs-wannacrypt-ransomware-outbreak/
https://www.ucl.ac.uk/uclic/people/a_blandford
https://www.benthamsgaze.org/category/meta/
https://privacyus.eu/
https://www.theregister.co.uk/2016/12/08/windows_xp_nhs_still/
https://www.benthamsgaze.org/page/10/
https://www.benthamsgaze.org/wp-content/uploads/2017/10/qe0cbgz.jpg
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/?replytocom%3D82084#respond
https://www.proofpoint.com/us/threat-insight/post/adgholas-malvertising-campaign-using-astrum-ek-deliver-mole-ransomware
http://www.forbes.com/sites/sarahjeong/2015/01/14/the-dhs-agent-who-infiltrated-silk-road-to-take-down-its-kingpin/
http://ec.europa.eu/internal_market/payments/docs/framework/framework-workingdoc-contrib/barclays_en.pdf
http://www.economist.com/news/united-states/21707201-how-donald-trump-ushered-hateful-fringe-movement-mainstream-pepe-and
https://en.wikipedia.org/wiki/lolcat
http://www.nytimes.com/2016/11/01/business/dealbook/zcash-a-harder-to-trace-virtual-currency-generates-price-frenzy.html?_r%3D1&%3Breferer%3D
https://www.benthamsgaze.org/2016/03/04/privately-gathering-statistics-and-training-simple-models/#more-758
https://www.benthamsgaze.org/2015/11/10/sarah-meiklejohn-security-and-cryptography/#respond
http://lukaszolejnik.com/rtbdesc2
https://www.benthamsgaze.org/2017/07/04/
benthamsgaze.org/#
https://fc18.ifca.ai/bitcoin/
http://www.lancaster.ac.uk/steps/events/public-lecture-in-the-digital-era---do-we-still-have-privacy/
https://secure.gravatar.com/avatar/e941fa3a3c4f5a8ebb5fcac4dd89d20b?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2016/11/22/blockchains-and-why-we-need-privacy/#respond
https://www.benthamsgaze.org/2017/05/19/observing-the-wannacry-fallout-confusing-advice-and-playing-the-blame-game/
https://www.benthamsgaze.org/2017/05/13/the-politics-of-the-nhs-wannacrypt-ransomware-outbreak/#respond
http://europa.eu/rapid/press-release_memo-15-5793_en.htm?locale%3Den
https://www.facebook.com/notes/protect-the-graph/making-connections-to-facebook-more-secure/1526085754298237
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78574
https://www.benthamsgaze.org/category/networking/feed/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fabout%2f
https://www.benthamsgaze.org/2016/07/29/analyzing-privacy-aspects-of-the-w3c-vibration-api/#respond
http://www.reuters.com/article/us-microsoft-usa-warrant-iduskcn0zu1rj
http://www.bankofengland.co.uk/research/pages/onebank/cbdc.aspx
https://www.benthamsgaze.org/2017/03/08/what-the-cia-hack-and-leak-teaches-us-about-the-bankruptcy-of-current-cyber-doctrines/
https://www.benthamsgaze.org/2016/06/02/international-comparison-of-bank-fraud-reimbursement-customer-perceptions-and-contractual-terms/#comments
http://www.nytimes.com/2016/08/15/arts/music/the-rise-of-the-internet-fan-bully.html
https://www.benthamsgaze.org/wp-content/uploads/2017/10/percent_events_difference_drop-1024x751.png
https://www.benthamsgaze.org/category/cryptocurrencies/
http://www0.cs.ucl.ac.uk/staff/p.mccorry/
http://ec.europa.eu/finance/payments/framework/index_en.htm
http://www.theguardian.com/world/2016/apr/11/european-court-to-consider-legality-of-uk-surveillance-laws
https://www.benthamsgaze.org/2016/03/04/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f10%2f04%2fhow-4chan-and-the_donald-influence-the-fake-news-ecosystem%2f
https://www.benthamsgaze.org/2016/08/
https://www.benthamsgaze.org/2016/03/11/biometrics-for-payments/#comments
http://www.ucl.ac.uk/museums/jeremy-bentham/about/bentham-head
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_yuvai_ishai.pdf
https://www.benthamsgaze.org/2018/01/16/practicing-a-science-of-security/#respond
https://www.theguardian.com/technology/2017/may/13/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack
https://w3c.github.io/proximity/
http://gow.epsrc.ac.uk/ngboviewgrant.aspx?grantref%3Dep/n028104/1
https://www.benthamsgaze.org/2015/10/27/
http://www.bbc.co.uk/iplayer
http://online.wsj.com/articles/sb10001424052970203687504577001911398596328
https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/
https://en.wikipedia.org/wiki/file:countries_initially_affected_in_wannacry_ransomware_attack.png
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation_michael_zohner.pdf
http://technosociology.org/?page_id%3D1687
benthamsgaze.org/mailto:cs-infosec-news-join@ucl.ac.uk
http://www.cs.ucl.ac.uk/staff/d.pym/nspw2017.pdf
https://www.benthamsgaze.org/2015/09/10/what-are-the-social-costs-of-contactless-fraud/#more-300
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/feed/
https://www.benthamsgaze.org/category/cryptography/feed/
https://www.internetsociety.org/events/ndss-symposium-2016
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fabout%2f&%3Bformat%3Dxml
benthamsgaze.org//a
http://pmg.csail.mit.edu/papers/osdi99.pdf
http://cacr.uwaterloo.ca/techreports/2014/cacr2014-10.pdf
https://www.benthamsgaze.org/2015/05/14/measuring-internet-censorship/#respond
https://www.benthamsgaze.org/wp-content/uploads/2015/07/05-ga17-selective-disclosure.pptx
http://eprint.iacr.org/2015/963
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f10%2f04%2fhow-4chan-and-the_donald-influence-the-fake-news-ecosystem%2f&%3Bformat%3Dxml
http://krebsonsecurity.com/2016/05/as-scope-of-2012-breach-expands-linkedin-to-again-reset-passwords-for-some-users/
http://www.secureerpinc.com
https://usec.cispa.uni-saarland.de/eurousec17/
https://www.benthamsgaze.org/2015/11/03/category-errors-in-information-security-how-logic-can-help/
http://www.slate.com/articles/health_and_science/medical_examiner/2017/09/genetic_testing_data_reveals_the_irrationality_of_human_behavior.html
https://www.benthamsgaze.org/category/talks-and-panels/
http://www.bbc.co.uk/news/technology-28488155
https://www.youtube.com/embed/lfen7zoikyw?feature%3Doembed
https://www.benthamsgaze.org/2015/09/10/what-are-the-social-costs-of-contactless-fraud/
https://www.benthamsgaze.org/wp-content/uploads/2017/05/wannacry_genrandom-300x91.png
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/?replytocom%3D79575#respond
https://www.benthamsgaze.org/2015/05/06/understanding-online-dating-scams/#respond
https://en.wikipedia.org/wiki/wannacry_ransomware_attack
https://lucamelis.github.io/
http://www.emvco.com/download_agreement.aspx?id%3D1023
https://www.benthamsgaze.org/2015/04/20/msc-information-security-ucl/
https://www.benthamsgaze.org/2017/07/04/epfl-blockchain-summer-school/#more-1641
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-82084
http://www.ref.ac.uk/
https://www.benthamsgaze.org/2016/09/07/battery-status-readout-as-a-privacy-risk/#respond
https://www.fireeye.com/blog/threat-research/2017/03/still_getting_served.html
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/?replytocom%3D74448#respond
https://seclab.cs.ucsb.edu/media/uploads/papers/torpig.pdf
https://ghr.nlm.nih.gov/primer/precisionmedicine/definition
https://secure.gravatar.com/avatar/334c38f112b717113e098f0972dea52c?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://feedly.com/
https://www.benthamsgaze.org/tag/like-farming/
https://en.wikipedia.org/wiki/alt-right
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comments
https://www.benthamsgaze.org/category/blockchain/
https://www.benthamsgaze.org/2015/02/18/is-sending-shoppers-ads-by-bluetooth-just-a-bit-creepy/
http://www.cl.cam.ac.uk/research/security/banking/relay/
https://www.harpercollins.com/9780062362490/digital-gold
https://eprint.iacr.org/2013/516.pdf
https://www.reddit.com/r/ethereum/comments/4oj7ql/personal_statement_regarding_the_fork/
https://www.benthamsgaze.org/2016/06/17/smart-contracts-beyond-the-age-of-innocence/
https://www.benthamsgaze.org/2017/03/24/battery-status-not-included-assessing-privacy-in-w3c-web-standards/#respond
https://www.benthamsgaze.org/2017/05/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78448#respond
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D35344#respond
http://www.wsj.com/articles/visa-mastercard-to-roll-out-new-cybersecurity-features-1423834542
http://www.theguardian.com/technology/2014/jul/22/is-tor-truly-anonymising-conference-cancelled
https://www.benthamsgaze.org/2016/04/
https://www.benthamsgaze.org/author/sk766/
https://www.benthamsgaze.org/wp-content/uploads/2016/09/ttd320k-medians.png
https://www.benthamsgaze.org/wp-content/uploads/2015/06/vasm-150x150.jpg
https://www.benthamsgaze.org/author/ncourtois/
http://cointelegraph.com/news/dao-makes-history-raises-130-million-breaking-all-records
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/pets08metrics.pdf
http://www.bbc.co.uk/blogs/newsnight/susanwatts/2010/02/new_flaws_in_chip_and_pin_syst.html
https://www.benthamsgaze.org/2015/02/09/sequencing-your-genome-is-becoming-an-affordable-reality-but-at-what-personal-cost/#more-45
http://www.hps.pitt.edu/profile/mitchell.php
https://www.benthamsgaze.org/category/privacy/page/2/
https://blockchain-summer.epfl.ch/#program
http://www.computerweekly.com/news/2240181208/what-to-do-next-windows-xp-end-of-support
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f08%2f11%2fthe-end-of-the-billion-user-passwordimpossible%2f&%3Bformat%3Dxml
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_claudio_orlandi.pdf
http://discovery.ucl.ac.uk/20247/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f08%2f22%2fshould-you-phish-your-own-employees%2f
http://boards.4chan.org/pol/thread/40489590
https://www.benthamsgaze.org/2015/11/24/program-obfuscation/#respond
https://www.benthamsgaze.org/2017/03/08/what-the-cia-hack-and-leak-teaches-us-about-the-bankruptcy-of-current-cyber-doctrines/#more-1462
https://www.benthamsgaze.org/2015/11/24/
https://www.benthamsgaze.org/wp-content/uploads/2016/03/img_2552-crop-825x315.jpg
https://www.benthamsgaze.org/2015/10/20/george-danezis-smart-grid-privacy-peer-to-peer-and-social-network-security/
https://www.benthamsgaze.org/2015/02/18/is-sending-shoppers-ads-by-bluetooth-just-a-bit-creepy/#respond
http://www.tombom.co.uk/blog/?p%3D262
http://www.ieee-isba2016.org/
https://www.benthamsgaze.org/author/lmelis/
http://lukaszolejnik.com/battery
https://cdecker.github.io/btcresearch/
https://blog.torproject.org/blog/some-statistics-about-onions
https://emilianodc.com
http://www.ibeacon.com/what-is-ibeacon-a-guide-to-beacons/
https://www.benthamsgaze.org/2017/12/13/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78489#respond
http://users.encs.concordia.ca/~clark/index.php
https://nakedsecurity.sophos.com/2017/05/17/wannacry-the-ransomware-worm-that-didnt-arrive-on-a-phishing-hook/
https://www.benthamsgaze.org/2017/05/23/find-security-champions-in-blends-of-organisational-culture/
http://erc.europa.eu/starting-grants
http://www.economist.com/news/leaders/21647285-more-and-more-money-being-spent-higher-education-too-little-known-about-whether-it
https://www.benthamsgaze.org/2017/11/13/systematizing-consensus-in-the-age-of-blockchains/feed/
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic2.png
https://www.benthamsgaze.org/category/banking-security/feed/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78468
https://bitcoin.org/bitcoin.pdf
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic4.png
https://www.schneier.com/blog/archives/2016/02/the_ads_vs_ad_b.html
https://www.benthamsgaze.org/2017/05/03/online-security-wont-improve-until-companies-stop-passing-the-buck-to-the-customer/
https://www.benthamsgaze.org/wp-content/uploads/2017/10/4chan-ok.jpg
http://blogs.bmj.com/bmj/2017/07/18/emiliano-cristofaro-genome-data-can-never-be-fully-anonymised/
http://www0.cs.ucl.ac.uk/staff/g.danezis/infosecgraph/
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_carmit_hazay.pdf
https://www.benthamsgaze.org/2016/07/29/analyzing-privacy-aspects-of-the-w3c-vibration-api/#more-1001
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78441
https://www.benthamsgaze.org/category/censorship-resistance/feed/
https://www.nature.com/news/privacy-protections-the-genome-hacker-1.12940
http://sec.cs.ucl.ac.uk/
https://www.benthamsgaze.org/2016/10/
https://www.benthamsgaze.org/2016/11/16/a-longitudinal-measurement-study-of-4chans-politically-incorrect-forum-and-its-effect-on-the-web/
http://sec.cs.ucl.ac.uk/ace_csr/news_announcements/article/dr_murdoch_interviewed_about_the_security_of_internet_of_things/
https://explorer.zcha.in/statistics
https://www.benthamsgaze.org/2015/09/
http://fc16.ifca.ai/bitcoin/papers/cde+16.pdf
https://ictf.cs.ucsb.edu/
https://www.benthamsgaze.org/wp-content/uploads/2015/02/vlcsnap-2015-02-28-23h03m54s253-1024x576.png
https://uwspace.uwaterloo.ca/bitstream/handle/10012/4011/thesis.pdf?sequence%3D1&%3Bisallowed%3Dy
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-35330
https://www.benthamsgaze.org/2017/01/31/
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/weis16fraudreimbursement.pdf
http://events.ccc.de/tag/angels/
https://www.benthamsgaze.org/author/jblackburn/
https://www.benthamsgaze.org/wp-includes/js/jquery/jquery-migrate.min.js?ver%3D1.4.1
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f08%2f22%2fshould-you-phish-your-own-employees%2f&%3Bformat%3Dxml
https://www.benthamsgaze.org/2016/11/14/understanding-the-use-of-leaked-webmail-credentials-in-the-wild/#comments
https://www.benthamsgaze.org/2016/12/15/privacy-analysis-of-the-w3c-proximity-sensor-specification/#respond
https://www.benthamsgaze.org/wp-includes/images/rss.png
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-76941
http://www.bbc.co.uk/news/business-31164806
https://bitbucket.org/securechorus/
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen-child/fonts.css
https://www.benthamsgaze.org/2016/03/04/privately-gathering-statistics-and-training-simple-models/
https://www.benthamsgaze.org/2015/12/10/
https://www.benthamsgaze.org/2015/12/10/how-tors-privacy-was-momentarily-broken-and-the-questions-it-raises/#respond
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-35334
https://www.benthamsgaze.org/2016/02/02/
https://www.benthamsgaze.org/2016/07/19/microsoft-ireland-winning-the-battle-for-privacy-but-losing-the-war/#respond
http://www.apple.com/customer-letter/answers/
https://www.benthamsgaze.org/category/research-projects/
https://www.benthamsgaze.org/2015/11/10/sarah-meiklejohn-security-and-cryptography/#more-470
https://www.nicehash.com/
https://www.benthamsgaze.org/wp-content/uploads/2016/05/farms-1024x524.png
https://opennet.net/
https://www.benthamsgaze.org/2017/08/01/creating-scalable-distributed-ledgers-for-decode/#respond
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D35334#respond
https://www.theguardian.com/technology/2016/sep/09/facebook-reinstates-napalm-girl-photo
https://www.benthamsgaze.org/subscribing-to-benthams-gaze/#comment-75190
https://www.benthamsgaze.org/2016/08/05/moving-towards-security-and-privacy-experiments-for-the-real-world/
http://fc16.ifca.ai/bitcoin/papers/tvr16.pdf
https://www.benthamsgaze.org/page/2/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fsubscribing-to-benthams-gaze%2f&%3Bformat%3Dxml
https://www.benthamsgaze.org/2016/09/07/battery-status-readout-as-a-privacy-risk/#more-1128
https://www.benthamsgaze.org/2016/01/26/first-ucl-team-competes-in-the-international-capture-the-flag-competition/
https://www.benthamsgaze.org/2016/11/14/understanding-the-use-of-leaked-webmail-credentials-in-the-wild/#more-1321
https://www.benthamsgaze.org/2015/02/11/
http://fortune.com/2015/04/30/facebook-small-business/
http://events.ccc.de/category/31c3/
https://www.benthamsgaze.org/2017/03/
https://megele.io/
benthamsgaze.org/#content
https://www.benthamsgaze.org/category/crime-science/feed/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fcontribution-policy%2f
https://www.benthamsgaze.org/2015/02/18/is-sending-shoppers-ads-by-bluetooth-just-a-bit-creepy/#more-62
https://www.benthamsgaze.org/2016/03/16/bitcoin-workshop-at-financial-crypto-2016/#more-818
http://fc16.ifca.ai/
http://www.newstatesman.com/politics/june2017/2017/05/will-dark-ads-facebook-really-swing-2017-general-election
https://www.benthamsgaze.org/2017/05/03/online-security-wont-improve-until-companies-stop-passing-the-buck-to-the-customer/#more-1524
https://www.benthamsgaze.org/author/ceyssucu/
http://sec.cs.ucl.ac.uk/users/smurdoch/talks/ccc07relayattacks.pdf
https://www.nytimes.com/2014/12/11/health/architects-of-cia-interrogation-drew-on-psychology-to-induce-helplessness.html
https://www.benthamsgaze.org/wp-login.php
http://sites.computer.org/debull/a16mar/p39.pdf
https://www.cl.cam.ac.uk/~rja14/papers/bpa12-fc-banking_pin_security.pdf
https://developers.google.com/apps-script/
https://www.eff.org/cases/re-warrant-microsoft-email-stored-dublin-ireland
https://www.benthamsgaze.org/2015/12/17/
https://www.benthamsgaze.org/about/#comment-35995
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-35257
https://www.mafialeaks.org/en/
https://www.benthamsgaze.org/2017/08/01/creating-scalable-distributed-ledgers-for-decode/
https://www.benthamsgaze.org/2016/02/23/
https://www.benthamsgaze.org/2017/01/24/on-the-security-and-privacy-of-the-ultrasound-tracking-ecosystem/#respond
http://commons.wikimedia.org/wiki/file:tor-onion-network.png
http://www.riscs.org.uk/
http://spectrum.ieee.org/telecom/security/the-athens-affair
https://www.benthamsgaze.org/2017/10/04/
https://www.benthamsgaze.org/category/genomics/feed/
https://www.benthamsgaze.org/2015/02/06/tor-the-last-bastion-of-online-anonymity/#more-28
http://www.which.co.uk/news/2017/09/scams-super-complaint-consumers-still-at-risk-one-year-on/
https://www.benthamsgaze.org/2017/01/10/security-intrusions-as-mechanisms/
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic6.png
http://en.wikipedia.org/wiki/initial_coin_offering
http://lukaszolejnik.com/
https://www.benthamsgaze.org/2015/02/06/tor-the-last-bastion-of-online-anonymity/#respond
http://coccinelle.lip6.fr/papers.php
https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-jansen.pdf
https://secure.gravatar.com/avatar/ed7151d730cd3b14422835be172beaaa?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://conferences.sigcomm.org/imc/2016/
https://ec.europa.eu/programmes/horizon2020/en/h2020-section/marie-sklodowska-curie-actions
https://www.benthamsgaze.org/category/mobile/
https://www.benthamsgaze.org/2017/05/16/paybreak-able-to-defeat-wannacrywannacryptor-ransomware/#comments
http://theconversation.com/profiles/steven-j-murdoch-152093
https://eugenekolo.com/static/desert.jpg
https://www.youtube.com/embed/osnymmhp-o8?feature%3Doembed
https://www.benthamsgaze.org/2015/02/11/on-line-lecture-dp5-private-presence-31c3/#respond
https://youtu.be/fvfbmludidk?t%3D22m26s
https://www.benthamsgaze.org/2015/12/01/forced-authorisation-chip-and-pin-hitting-high-end-retailers/
https://www.benthamsgaze.org/category/mobile/feed/
https://www.benthamsgaze.org/?p%3D1708
http://privacy.cs.cmu.edu/
https://www.benthamsgaze.org/2016/03/16/bitcoin-workshop-at-financial-crypto-2016/#respond
https://www.benthamsgaze.org/2016/07/
http://www.cumhuriyet.com.tr/haber/dunya/659903/whatsapp_ta_korkutan_guvenlik_acigi_iddiasi__devlet__sifreli_mesaji_okuyabilir.html
https://www.benthamsgaze.org/2017/01/17/
https://www.benthamsgaze.org/2017/07/25/top-ten-obstacles-along-distributed-ledgers-path-to-adoption/#more-1691
https://www.benthamsgaze.org/2016/11/14/understanding-the-use-of-leaked-webmail-credentials-in-the-wild/
https://www.benthamsgaze.org/2015/05/06/understanding-online-dating-scams/
https://bravenewcoin.com/assets/whitepapers/ethereum-a-secure-decentralised-generalised-transaction-ledger-yellow-paper.pdf
https://www.benthamsgaze.org/2015/12/17/nicolas-courtois-algebraic-cryptanalysis/#more-542
https://www.benthamsgaze.org/about/
https://philosophy.artsci.wustl.edu/people/carl_craver
https://www.benthamsgaze.org/2016/05/12/
https://www.benthamsgaze.org/wp-content/uploads/2017/12/screen-shot-2017-12-13-at-14.24.02-880x1024.png
https://www.benthamsgaze.org/2015/05/
https://www.benthamsgaze.org/2018/01/23/
https://www.youtube-nocookie.com/embed/4s4pkcggiw4
https://twitter.com/uclisec
https://secure.gravatar.com/avatar/01868f9dadc966a293cfc6567e14a7b9?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://www.ncl.ac.uk/press/news/legacy/2014/11/contactlesscardsfailtorecogniseforeigncurrency.html
https://www.benthamsgaze.org/2016/05/28/adblocking-and-counter-blocking-a-slice-of-the-arms-race/
http://www.europarl.europa.eu/stoa/webdav/site/cms/shared/2_events/workshops/2015/20151208/top-3%20policy%20recommendations_04-01-2016-ok-v2.pdf
https://www.documentcloud.org/documents/2511925-farrell-nov-2015-motion.html#document/p2/a260739
https://www.benthamsgaze.org/2017/03/24/battery-status-not-included-assessing-privacy-in-w3c-web-standards/#more-1486
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f08%2f11%2fthe-end-of-the-billion-user-passwordimpossible%2f
http://www.rfc-editor.org/rfc/rfc6962.txt
https://www.lightbluetouchpaper.org/2016/07/12/royal-society-report-on-cybersecurity-research/
http://www.saardrimer.com/sd410/
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/#comment-79575
http://ace-csr-lectures.eventbrite.com/
https://www.w3.org/tr/battery-status/
https://www.benthamsgaze.org/2017/11/13/systematizing-consensus-in-the-age-of-blockchains/
http://fortune.com/2016/03/01/brazil-facebook-arrest/
http://www0.cs.ucl.ac.uk/staff/g.stringhini/papers/socialnet-spam.pdf
https://www.benthamsgaze.org/2016/08/05/
http://cs-people.bu.edu/wfkoch/
http://discovery.ucl.ac.uk/1475655/1/isba2016.pdf
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/
https://www.ncsc.gov.uk/guidance/password-guidance-simplifying-your-approach
https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/
http://www.beaconforfreedom.org/liste.html?tid%3D415&%3Bart_id%3D475
https://www.benthamsgaze.org/wp-content/uploads/2015/12/tor-onion-network.png
https://www.benthamsgaze.org/2016/03/
http://homepages.cs.ncl.ac.uk/patrick.mccorry/minerbribery.pdf
https://www.benthamsgaze.org/2015/02/18/
https://www.benthamsgaze.org/subscribing-to-benthams-gaze/feed/
https://www.benthamsgaze.org/2017/08/18/chainspace-a-sharded-smart-contracts-platform/
http://en.rsf.org/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/
https://www.benthamsgaze.org/2015/12/08/new-eu-itn-privacy-and-us/#respond
http://www.ieee-security.org/tc/sp2016/index.html
https://www.benthamsgaze.org/2017/01/17/inaugural-lecture-zero-knowledge-proofs/#more-1399
https://www.benthamsgaze.org/2017/07/18/caveat-emptor-privacy-could-turn-uks-genomic-dream-into-a-nightmare/
http://mattmettler.com
http://www0.cs.ucl.ac.uk/staff/j.bootle/fosad.pdf
https://www.ncsc.gov.uk/blog-post/what-does-ncsc-think-password-managers
http://arstechnica.com/security/2013/11/repeated-attacks-hijack-huge-chunks-of-internet-traffic-researchers-warn/
https://secure.gravatar.com/avatar/3d9a9cdd01c97c37f335e8377116ecf1?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://www.cs.ucl.ac.uk/staff/s.murdoch/papers/oakland14chipandskim.pdf
https://www.benthamsgaze.org/2017/12/13/a-critical-analysis-of-genome-privacy-research/
http://sec.cs.ucl.ac.uk/?id%3D6436&%3Btype%3D100
http://blogs.ucl.ac.uk/panopticam/
https://www.gov.uk/government/people/sally-davies
https://www.cs.columbia.edu/~smb/blog/2017-05/2017-05-16.html
http://www.thisismoney.co.uk/money/smallbusiness/article-3260681/small-firms-told-stay-alert-fraudsters-bypass-chip-pin-security-steal-20k-goods-using-stolen-credit-card.html
https://www.aclu.org/blog/guide-what-we-now-know-about-nsas-dragnet-searches-your-communications
https://www.benthamsgaze.org/wp-json/
https://citizenlab.org/
https://twitter.com/jepaynemsft/status/880495498179694592
http://gmpg.org/xfn/11
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D35330#respond
https://bitcoin.org/en/developer-guide#block-chain
https://www.benthamsgaze.org/category/blockchain/page/2/
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic5.png
https://www.digitaltrends.com/computing/bitcoin-ethereum-mining-use-significant-electrical-power/
https://ctftime.org/
https://github.com/stonecoldpat/briberycontracts/blob/master/censorshipcon.sol
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic3-300x216.png
https://www.benthamsgaze.org/2016/11/08/strong-customer-authentication-in-the-payment-services-directive-2/
https://www.computer.org/cms/computer.org/computingnow/pdfs/ieeesecurityprivacy-spearphishing-jan-feb2014.pdf
http://weis2016.econinfosec.org/
https://www.theregister.co.uk/2017/05/13/wannacrypt_ransomware_worm/
https://www.benthamsgaze.org/2017/07/04/epfl-blockchain-summer-school/#respond
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2018%2f01%2f23%2fsmart-contracts-and-bribes%2f
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation-meilof-veeningen.pdf
https://www.benthamsgaze.org/2016/11/01/
https://www.benthamsgaze.org/wp-content/uploads/2017/10/4chan-ok-1024x519.jpg
benthamsgaze.org//2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#respond
http://www.zdnet.com/article/gooligan-android-malware-grabs-a-million-google-accounts-in-huge-google-play-fraud/
http://events.ccc.de/congress/2014/fahrplan/events/6140.html
https://www.benthamsgaze.org/2017/05/19/observing-the-wannacry-fallout-confusing-advice-and-playing-the-blame-game/#respond
https://validator.w3.org/feed/check.cgi?url%3Dhttp%3a%2f%2fwww.benthamsgaze.org%2ffeed
https://www.benthamsgaze.org/2015/11/17/
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_michael_walfish.pdf
https://www.benthamsgaze.org/category/modelling/feed/
https://www.ncsc.gov.uk/guidance/ransomware-latest-ncsc-guidance
https://www.youtube.com/embed/1xiektnix00?feature%3Doembed
https://www.benthamsgaze.org/2015/10/14/
https://www.benthamsgaze.org/category/modelling/
https://www.benthamsgaze.org/2017/03/28/mamadroid-detecting-android-malware-by-building-markov-chains-of-behavioral-models/#more-1472
https://www.benthamsgaze.org/category/legal-issues/
https://www.benthamsgaze.org/2017/01/24/on-the-security-and-privacy-of-the-ultrasound-tracking-ecosystem/
http://www.bbc.co.uk/news/health-40479533
http://www.cs.ucl.ac.uk/admissions/msc_isec/
http://www.leparisien.fr/faits-divers/l-imparable-escroquerie-a-la-carte-bancaire-24-01-2012-1826971.php
https://www.esat.kuleuven.be/cosic/?page_id%3D126
https://www.benthamsgaze.org/2017/12/13/a-critical-analysis-of-genome-privacy-research/#respond
http://www.cl.cam.ac.uk/~sk766/publications/ndss16_tor_differential.pdf
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-35344
https://www.benthamsgaze.org/2017/03/28/mamadroid-detecting-android-malware-by-building-markov-chains-of-behavioral-models/#comments
http://blogs.oii.ox.ac.uk/policy/the-blockchain-paradox-why-distributed-ledger-technologies-may-do-little-to-transform-the-economy/
https://www.benthamsgaze.org/category/banking-security/page/2/
https://www.benthamsgaze.org/2017/07/
https://www.benthamsgaze.org/author/enricom/
https://addons.mozilla.org/en-us/firefox/extensions/?sort%3Dusers
https://www.benthamsgaze.org/wp-content/uploads/2017/10/vlcsnap-2017-10-03-13h37m41s379-1024x576.png
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fcontribution-policy%2f&%3Bformat%3Dxml
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_ivan_damgaard.pdf
https://www.benthamsgaze.org/wp-content/uploads/2017/12/23andme-short-results1-300x215.jpg
https://github.com/musalbas/chainspace
http://www.r3.com/
http://www.4chan.org/
https://www.benthamsgaze.org/2017/03/24/
https://www.benthamsgaze.org/wp-content/uploads/2015/06/6689260_s-300x212.jpg
https://arxiv.org/abs/1712.02193
https://consolia-comic.com/comics/ransomware
https://theintercept.com/2015/09/28/death-athens-rogue-nsa-operation/
https://www.benthamsgaze.org/2015/10/07/gianluca-stringhini-cyber-criminal-operations-and-developing-systems-to-defend-against-them/#more-345
https://www.benthamsgaze.org/2015/05/01/
https://www.benthamsgaze.org/2016/11/01/a-privacy-enhancing-architecture-for-secure-wearable-devices/#more-1211
https://www.benthamsgaze.org/wp-content/uploads/2017/05/credit-card-1211409_1280-825x510-1-825x251.png
https://arstechnica.com/security/2016/08/code-dumped-online-came-from-omnipotent-nsa-tied-hacking-group/
http://news.bbc.co.uk/1/hi/business/4692566.stm
http://www.heraldsun.com.au/news/law-order/police-in-talks-with-banks-to-fight-tap-and-go-crime-wave/story-fni0fee2-1227187587553
https://twitter.com/mavroudisv
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78444
https://decodeproject.eu/blog/creating-scalable-distributed-ledgers-decode
https://www.benthamsgaze.org/2017/05/23/find-security-champions-in-blends-of-organisational-culture/#more-1571
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#more-1057
https://www.benthamsgaze.org/category/authentication/feed/
http://sec.cs.ucl.ac.uk/people/kat_krol/
http://www.dailydot.com/crime/silk-road-ross-ulbricht-evidence-list/
https://www.benthamsgaze.org/2017/01/
https://www.benthamsgaze.org/2015/11/10/sarah-meiklejohn-security-and-cryptography/
https://www.benthamsgaze.org/author/ahicks/
https://www.blackhat.com/docs/asia-15/materials/asia-15-vandenbreekel-relaying-emv-contactless-transactions-using-off-the-shelf-android-devices-wp.pdf
https://www.benthamsgaze.org/2015/09/10/what-are-the-social-costs-of-contactless-fraud/#respond
https://www.coindesk.com/the-two-topics-in-law-blockchain/
http://www.privacyink.org/
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/fc16cardcontracts.pdf
https://www.benthamsgaze.org/wp-content/uploads/2017/05/wannacry_customaes-184x300.png
http://www.ucl.ac.uk/~ucfamus/
https://www.securecomputing.com/
https://www.benthamsgaze.org/2017/03/28/
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/js/skip-link-focus-fix.js?ver%3D20141010
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/js/functions.js?ver%3D20150330
http://homepages.cs.ncl.ac.uk/patrick.mc-corry/
https://en.wikipedia.org/wiki/byzantine_fault_tolerance
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f12%2f13%2fa-critical-analysis-of-genome-privacy-research%2f&%3Bformat%3Dxml
https://www.benthamsgaze.org/wp-content/uploads/2016/10/complete_architecture.png
https://www.benthamsgaze.org/wp-content/uploads/2015/10/reshipping-locations1-825x198.png
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-74394
https://simons.berkeley.edu/
https://secure.gravatar.com/avatar/ae3dcc28a0c0180f0ed3c30d897b01b8?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.theregister.co.uk/2016/12/14/microsoft_windows_10_dhcp/
http://www8.hp.com/uk/en/hp-news/press-release.html?id%3D2274472
https://www.theguardian.com/technology/2015/oct/24/obfuscation-users-guide-for-privacy-and-protest-online-surveillance
https://www.benthamsgaze.org/2016/07/29/analyzing-privacy-aspects-of-the-w3c-vibration-api/
http://fc16.ifca.ai/bitcoin/papers/kls16.pdf
https://www.benthamsgaze.org/2016/06/06/
https://en.wikipedia.org/wiki/presidio_modelo
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#more-1822
https://www.benthamsgaze.org/2015/09/29/mathematical-modelling-in-the-two-cultures/
https://genomeprivacy.org/
https://www.benthamsgaze.org/category/measurement/
http://www0.cs.ucl.ac.uk/staff/a.hicks/
https://www.benthamsgaze.org/category/meta/feed/
https://www.benthamsgaze.org/2017/10/03/liability-for-push-payment-fraud-pushed-onto-the-victims/
https://www.benthamsgaze.org/category/advertising/
https://www.facebook.com/uclmscisec/
https://www.benthamsgaze.org/2015/10/20/george-danezis-smart-grid-privacy-peer-to-peer-and-social-network-security/#more-354
https://www.researchgate.net/publication/240359084_tranforming_the
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation_yehuda_lindell.pdf
http://resources.sei.cmu.edu/library/asset-view.cfm?assetid%3D52324
https://www.theregister.co.uk/2017/05/17/ransomware_wannacrypt_how_not_to_warn_against_it/
http://cacr.uwaterloo.ca/techreports/2013/cacr2013-09.pdf
http://www.americanbanker.com/news/law-regulation/how-zcash-tries-to-balance-privacy-transparency-in-blockchain-1092198-1.html?zkprintable%3D1&%3Bnopagination%3D1
https://www.benthamsgaze.org/wp-content/uploads/2016/01/csm_img_20151204_160423_00bd627744.jpg
https://www.benthamsgaze.org/wp-content/uploads/2016/10/complete_architecture-300x219.png
https://fonts.gstatic.com
https://github.com/aliclark/tor
https://www.benthamsgaze.org/2015/06/
https://secure.gravatar.com/avatar/467488d9fdbe7da980bc0964a6d8a8aa?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic1.png
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comments
http://www.eba.europa.eu/-/eba-seeks-input-on-strong-customer-authentication-and-secure-communication-under-psd2
https://www.benthamsgaze.org/wp-content/uploads/2017/10/hawkes_diagram.png
https://theintercept.com/2015/02/19/great-sim-heist/
https://apwg.org/apwg-events/ecrime2017/
https://www.benthamsgaze.org/wp-content/uploads/2017/05/password_strength.png
https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/#respond
https://www.benthamsgaze.org/2015/12/08/
https://www.benthamsgaze.org/category/hardware/
https://www.benthamsgaze.org/wp-content/uploads/2015/03/panopticam-1024x514.jpg
http://discovery.ucl.ac.uk/1496993/
https://www.benthamsgaze.org/category/cryptography/page/2/
http://www.modernhealthcare.com/article/20160914/news/160919950
https://www.benthamsgaze.org/wp-content/uploads/2015/10/nopin-poc-1024x386.jpg
https://www.benthamsgaze.org/feed/
https://www.benthamsgaze.org/tag/social-networks/
http://www0.cs.ucl.ac.uk/staff/s.meiklejohn/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78444#respond
https://www.benthamsgaze.org/wp-content/uploads/2016/06/photo.jpg
http://services.parliament.uk/bills/2016-17/investigatorypowers.html
https://www.benthamsgaze.org/?p%3D1878
http://2016.laser-workshop.org/
https://www.benthamsgaze.org/2015/02/06/tor-the-last-bastion-of-online-anonymity/
https://www.benthamsgaze.org/category/crime-science/
https://www.emvco.com/documents/emvco_response_to_cambridge_report.pdf
https://www.benthamsgaze.org/author/davidpym/
https://www.benthamsgaze.org/2017/01/31/diversity-is-our-strength/
http://www0.cs.ucl.ac.uk/staff/d.pym/
https://www.benthamsgaze.org/2018/01/16/practicing-a-science-of-security/feed/
https://www.benthamsgaze.org/2016/11/08/strong-customer-authentication-in-the-payment-services-directive-2/#more-1259
https://www.benthamsgaze.org/2016/11/16/a-longitudinal-measurement-study-of-4chans-politically-incorrect-forum-and-its-effect-on-the-web/#more-1278
https://fc18.ifca.ai/
https://www.benthamsgaze.org/?p%3D1957
https://xkcd.com/936/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78470#respond
https://www.gov.uk/government/publications/distributed-ledger-technology-blackett-review
https://www.benthamsgaze.org/2015/10/27/an-analysis-of-reshipping-mule-scams/#comments
https://www.benthamsgaze.org/wp-content/uploads/2015/10/963-000-825x221.jpg
http://fc16.ifca.ai/bitcoin/papers/hbg16.pdf
http://www.bbc.co.uk/news/business-35609833
https://www.benthamsgaze.org/2017/12/13/a-critical-analysis-of-genome-privacy-research/feed/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/4chan-011-825x175.png
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/style.css?ver%3D4.9.1
http://www.hyperledger.org/
https://www.internetsociety.org/sites/default/files/blogs-media/efficient-private-statistics-with-succinct-sketches.pdf
https://www.benthamsgaze.org/category/cryptocurrencies/page/2/
http://www.financialfraudaction.org.uk/cms/assets/1/2014%20annual%20fraud%20figures%20release%20-%20final.pdf
https://eprint.iacr.org/2013/451
https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_samuel_ranellucci.pdf
https://www.benthamsgaze.org/category/education/page/2/
https://www.benthamsgaze.org/author/amittos/
https://www.cs.columbia.edu/~angelos/papers/2004/tmreview.pdf
https://www.benthamsgaze.org/wp-content/uploads/2016/06/photo-1024x576.jpg
http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/
https://www.benthamsgaze.org/2015/12/10/how-tors-privacy-was-momentarily-broken-and-the-questions-it-raises/
https://www.benthamsgaze.org/2016/09/07/battery-status-readout-as-a-privacy-risk/
https://emilianodc.com/papers/wgs-privacy.pdf
https://www.benthamsgaze.org/wp-content/uploads/2015/12/picture_munichdec15.jpg
https://www.benthamsgaze.org/wp-content/uploads/2015/06/gemmb-150x150.jpg
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen-child/style.css?ver%3D4.9.1
http://news.microsoft.com/europe/2015/11/11/45283/#sm.0001fs08oxb4de92t4n20e8ziiysa
https://www.theguardian.com/technology/2017/jun/15/university-college-london-hit-by-ransomware-attack-hospitals-email-phishing
benthamsgaze.org//contribution-policy/#respond
http://discovery.ucl.ac.uk/1398382/
https://www.riscs.org.uk/2017/08/11/the-end-of-the-billion-user-passwordimpossible/
benthamsgaze.org//about/#respond
https://www.benthamsgaze.org/2017/11/
https://secure.gravatar.com/avatar/a1c40831bf20061fc6598f8884e5108f?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://twitter.com/panoptistream
https://www.benthamsgaze.org/wp-content/uploads/2015/07/04-ga17-zeroknowlegde.pptx
http://fc16.ifca.ai/bitcoin/papers/bhmw16.pdf
https://www.eff.org/issues/national-security-letters
https://idash.ucsd.edu/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/privkeypubkeypubadd.png
https://www.benthamsgaze.org/2016/06/06/exceptional-access-provisions-in-the-investigatory-powers-bill/#more-912
https://www.cerias.purdue.edu/site/blog/post/password-change-myths/
https://www.benthamsgaze.org/2016/11/01/a-privacy-enhancing-architecture-for-secure-wearable-devices/#respond
https://www.benthamsgaze.org/2016/07/05/workshop-theory-and-practice-of-secure-multiparty-computation/
https://en.wikipedia.org/wiki/whole_genome_sequencing
http://www.wsj.com/articles/silk-road-creator-found-guilty-of-cybercrimes-1423083107
https://www.benthamsgaze.org/2015/08/20/experimenting-with-ssl-vulnerabilities-in-android-apps/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78471#respond
http://steemit.com/
https://www.benthamsgaze.org/category/authentication/page/2/
https://www.internetsociety.org/doc/mamadroid-detecting-android-malware-building-markov-chains-behavioral-models
http://www.forbes.com/sites/andygreenberg/2011/12/26/meet-telecomix-the-hackers-bent-on-exposing-those-who-censor-and-surveil-the-internet/
http://sts.cornell.edu/peter-robert-dear
https://www.benthamsgaze.org/wp-content/uploads/2017/08/design.jpg
https://www.benthamsgaze.org/2016/02/17/are-payment-card-contracts-unfair/
https://www.benthamsgaze.org/2017/02/07/double-fetch-situations-turn-into-double-fetch-vulnerabilities-a-study-of-double-fetches-in-the-linux-kernel/
https://www.benthamsgaze.org/category/inside-infosec/feed/
http://eur-lex.europa.eu/legal-content/en/all/?uri%3Dcelex:32006l0024
http://cybersecurity.oxfordjournals.org/content/early/2017/01/04/cybsec.tyw012.abstract?ijkey%3Dmtdzx6c7cvqaudw&%3Bkeytype%3Dref
https://www.benthamsgaze.org/2017/01/10/security-intrusions-as-mechanisms/#respond
https://www.benthamsgaze.org/category/public-policy/
http://www0.cs.ucl.ac.uk/staff/s.meiklejohn
https://www.benthamsgaze.org/author/lonwuzur/
http://www.independent.co.uk/news/uk/politics/uk-cyber-security-chief-gchq-internet-passwords-guidelines-ciaran-martin-national-centre-a7578976.html
https://www.benthamsgaze.org/subscribing-to-benthams-gaze/
https://www.benthamsgaze.org/2017/07/04/epfl-blockchain-summer-school/
https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/#more-616
https://www.benthamsgaze.org/2016/05/
https://www.benthamsgaze.org/category/malware/
http://www0.cs.ucl.ac.uk/staff/g.stringhini/papers/shipping-ccs2015.pdf
https://www.genome.gov/27565109/the-cost-of-sequencing-a-human-genome/
http://sec.cs.ucl.ac.uk/ace_csr/
http://sec.cs.ucl.ac.uk/ace_csr/news_announcements/article/dr_murdoch_interviewed_by_the_register_on_biometric_payment_cards/
https://arxiv.org/pdf/1510.02037.pdf
https://www.nsf.gov/events/event_summ.jsp?cntn_id%3D133229&%3Borg%3Dnsf
http://drops.dagstuhl.de/opus/volltexte/2016/5698/pdf/dagrep_v005_i010_p050_s15431.pdf
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_aaron_johnson.pdf
https://www.benthamsgaze.org/2016/08/23/
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/genericons/genericons.css?ver%3D3.2
https://www.benthamsgaze.org/?p%3D54
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_ariel_nof.pdf
https://www.benthamsgaze.org/2015/11/03/category-errors-in-information-security-how-logic-can-help/#comments
http://znjp.com
https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/
https://www.benthamsgaze.org/category/cyber-crime/page/2/
http://www0.cs.ucl.ac.uk/staff/b.karp/
http://www.nicolascourtois.com/papers/ucl_cipher_champion_2013.pdf
https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages
https://www.benthamsgaze.org/wp-content/uploads/2016/02/bestbuy-825x330.png
https://www.benthamsgaze.org/author/smeiklej/
https://www.benthamsgaze.org/2015/03/13/a-digital-magna-carta/#comments
http://www.internetsociety.org/events/ndss-symposium-2016
http://www.publications.parliament.uk/pa/cm201516/cmselect/cmsctech/573/573.pdf
https://www.openrightsgroup.org/blog/2016/the-revised-investigatory-powers-bill-what-has-changed
https://twitter.com/jeffreycrowell
https://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/
https://secure.gravatar.com/avatar/e51e6ac1e889e26c779b0e5bbbb391ea?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/wp-content/uploads/2017/11/graph2-1024x750.png
https://www.benthamsgaze.org/wp-content/uploads/2015/07/09-ga17-storage-retrieval.pptx
https://www.genomicsengland.co.uk/
https://wikileaks.org/ciav7p1/
http://blog.talosintelligence.com/2017/07/the-medoc-connection.html?m%3D1
http://www.nhs.uk/conditions/anticoagulants-warfarin-/pages/introduction.aspx
https://www.benthamsgaze.org/wp-content/uploads/2015/06/davm-150x150.jpg
http://cra.org/resources/taulbee-survey/
https://www.benthamsgaze.org/2015/12/17/nicolas-courtois-algebraic-cryptanalysis/#respond
https://www.benthamsgaze.org/2016/05/12/on-the-hunt-for-facebooks-army-of-fake-likes/#more-853
https://www.benthamsgaze.org/2017/04/04/can-games-fix-whats-wrong-with-computer-security-education/#more-1391
https://ischool.illinois.edu/people/faculty/vcs
https://global.oup.com/academic/product/explaining-the-brain-9780199299317
https://www.benthamsgaze.org/2015/09/29/
https://www.benthamsgaze.org/2016/07/05/
https://www.benthamsgaze.org/2015/12/01/forced-authorisation-chip-and-pin-hitting-high-end-retailers/#more-541
http://www.cs.ucl.ac.uk/staff/j.krinke/
https://www.cosic.esat.kuleuven.be/eurocrypt_2015/
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation_david_evans.pdf
http://sec.cs.ucl.ac.uk/users/smurdoch/
https://twitter.com/hashtag/fraudnewscnn?src%3Dhash&%3Bref_src%3Dtwsrc%5etfw
https://blog.velcommuta.de/wp-content/uploads/2015/07/nfcgate-extended-abstract.pdf
https://kclpure.kcl.ac.uk/portal/en/persons/david-kohan-marzagao%28f6515225-6d18-48bd-96d4-4e493988cec7%29.html
http://www.webopedia.com/term/d/ddos_attack.html
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f11%2f13%2fsystematizing-consensus-in-the-age-of-blockchains%2f&%3Bformat%3Dxml
https://www.benthamsgaze.org/2015/03/30/banks-undermine-security/#more-106
http://www0.cs.ucl.ac.uk/staff/d.clark/
http://dx.doi.org/10.1093/cybsec/tyw012
https://www.benthamsgaze.org/wp-content/uploads/2016/05/farms.png
https://www.benthamsgaze.org/wp-content/uploads/2016/11/detailedblockchain.png
https://www.theverge.com/2017/4/19/15363800/ihg-credit-card-breach-details-lookup-tool
https://cs.uwaterloo.ca/~iang/
https://www.benthamsgaze.org/?p%3D1756
https://www.benthamsgaze.org/author/jgroth/
http://www0.cs.ucl.ac.uk/staff/s.meiklejohn/files/ndss16.pdf
https://blockchain-summer.epfl.ch/
https://www.benthamsgaze.org/wp-content/uploads/2016/01/secure_voice_at_official.pdf
https://www.benthamsgaze.org/2017/03/08/what-the-cia-hack-and-leak-teaches-us-about-the-bankruptcy-of-current-cyber-doctrines/#respond
https://www.benthamsgaze.org/wp-content/uploads/2018/01/goldfingerbtc.jpg
https://www.youtube.com/watch?v%3D82zko_k1xq4&%3Bfeature%3Dyoutu.be&%3Bt%3D2m53s
https://www.benthamsgaze.org/2016/05/12/on-the-hunt-for-facebooks-army-of-fake-likes/#comments
http://en.chessbase.com/post/the-magical-che-experiment
https://www.benthamsgaze.org/2015/04/20/msc-information-security-ucl/#more-113
http://dropsafe.crypticide.com/aboutalecm
https://research.torproject.org/techreports/datagram-comparison-2011-11-07.pdf
https://www.benthamsgaze.org/category/authentication/
https://www.benthamsgaze.org/2015/07/21/teaching-privacy-enhancing-technologies-at-ucl/
https://www.youtube.com/embed/wabkb0kah6c?feature%3Doembed
http://www.town-crier.org/
https://www.benthamsgaze.org/wp-content/uploads/2017/05/wannacry_genrandom.png
https://www.benthamsgaze.org/2017/05/23/find-security-champions-in-blends-of-organisational-culture/#respond
http://sec.cs.ucl.ac.uk/home/
https://www.w3.org/tr/vibration/
https://www.benthamsgaze.org/author/sparkin/
https://www.benthamsgaze.org/2017/05/19/
http://nvlpubs.nist.gov/nistpubs/ir/2014/nist.ir.7983.pdf
https://www.benthamsgaze.org/wp-content/uploads/2017/10/timeline_final_combined_2.compressed2.png
https://www.benthamsgaze.org/2016/12/
https://www.benthamsgaze.org/2016/07/19/microsoft-ireland-winning-the-battle-for-privacy-but-losing-the-war/
https://github.com/stonecoldpat/briberycontracts/blob/master/historyrevisioncon.sol
https://eprint.iacr.org/2016/263
https://arxiv.org/abs/1711.03936
https://www.benthamsgaze.org/2016/06/17/smart-contracts-beyond-the-age-of-innocence/#comments
https://www.benthamsgaze.org/2017/07/18/caveat-emptor-privacy-could-turn-uks-genomic-dream-into-a-nightmare/#respond
https://www.benthamsgaze.org/wp-content/uploads/2017/12/15431.01.l-300x225.jpg
https://www.nature.com/articles/ng.440
https://www.benthamsgaze.org/2016/03/11/biometrics-for-payments/
https://www.benthamsgaze.org/2015/02/11/on-line-lecture-dp5-private-presence-31c3/
https://www.benthamsgaze.org/2016/11/
http://www.cs.ucl.ac.uk/degrees/msc_isec/
https://www.commerce.senate.gov/public/_cache/files/24d3c229-4f2f-405d-b8db-a3a67f183883/23e30aa955b5c00fe57cfd709621592c.2014-0325-target-kill-chain-analysis.pdf
http://www.ucl.ac.uk/bentham-project/who/panopticon
http://daserste.ndr.de/panorama/xkeyscorerules100.txt
https://www.benthamsgaze.org/2018/01/23/smart-contracts-and-bribes/
https://secure.gravatar.com/avatar/a55873745fe0eecd8d9e541dd42126ae?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2016/11/22/blockchains-and-why-we-need-privacy/
https://www.linkedin.com/grp/home?gid%3D8207869
https://www.internetsociety.org/sites/default/files/eurousec2017_07_becker_paper.pdf
http://randomwalker.info
https://www.riscs.org.uk/2017/03/01/the-hardest-of-targets/
https://www.benthamsgaze.org/2015/01/07/introducing-the-expanded-ucl-information-security-group/#respond
https://www.benthamsgaze.org/category/measurement/page/2/
https://www.blackhat.com/
https://secure.gravatar.com/avatar/06bd9afacd436f381f5b77337d398454?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/category/social-networks/feed/
https://petsymposium.org/2017/papers/issue2/paper18-2017-2-source.pdf
https://www.benthamsgaze.org/2016/03/16/bitcoin-workshop-at-financial-crypto-2016/
https://www.benthamsgaze.org/wp-content/plugins/akismet/_inc/form.js?ver%3D4.0.1
http://www.forbes.com/sites/matthewherper/2011/01/05/the-first-child-saved-by-dna-sequencing/
https://www.benthamsgaze.org/2015/10/
https://www.benthamsgaze.org/category/cyber-crime/feed/
https://www.benthamsgaze.org/2015/04/20/
https://www.theguardian.com/uk-news/2017/feb/12/uk-government-accused-full-frontal-attack-prison-whistleblowers-media-journalists
https://www.benthamsgaze.org/author/gstringh/
https://www.benthamsgaze.org/?p%3D1057
https://www.benthamsgaze.org/2016/07/05/workshop-theory-and-practice-of-secure-multiparty-computation/#respond
http://sec.cs.ucl.ac.uk/ace_csr/news_announcements/article/dr_murdoch_was_interviewed_by_bbc_news_about_the_introduction_of_an_app_store_register_in_china/
https://www.benthamsgaze.org/2016/10/18/
https://www.benthamsgaze.org/2015/12/08/new-eu-itn-privacy-and-us/
https://www.benthamsgaze.org/wp-content/uploads/2017/03/figure1.png
http://www.bbc.co.uk/programmes/b097sc13
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/?replytocom%3D74394#respond
https://www.nature.com/articles/ng.288
https://www.benthamsgaze.org/category/law-enforcement/page/2/
https://www.benthamsgaze.org/2015/11/03/
https://www.benthamsgaze.org/author/edecrist/
https://en.wikipedia.org/wiki/genome-wide_association_study
https://www.benthamsgaze.org/2016/09/
http://ctic.au.dk
https://www.benthamsgaze.org/author/pchaidos/
https://www.benthamsgaze.org/2016/04/21/
https://www.benthamsgaze.org/2017/05/09/underground-abracardabra-understanding-carding-forums/#respond
benthamsgaze.org//2017/12/13/a-critical-analysis-of-genome-privacy-research/#respond
https://www.benthamsgaze.org/2017/04/04/
https://www.benthamsgaze.org/wp-content/uploads/2016/09/tor-data.png
https://www.benthamsgaze.org/2017/01/24/
https://www.benthamsgaze.org/wp-content/uploads/2015/07/03-ga17-private-computations.pdf
https://www.benthamsgaze.org/2015/11/
https://www.benthamsgaze.org/comments/feed/
http://www.ucl.ac.uk/bentham-project/who
https://www.benthamsgaze.org/wp-content/uploads/2016/08/image-20160802-17177-12o458d.png
https://www.howtogeek.com/186754/microsoft-is-still-making-security-updates-for-windows-xp-but-you-cant-have-them/
https://www.benthamsgaze.org/2017/05/03/online-security-wont-improve-until-companies-stop-passing-the-buck-to-the-customer/#comments
http://ieeexplore.ieee.org/abstract/document/7163041/
https://petsymposium.org/
https://www.benthamsgaze.org/2017/05/16/paybreak-able-to-defeat-wannacrywannacryptor-ransomware/
https://en.wikipedia.org/wiki/smart_contract
https://t.co/wyunhjjujg
https://alexanderlhicks.com/
https://www.benthamsgaze.org/category/infosec/page/2/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-35231
http://litecoin.org/
https://www.benthamsgaze.org/2016/06/28/user-centred-security-awareness-empowers-employees-to-be-the-strongest-defense/
https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/#respond
https://hbr.org/2017/03/the-potential-for-blockchain-to-transform-electronic-health-records
http://www0.cs.ucl.ac.uk/staff/j.groth/
https://www.benthamsgaze.org/wp-content/uploads/2015/03/panopticam.jpg
https://blog.lukaszolejnik.com/battery-status-readout-as-a-privacy-risk/
http://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/
https://www.benthamsgaze.org/2016/07/13/
https://qz.com/956139/uber-drivers-are-comparing-fares-with-riders-to-check-their-pay-from-the-company/
https://www.benthamsgaze.org/2018/01/23/smart-contracts-and-bribes/feed/
https://www.benthamsgaze.org/author/eugene-kolo/
https://www.usatoday.com/story/tech/2017/10/02/las-vegas-shooting-google-spread-stories-wrong-suspect-4-chan/724109001/
https://googleblog.blogspot.co.uk/2010/01/new-approach-to-china.html
https://www.benthamsgaze.org/2015/05/01/teaching-cybersecurity-to-criminologists/
https://www.reddit.com/r/ethereum/comments/4oif2x/dao_attack_exchanges_please_pause_eth_and_dao/
https://www.theguardian.com/business/2017/jul/06/cyber-attack-nurofen-durex-reckitt-benckiser-petya-ransomware
https://www.vasco.com/
https://www.benthamsgaze.org/2015/07/21/teaching-privacy-enhancing-technologies-at-ucl/#more-261
https://www.benthamsgaze.org/category/cryptocurrencies/feed/
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-74448
https://www.benthamsgaze.org/2016/11/08/strong-customer-authentication-in-the-payment-services-directive-2/#respond
https://www.benthamsgaze.org/2015/03/30/banks-undermine-security/#respond
https://www.benthamsgaze.org/2017/07/25/
https://en.wikipedia.org/wiki/maurice_wilkes
https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/#more-740
https://socialsciences.exeter.ac.uk/sociology/staff/leonelli/
http://discovery.ucl.ac.uk/1475820/
https://www.internetsociety.org/doc/fixing-security-together-leveraging-trust-relationships-improve-security-organizations
http://nicolascourtois.com/
https://www.eff.org/deeplinks/2013/05/blue-coat-syria-scandal-next-shoe-drops-computerlinks-fzco
https://eprint.iacr.org/2001/069
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/#comment-79517
https://www.benthamsgaze.org/2017/01/10/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2fsubscribing-to-benthams-gaze%2f
https://www-users.cs.umn.edu/~hopper/imux-wpes14.pdf
https://www.benthamsgaze.org/2016/09/29/quux-a-quic-un-multiplexing-of-the-tor-relay-transport/
http://www.ucl.ac.uk/bentham-project/who/bentham_ucl
https://www.benthamsgaze.org/category/social-networks/
https://vimeo.com/8241248
https://www.wsj.com/articles/the-man-who-wrote-those-password-rules-has-a-new-tip-n3v-r-m1-d-1502124118
http://mediafutures.cs.ucl.ac.uk/people/ingemarcox/
https://www.benthamsgaze.org/wp-content/uploads/2015/07/02-ga17-anonymous-comms.pptx
https://theconversation.com/the-talktalk-hack-story-shows-uk-cybersecurity-in-disarray-49909
https://www.benthamsgaze.org/2016/10/25/how-to-do-zero-knowledge-from-discrete-logs-in-under-7kb/#respond
https://github.com/ubeacsec/silverdog
https://www.benthamsgaze.org/category/law-enforcement/
https://www.benthamsgaze.org/2017/10/03/liability-for-push-payment-fraud-pushed-onto-the-victims/#comments
https://www.benthamsgaze.org/category/privacy/
https://eprint.iacr.org/2011/618.pdf
http://boards.4chan.org/pol/
https://www.benthamsgaze.org/2017/11/13/systematizing-consensus-in-the-age-of-blockchains/#respond
http://citeseerx.ist.psu.edu/showciting?cid%3D531406
http://www.teenvogue.com/story/how-to-keep-messages-secure
https://www.iacr.org/misc/us-immigration-ban.html
https://www.benthamsgaze.org/2015/09/10/
https://www.benthamsgaze.org/wp-content/uploads/2015/10/nopin-poc.jpg
https://www.cyberaware.gov.uk/
https://www.benthamsgaze.org/wp-content/uploads/2017/10/timeline_final_combined_2.compressed2-1024x476.png
https://www.benthamsgaze.org/2016/05/12/on-the-hunt-for-facebooks-army-of-fake-likes/
http://mittos.me/2017/12/13/a-critical-analysis-of-genome-privacy-research-list-of-papers/
http://digg.com/reader
https://www.benthamsgaze.org/2015/12/17/nicolas-courtois-algebraic-cryptanalysis/
https://www.benthamsgaze.org/2016/02/17/
http://www.theguardian.com/media-network/media-network-blog/2014/sep/04/beacon-technology-house-of-fraser-waitrose
https://www.benthamsgaze.org/category/internet-security/feed/
https://eprint.iacr.org/2017/406.pdf
https://www.benthamsgaze.org/2016/01/26/first-ucl-team-competes-in-the-international-capture-the-flag-competition/#respond
https://www.benthamsgaze.org/2015/11/10/
https://www.benthamsgaze.org/?p%3D1884
https://www.benthamsgaze.org/2015/05/06/
https://www.benthamsgaze.org/2017/08/22/
https://www.ft.com/content/e96924f0-3722-11e7-99bd-13beb0903fa3
https://www.usenix.org/system/files/conference/foci13/foci13-nowlan.pdf
http://www0.cs.ucl.ac.uk/staff/g.danezis/papers/ndss16currencies.pdf
http://services.parliament.uk/bills/2015-16/investigatorypowers/documents.html
https://sensorsprivacy.com/proximity-sensor
https://www.benthamsgaze.org/2016/12/15/privacy-analysis-of-the-w3c-proximity-sensor-specification/
https://wordpress.org/
https://www.cl.cam.ac.uk/~mgk25/sc2005-distance.pdf
https://techcrunch.com/2017/11/07/a-major-vulnerability-has-frozen-hundreds-of-millions-of-dollars-of-ethereum/
https://www.benthamsgaze.org/wp-content/uploads/2016/09/freedom-data.png
https://www.benthamsgaze.org/category/security-usability/page/2/
https://www.benthamsgaze.org/wp-content/uploads/2015/07/08-ga17-data-anonymization.pptx
http://motherboard.vice.com/read/hackers-stole-over-60-million-dropbox-accounts
https://www.benthamsgaze.org/category/security-economics/
http://sec.cs.ucl.ac.uk/people/simon_parkin/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/pol-example-threads_large.png
https://www.benthamsgaze.org/2016/10/25/how-to-do-zero-knowledge-from-discrete-logs-in-under-7kb/
https://www.benthamsgaze.org/2016/05/28/
https://www.visa.co.uk/products/visa-contactless/
https://github.com/stonecoldpat/briberycontracts/blob/master/goldfingercon.sol
benthamsgaze.org//subscribing-to-benthams-gaze/#respond
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation_martin-hirt.pdf
http://www.computerworld.com/article/2932371/cybercrime-hacking/medjack-hackers-hijacking-medical-devices-to-create-backdoors-in-hospital-networks.html
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-74488
https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/solongandnothanks.pdf
https://www.benthamsgaze.org/2015/04/23/one-out-of-many-proofs-or-how-to-leak-a-secret-and-spend-a-coin/#respond
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78470
https://www.benthamsgaze.org/2016/11/22/
http://www.theregister.co.uk/2016/04/23/anti_ad_blockers_face_legal_challenges/
https://www.benthamsgaze.org/author/onaolapo/
http://www0.cs.ucl.ac.uk/staff/g.stringhini/hacking.html
benthamsgaze.org//2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#respond
benthamsgaze.org//2018/01/16/practicing-a-science-of-security/#respond
https://www.benthamsgaze.org/2015/10/07/gianluca-stringhini-cyber-criminal-operations-and-developing-systems-to-defend-against-them/
http://www.cs.ucl.ac.uk/staff/s.murdoch
http://discovery.ucl.ac.uk/1419506/
https://www.benthamsgaze.org/wp-includes/js/jquery/jquery.js?ver%3D1.12.4
https://conspicuouschatter.wordpress.com
https://www.benthamsgaze.org/2016/08/23/steven-murdoch-privacy-and-financial-security/#respond
https://www.benthamsgaze.org/2015/02/09/sequencing-your-genome-is-becoming-an-affordable-reality-but-at-what-personal-cost/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2018%2f01%2f23%2fsmart-contracts-and-bribes%2f&%3Bformat%3Dxml
https://en.wikipedia.org/wiki/pure_function
https://www.benthamsgaze.org/2017/11/13/
http://www0.cs.ucl.ac.uk/staff/n.courtois/
https://www.ftc.gov/system/files/attachments/press-releases/ftc-issues-warning-letters-app-developers-using-silverpush-code/160317samplesilverpushltr.pdf
https://www.benthamsgaze.org/xmlrpc.php?rsd
http://drops.dagstuhl.de/opus/volltexte/2014/4426/pdf/dagrep_v003_i010_p025_s13412.pdf
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/feed/
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/?replytocom%3D79517#respond
http://www0.cs.ucl.ac.uk/staff/m.albassam/
https://www.benthamsgaze.org/2015/09/29/mathematical-modelling-in-the-two-cultures/#more-332
https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/
https://www.benthamsgaze.org/wp-content/uploads/2016/12/proximitydump4.png
https://www.benthamsgaze.org/2016/04/21/come-work-with-us/
https://www.benthamsgaze.org/2016/11/14/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-82505
http://fc16.ifca.ai/bitcoin/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/diverge.png
https://lamport.azurewebsites.net/pubs/paxos-simple.pdf
https://www.cesg.gov.uk/news/awareness-only-first-step
https://www.routledge.com/the-routledge-handbook-of-mechanisms-and-mechanical-philosophy/glennan-illari/p/book/9781138841697
https://www.benthamsgaze.org/author/jbootle/
http://research.microsoft.com/pubs/155185/goldwasserr07.pdf
https://www.benthamsgaze.org/2016/01/12/ace-csr-opening-event-201516-talks-on-malware-location-privacy-and-wiretap-law/#more-632
https://www.benthamsgaze.org/author/kkkrol/
https://www.benthamsgaze.org/category/privacy/feed/
https://eprints.biblio.unitn.it/1629/1/tr-disi-08-041_v1.1.pdf
https://www.benthamsgaze.org/2017/01/31/diversity-is-our-strength/#respond
https://www.benthamsgaze.org/wp-content/uploads/2016/05/wired-anti-adblocking-1024x585.png
https://shadow.github.io/
https://www.benthamsgaze.org/2015/10/14/just-how-sophisticated-will-card-fraud-techniques-become/#respond
https://royalsociety.org/events/2015/02/cyber-panel/
https://doi.org/10.1017/cbo9780511498442.014
https://www.internetsociety.org/sites/default/files/blogs-media/better-the-devil-you-know-user-study-of-two-captchas-a-possible-replacement-technology.pdf
https://theintercept.com/2014/12/13/belgacom-hack-gchq-inside-story/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78499#respond
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/624628/cmo_annual_report_generation_genome.pdf
https://www.benthamsgaze.org/author/sazouvi/
https://www.benthamsgaze.org/wp-content/uploads/2015/07/01-ga17-introcomms.pptx
http://ctic.au.dk/events/workshops-conferences/mpc-2016/
https://www.benthamsgaze.org/2017/10/
http://www.cs.ucl.ac.uk/students/syllabus/mscisec/ga17_privacy_enhancing_technologies/
https://secure.gravatar.com/avatar/4298396fc037fccc7ed0673fe41817e6?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://sec.cs.ucl.ac.uk/ace_csr/seminars_calendar/seminar_details/article/how-double-fetch-situations-turn-into-double-fetch-vulnerabilities-a-study-of-double-fetches-in-the-linux-kernel/
https://www.benthamsgaze.org/2016/11/08/
https://www.benthamsgaze.org/2016/06/
https://www.benthamsgaze.org/2017/05/09/
https://www.benthamsgaze.org/category/security-usability/
https://www.coindesk.com/energy-sector-giants-turn-to-ethereum-to-test-blockchain-potential/
https://www.benthamsgaze.org/2015/10/14/just-how-sophisticated-will-card-fraud-techniques-become/#more-361
https://www.benthamsgaze.org/2015/04/23/
http://www0.cs.ucl.ac.uk/staff/g.stringhini/
http://discovery.ucl.ac.uk/20247/2/cacm%20final.pdf
https://blog.velcommuta.de/wp-content/uploads/2015/07/nfcgate-poster.pdf
https://www.dropbox.com/help/security/ransomware-recovery
https://www.benthamsgaze.org/2017/07/12/
https://www.benthamsgaze.org/category/education/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78498
https://www.benthamsgaze.org/category/cyber-crime/
https://theconversation.com/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack-63142
https://www.caida.org/publications/papers/2012/menlo_report_actual_formatted/
https://www.benthamsgaze.org/2015/01/
https://www.nature.com/articles/gim2015167
https://fas.org/irp/agency/dod/jason/cyber.pdf
https://www.benthamsgaze.org/category/talks-and-panels/feed/
https://www.benthamsgaze.org/2016/01/12/
https://www.torproject.org/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78448
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/fc16cardcontracts-eba.pdf
https://www.benthamsgaze.org/2016/01/12/ace-csr-opening-event-201516-talks-on-malware-location-privacy-and-wiretap-law/#respond
https://www.benthamsgaze.org/contribution-policy/feed/
https://web.eecs.umich.edu/~kevinfu/
https://www.benthamsgaze.org/category/internet-security/page/2/
https://www.benthamsgaze.org/2015/03/30/
https://www.benthamsgaze.org/2016/04/21/come-work-with-us/#respond
https://www.benthamsgaze.org/2016/08/05/moving-towards-security-and-privacy-experiments-for-the-real-world/#respond
https://www.benthamsgaze.org/category/security-economics/feed/
http://discovery.ucl.ac.uk/1461425/1/01_1_4.pdf
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78450
https://eprint.iacr.org/2012/610
https://simons.berkeley.edu/workshops/crypto2015-boot-camp
https://www.benthamsgaze.org/2015/12/10/how-tors-privacy-was-momentarily-broken-and-the-questions-it-raises/#more-606
https://www.computer.org/csdl/mags/sp/2016/05/msp2016050011.html
https://www.benthamsgaze.org/author/rmercer/
https://www.benthamsgaze.org/2015/06/24/ucl-code-breaking-competition/#respond
https://www.benthamsgaze.org/category/education/feed/
https://www.benthamsgaze.org/2016/09/07/
https://www.benthamsgaze.org/category/malware/page/2/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78468#respond
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/
benthamsgaze.org//2017/11/13/systematizing-consensus-in-the-age-of-blockchains/#respond
https://www.benthamsgaze.org/2017/05/16/
https://bitcoin.org/en/
https://www.benthamsgaze.org/2017/08/18/
https://www.lightbluetouchpaper.org/2016/05/28/adblocking-and-counter-blocking-a-slice-of-the-arms-race/
https://medium.com/@privacyint/the-home-office-only-listens-when-we-dont-want-them-to-7f961deb0ee8#.9r4g9cv4s
https://spqr.eecs.umich.edu/papers/rushanan-sok-oakland14.pdf
https://www.benthamsgaze.org/2016/07/13/cybersecurity-supporting-a-resilient-and-trustworthy-system-for-the-uk/
https://www.benthamsgaze.org/2017/08/11/
https://www.benthamsgaze.org/2015/06/24/
https://eugenekolo.com/static/paybreak.pdf
https://www.benthamsgaze.org/wp-content/uploads/2016/01/2275723713_ccf72809ec_b-e1453067447130-825x325.jpg
https://www.benthamsgaze.org/2016/06/06/exceptional-access-provisions-in-the-investigatory-powers-bill/
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/oakland10chipbroken.pdf
http://www.publications.parliament.uk/pa/jt201617/jtselect/jtrights/104/104.pdf
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78450#respond
https://www.benthamsgaze.org/2015/08/
https://www.benthamsgaze.org/2015/10/07/
https://www.benthamsgaze.org/category/infosec/
https://www.benthamsgaze.org/2016/11/16/a-longitudinal-measurement-study-of-4chans-politically-incorrect-forum-and-its-effect-on-the-web/#comments
https://www.benthamsgaze.org/category/biometrics/
http://www.genome.gov/11006943
https://www.benthamsgaze.org/author/wendy-m-grossman/
https://www.benthamsgaze.org/2016/06/28/user-centred-security-awareness-empowers-employees-to-be-the-strongest-defense/#more-962
http://arxiv.org/pdf/1605.05077v1.pdf
http://www.emvco.com/download_agreement.aspx?id%3D1238
http://www.comp.nus.edu.sg/~prateeks/papers/bitcoin-scaling.pdf
https://www.benthamsgaze.org/category/law-enforcement/feed/
https://www.youtube.com/embed/ty3wsqgoz28?feature%3Doembed
https://en.wikipedia.org/wiki/stuxnet
http://www.buzzfeed.com/josephbernstein/chinas-ingenious-online-dating-scams-put-ours-to-shame
http://arstechnica.com/tech-policy/2015/01/friend-who-helped-ulbricht-build-silk-road-testifies-against-him/
http://www.bankofengland.co.uk/research/documents/onebank/discussion.pdf
https://sensorsprivacy.com/
http://www0.cs.ucl.ac.uk/staff/s.azouvi/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D77195#respond
https://www.benthamsgaze.org/2016/11/16/
https://www.benthamsgaze.org/2016/10/18/yes-we-have-no-receipts/#respond
https://www.benthamsgaze.org/2017/02/07/double-fetch-situations-turn-into-double-fetch-vulnerabilities-a-study-of-double-fetches-in-the-linux-kernel/#respond
https://www.benthamsgaze.org/category/security-usability/feed/
http://arxiv.org/pdf/1605.05077v1
https://www.benthamsgaze.org/category/genomics/
https://pomcor.com/2014/09/20/apple-pay-must-be-using-the-mag-stripe-mode-of-the-emv-contactless-specifications/
https://www.benthamsgaze.org/2015/03/06/why-benthams-gaze/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/pcb_preview-e1477929203860-825x229.png
https://eprint.iacr.org/2013/454
https://freedomhouse.org/
https://www.benthamsgaze.org/2017/05/09/underground-abracardabra-understanding-carding-forums/
https://www.bigbrotherwatch.org.uk/wp-content/uploads/2016/07/safe-in-police-hands.pdf
http://www.cs.ucl.ac.uk/staff/j.groth
https://research.microsoft.com/apps/pubs/?id%3D217510
https://www.youtube.com/channel/ucddgde-emc-tsyp7xy4pk9w
https://www.benthamsgaze.org/2016/09/29/quux-a-quic-un-multiplexing-of-the-tor-relay-transport/#respond
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78574#respond
https://www.researchgate.net/publication/238731788_users_are_not_the_enemy_why_users_compromise_security_mechanisms_and_how_to_take_remedial_measures
https://www.benthamsgaze.org/2015/10/27/an-analysis-of-reshipping-mule-scams/
https://www.benthamsgaze.org/author/vmavroud/
https://www.benthamsgaze.org/2017/05/23/
https://www.benthamsgaze.org/2017/02/07/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/pol-example-threads_large-270x300.png
https://www.benthamsgaze.org/2015/01/07/
https://www.benthamsgaze.org/2015/09/29/mathematical-modelling-in-the-two-cultures/#respond
https://www.benthamsgaze.org/2015/12/08/new-eu-itn-privacy-and-us/#more-584
https://en.wikipedia.org/wiki/rice%27s_theorem
benthamsgaze.org//2017/08/11/the-end-of-the-billion-user-passwordimpossible/#respond
https://www.benthamsgaze.org/2016/10/25/
https://www.benthamsgaze.org/2015/07/21/teaching-privacy-enhancing-technologies-at-ucl/#respond
https://www.benthamsgaze.org/2016/02/
https://secure.gravatar.com/avatar/e17465b53ab649618619c6e5e5326848?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2016/06/02/
http://www0.cs.ucl.ac.uk/staff/y.desmedt/
https://www.benthamsgaze.org/wp-content/uploads/2017/09/img_3489.jpg
https://blog.slock.it/no-dao-funds-at-risk-following-the-ethereum-smart-contract-recursive-call-bug-discovery-29f482d348b#.f5pv6v6iz
http://www.ucl.ac.uk/
https://www.benthamsgaze.org/category/legal-issues/feed/
https://metrics.torproject.org/userstats-relay-country.html
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/js/html5.js
http://www.publications.parliament.uk/pa/jt201516/jtselect/jtinvpowers/93/93.pdf
http://earlbarr.com/
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/presentation-sharemind.pdf
https://twitter.com/realdonaldtrump/status/881503147168071680?ref_src%3Dtwsrc%5etfw
http://www.cs.ucl.ac.uk/students/syllabus/undergrad/3096_research_group_project/
https://www.benthamsgaze.org/2015/05/14/
https://secure.gravatar.com/avatar/6fb09f94fea112fab154cc612f8bf740?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2016/07/19/
https://www.benthamsgaze.org/2015/02/09/
http://static.usenix.org/event/sec04/tech/full_papers/provos/provos_html/
https://www.benthamsgaze.org/2015/04/23/one-out-of-many-proofs-or-how-to-leak-a-secret-and-spend-a-coin/
https://www.tilburguniversity.edu/webwijs/show/e.kosta-2.htm
https://www.benthamsgaze.org/2016/03/11/
https://www.benthamsgaze.org/2015/11/03/category-errors-in-information-security-how-logic-can-help/#more-364
http://z.cash/
http://j00ru.vexillium.org/?p%3D1695
https://www.benthamsgaze.org/wp-content/uploads/2017/12/screen-shot-2017-12-13-at-14.14.13-1024x538.png
http://www.legislation.gov.uk/ukpga/2014/27/enacted
https://www.benthamsgaze.org/2015/04/20/msc-information-security-ucl/#respond
https://en.wikipedia.org/wiki/christopher_poole
https://news.vice.com/story/alt-right-trolls-are-getting-23andme-genetic-tests-to-prove-their-whiteness
http://sec.cs.ucl.ac.uk/people/m_angela_sasse/
http://cacr.uwaterloo.ca/techreports/2011/cacr2011-06.pdf
benthamsgaze.org//2017/08/22/should-you-phish-your-own-employees/#respond
https://trac.torproject.org/projects/tor/wiki/org/doc/listofservicesblockingtor
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/css/ie.css?ver%3D20141010
https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
https://www.lightbluetouchpaper.org/2017/05/13/bad-malware-worse-reporting/
https://www.benthamsgaze.org/2016/07/13/cybersecurity-supporting-a-resilient-and-trustworthy-system-for-the-uk/#respond
https://www.benthamsgaze.org/tag/measurement-studies/
https://www.benthamsgaze.org/2016/08/02/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78498#respond
https://drive.google.com/open?id%3D0byp5a__khv0dm1zsy3yxqwf2n2c
https://www.benthamsgaze.org/category/biometrics/feed/
https://en.wikipedia.org/wiki/blockchain
https://www.benthamsgaze.org/category/public-policy/feed/
http://www.cl.cam.ac.uk/~sjm217/
https://www.benthamsgaze.org/xmlrpc.php
https://www.benthamsgaze.org/
https://www.benthamsgaze.org/2017/02/
https://www.benthamsgaze.org/2016/03/16/
https://www.benthamsgaze.org/2017/08/22/should-you-phish-your-own-employees/#comments
https://www.benthamsgaze.org/about/?replytocom%3D35995#respond
https://www.benthamsgaze.org/wp-content/uploads/2017/06/img-20170624-wa0008-1024x768.jpg
http://www.nicolascourtois.com/papers/front_indocrypt08_2p.pdf
http://freehaven.net/doc/wupss04/usability.pdf
http://www.nspw.org/2017/program
https://www.benthamsgaze.org/category/censorship-resistance/
https://www.benthamsgaze.org/author/gdanezis/
https://www.benthamsgaze.org/2016/08/05/moving-towards-security-and-privacy-experiments-for-the-real-world/#more-1069
https://www.benthamsgaze.org/tag/fraud/
http://www0.cs.ucl.ac.uk/staff/g.danezis/
https://blogs.ancestry.com/cm/what-over-6-million-people-learned-when-they-took-ancestrydna-tests/
http://www.laser-workshop.org/
http://sec.cs.ucl.ac.uk/ace_csr/news_announcements/article/luca_melis_prof_danezis_and_dr_de_cristofaro_awarded_the_data_protection_by_design_award/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78471
https://www.ncbi.nlm.nih.gov/pmc/articles/pmc1448265/#r2
http://ctic.au.dk/fileadmin/www.ctic.au.dk/pdf/mpc-2016/abstract_christina_brzuska.pdf
https://www.benthamsgaze.org/category/security-economics/page/2/
https://www.benthamsgaze.org/2017/08/18/chainspace-a-sharded-smart-contracts-platform/#more-1720
https://www.benthamsgaze.org/2017/07/12/preventing-phishing-wont-stop-ransomware-spreading/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D82505#respond
https://www.benthamsgaze.org/wp-content/uploads/2015/10/reshippinggraphic-580x328.png
https://arxiv.org/pdf/1610.03452.pdf
https://www.benthamsgaze.org/2017/08/
https://www.benthamsgaze.org/2016/10/18/yes-we-have-no-receipts/
https://www.benthamsgaze.org/?p%3D1514
https://www.benthamsgaze.org/2018/01/
http://sec.cs.ucl.ac.uk/ace_csr/seminars_calendar/seminar_details/article/cyber-security-in-practice-detecting-real-attacks-on-real-networks/
https://www.benthamsgaze.org/2015/03/13/
https://www.benthamsgaze.org/category/measurement/feed/
https://www.benthamsgaze.org/category/hardware/feed/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/zchain-1024x524.png
https://www.benthamsgaze.org/author/tsigler/
http://www.thinkmind.org/download.php?articleid%3Dcomputation_tools_2012_1_40_80034
https://www.scientificlinux.org/
https://www.benthamsgaze.org/wp-content/uploads/2016/06/figure_1-300x172.png
https://www.benthamsgaze.org/2016/08/23/steven-murdoch-privacy-and-financial-security/#more-990
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/#comment-74836
https://wikileaks.org/ciav7p1/files/org-chart.png
http://eur-lex.europa.eu/legal-content/en/txt/html/?uri%3Dcelex:32015l2366&%3Bfrom%3Den#d1e4868-35-1
https://blog.lukaszolejnik.com/
https://www.benthamsgaze.org/2016/06/28/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/#comment-77195
https://www.benthamsgaze.org/category/cryptography/page/3/
https://www.benthamsgaze.org/2015/11/24/program-obfuscation/
http://cordis.europa.eu/programme/rcn/665457_en.html
https://www.benthamsgaze.org/author/asonnino/
http://www.cert.org/vulnerability-analysis/research/coordination.cfm
https://www.benthamsgaze.org/2015/12/
https://www.benthamsgaze.org/2017/01/17/inaugural-lecture-zero-knowledge-proofs/
https://www.benthamsgaze.org/author/angela/
http://link.springer.com/article/10.1007/s13347-014-0164-9
https://www.benthamsgaze.org/?p%3D1822
http://www.theukcardsassociation.org.uk/news/response-to-bbc.asp
http://heartbleed.com/
https://www.benthamsgaze.org/2017/05/03/
https://secure.gravatar.com/avatar/9779090bfb7bb108f40bdd341eaba95a?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://duckduckgo.com/
https://www.benthamsgaze.org/category/advertising/feed/
https://tylermoore.ens.utulsa.edu/
https://www.benthamsgaze.org/category/blockchain/feed/
https://eprint.iacr.org/2015/934
http://www.csl.sri.com/users/neumann/cacm231.pdf
https://www.benthamsgaze.org/2018/01/16/practicing-a-science-of-security/
https://www.benthamsgaze.org/2017/03/24/battery-status-not-included-assessing-privacy-in-w3c-web-standards/
https://www.benthamsgaze.org/contribution-policy/
https://www.benthamsgaze.org/2015/05/14/measuring-internet-censorship/
https://www.benthamsgaze.org/category/banking-security/
http://www.which.co.uk/news/2015/07/which-reveals-contactless-card-flaw-409322/
https://www.benthamsgaze.org/category/the-conversation/feed/
http://www.eba.europa.eu/documents/10180/1548183/consultation+paper+on+draft+rts+on+sca+and+csc+%28eba-cp-2016-11%29.pdf
https://www.benthamsgaze.org/2015/02/
https://secure.gravatar.com/avatar/3efa170d1947a6733f2d6230ebdb7a2f?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/?p%3D1846
https://en.wikipedia.org/wiki/honeypot_(computing)
https://www.benthamsgaze.org/wp-content/uploads/2015/10/rtemagicc_ace-meiklejohn.jpg-300x200.jpg
https://www.benthamsgaze.org/2015/06/24/ucl-code-breaking-competition/
https://www.benthamsgaze.org/wp-content/uploads/2017/05/wannacry_customaes.png
https://www.benthamsgaze.org/wp-content/themes/twentyfifteen/css/ie7.css?ver%3D20141010
https://www.benthamsgaze.org/author/aclark/
http://conferences2.sigcomm.org/imc/2014/papers/p347.pdf
https://www.benthamsgaze.org/about/feed/
http://www0.cs.ucl.ac.uk/staff/g.stringhini/papers/dating-dimva2015.pdf
http://www.alexa.com/
https://twitter.com/hashtag/fnn?src%3Dhash&%3Bref_src%3Dtwsrc%5etfw
https://www.benthamsgaze.org/2015/10/14/just-how-sophisticated-will-card-fraud-techniques-become/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D35231#respond
https://www.eff.org/deeplinks/2014/12/faulty-logic-heart-microsoft-ireland-email-dispute
https://www.benthamsgaze.org/2017/03/08/
https://snowdenarchive.cjfe.org/greenstone/cgi-bin/library.cgi
https://www.benthamsgaze.org/2017/07/18/
https://www.benthamsgaze.org/2015/02/09/sequencing-your-genome-is-becoming-an-affordable-reality-but-at-what-personal-cost/#respond
https://www.keylength.com/en/4/
https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/#more-525
https://www.benthamsgaze.org/2016/06/17/
https://www.torproject.org/docs/hidden-services.html.en
https://secure.gravatar.com/avatar/f8ae58fe8ae7745b87cc524d5ace3265?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://soc1024.ece.illinois.edu/permacoin.pdf
http://hpe-enterpriseforward.com/awareness-first-step/
http://krebsonsecurity.com/tag/target-data-breach/
https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/#comments
http://cfem.au.dk/
https://www.ethereum.org/
http://www0.cs.ucl.ac.uk/people/d.pym.html
https://www.benthamsgaze.org/2017/10/03/
https://mediacenter.23andme.com/company/about-us/
https://www.benthamsgaze.org/2016/06/28/user-centred-security-awareness-empowers-employees-to-be-the-strongest-defense/#comments
http://www0.cs.ucl.ac.uk/staff/j.onaolapo/papers/ecrime17carding.pdf
https://www.benthamsgaze.org/2017/12/13/a-critical-analysis-of-genome-privacy-research/#more-1884
https://rabu-salma.github.io/
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/?replytocom%3D76941#respond
https://en.wikipedia.org/wiki/atomic_commit
http://lukaszolejnik.com/stuff/proximity.html
https://www.benthamsgaze.org/2018/01/23/smart-contracts-and-bribes/#respond
https://www.benthamsgaze.org/2016/07/29/
https://www.benthamsgaze.org/2016/01/
https://www.benthamsgaze.org/wp-content/uploads/2017/05/countries_initially_affected_in_wannacry_ransomware_attack.png
https://www.benthamsgaze.org/2015/01/07/introducing-the-expanded-ucl-information-security-group/
https://www.benthamsgaze.org/2016/02/02/our-contributions-to-the-uk-distributed-ledger-technology-report/#respond
https://twitter.com/panopticam
https://www.benthamsgaze.org/category/privacy/page/4/
http://cybersecuritychallenge.org.uk/
https://www.benthamsgaze.org/wp-content/uploads/2016/11/imc16gmailmap-825x124.png
https://www.benthamsgaze.org/category/the-conversation/
https://www.benthamsgaze.org/tag/cybercrime/
https://www.benthamsgaze.org/2017/12/
https://en.wikipedia.org/wiki/flame_(malware)
https://www.benthamsgaze.org/2015/03/30/banks-undermine-security/
https://en.wikipedia.org/wiki/the_two_cultures
https://www.benthamsgaze.org/2016/02/09/jens-groth-non-interactive-zero-knowledge-proofs-efficient-enough-to-be-used-in-practice/#more-357
https://www.benthamsgaze.org/2015/03/13/a-digital-magna-carta/
https://decodeproject.eu/
https://www.benthamsgaze.org/2016/12/15/
https://www.benthamsgaze.org/category/operating-systems/feed/
https://www.benthamsgaze.org/2015/03/06/why-benthams-gaze/#comments
https://www.informatics.indiana.edu/xw7/papers/wang2009learning.pdf
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/?replytocom%3D78441#respond
https://www.benthamsgaze.org/2015/07/21/
https://www.benthamsgaze.org/tag/in/
https://www.benthamsgaze.org/2018/01/23/smart-contracts-and-bribes/#more-1957
https://www.benthamsgaze.org/2017/07/12/preventing-phishing-wont-stop-ransomware-spreading/#respond
https://www.benthamsgaze.org/2016/06/02/international-comparison-of-bank-fraud-reimbursement-customer-perceptions-and-contractual-terms/
https://www.benthamsgaze.org/wp-includes/js/comment-reply.min.js?ver%3D4.9.1
https://www.benthamsgaze.org/subscribing-to-benthams-gaze/?replytocom%3D75190#respond
https://arxiv.org/abs/1708.03778
https://www.benthamsgaze.org/2017/01/17/inaugural-lecture-zero-knowledge-proofs/#respond
https://allofus.nih.gov/
https://eprint.iacr.org/2014/764
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2017%2f12%2f13%2fa-critical-analysis-of-genome-privacy-research%2f
https://secure.gravatar.com/avatar/248e42d88c4828539a1bc2debb23f364?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/author/smurdoch/
https://www.benthamsgaze.org/2015/12/01/forced-authorisation-chip-and-pin-hitting-high-end-retailers/#comments
https://www.benthamsgaze.org/2016/01/26/
https://www.benthamsgaze.org/2015/08/20/
https://www.benthamsgaze.org/author/ibecker/
https://www.benthamsgaze.org/2016/08/23/steven-murdoch-privacy-and-financial-security/
http://discovery.ucl.ac.uk/1349987/
https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/#comment-78489
http://www.ethereum.org/
https://notoimmigrationban.com/
https://secure.gravatar.com/avatar/18aa40829947d25a6b2db7b80a20fb9f?s%3D56&%3Bd%3Dmm&%3Br%3Dg
http://www.emvco.com/about_emvco.aspx?id%3D202
https://www.benthamsgaze.org/category/operating-systems/
https://www.benthamsgaze.org/2015/10/20/george-danezis-smart-grid-privacy-peer-to-peer-and-social-network-security/#respond
https://www.benthamsgaze.org/category/networking/
https://www.prism.ucl.ac.uk/#!/?institution%3D5243
http://www.internetsociety.org/sites/default/files/eurousec2017_06_abu-salma_paper.pdf
http://people.cs.ksu.edu/~eyv/papers/latency_leak-ccs07.pdf
http://curia.europa.eu/jcms/upload/docs/application/pdf/2014-04/cp140054en.pdf
https://www.benthamsgaze.org/category/infosec/feed/
https://z.cash/
https://conspicuouschatter.wordpress.com/
http://sheharbano.com/
https://www.benthamsgaze.org/wp-content/uploads/2017/03/figure2.png
https://gist.github.com/eugenekolo/fe229be2a4230cf8322bf5537e291812
https://www.benthamsgaze.org/wp-content/uploads/2017/10/percent_events_difference_drop.png
https://www.benthamsgaze.org/2017/04/
https://www.benthamsgaze.org/wp-content/uploads/2016/08/image-20160802-428-1e8u9u8-1024x550.png
https://secure.gravatar.com/avatar/a77161b7ffca01157f5d45da3932a3cc?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2016/02/17/are-payment-card-contracts-unfair/#comments
https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/feed/
https://www.benthamsgaze.org/2016/02/09/
http://www.armourcomms.com/solutions/
https://www.benthamsgaze.org/category/malware/feed/
https://www.benthamsgaze.org/2015/03/
http://recode.net/2015/10/26/walmart-exec-anarchy-coming-in-holiday-transition-to-chip-credit-cards/
https://www.benthamsgaze.org/2017/05/13/
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/feed/
https://www.benthamsgaze.org/2017/07/25/top-ten-obstacles-along-distributed-ledgers-path-to-adoption/
https://www.youtube-nocookie.com/embed/x7pjuixkoec
http://discovery.ucl.ac.uk/1434146/1/sasse-technology-2014.pdf
https://www.benthamsgaze.org/2016/09/29/
https://www.coindesk.com/short-guide-bitcoin-forks-explained/
https://www.benthamsgaze.org/category/voting/
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2018%2f01%2f16%2fpracticing-a-science-of-security%2f
http://www.legislation.gov.uk/uksi/2009/209/regulation/62/made
https://www.petsymposium.org/2008/hotpets/udp-tor.pdf
http://www.cs.ucl.ac.uk/prospective_students/msc_information_security/
https://www.schneier.com/blog/archives/2015/05/online_dating_s.html
https://www.benthamsgaze.org/about/?replytocom%3D35971#respond
https://counter.theconversation.edu.au/content/63142/count.gif
https://www.benthamsgaze.org/2017/08/01/
https://www.benthamsgaze.org/type/video/
https://www.physics.harvard.edu/people/facpages/galison
https://www.benthamsgaze.org/2018/01/16/
http://arxiv.org/abs/1605.05077
https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/?replytocom%3D74836#respond
https://www.benthamsgaze.org/wp-content/uploads/2016/10/pic3.png
http://fc16.ifca.ai/preproceedings/25_lang.pdf
http://www.vox.com/2016/4/18/11434098/alt-right-explained
https://www.benthamsgaze.org/category/cryptography/
http://motherboard.vice.com/read/court-docs-show-a-university-helped-fbi-bust-silk-road-2-child-porn-suspects
https://www.benthamsgaze.org/wp-json/oembed/1.0/embed?url%3Dhttps%3a%2f%2fwww.benthamsgaze.org%2f2016%2f08%2f02%2fdo-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack%2f
https://eugenekolo.com/static/desert.jpg.wncry
https://www.benthamsgaze.org/2015/02/06/
https://www.benthamsgaze.org/author/jspring/
https://secure.gravatar.com/avatar/1a8ce462a151b76e544a5f3d7981d608?s%3D56&%3Bd%3Dmm&%3Br%3Dg
benthamsgaze.org//2018/01/23/smart-contracts-and-bribes/#respond
http://genomeprivacy.org
https://www.benthamsgaze.org/2015/08/20/experimenting-with-ssl-vulnerabilities-in-android-apps/#respond
https://www.youtube.com/watch?v%3Dx7pjuixkoec
https://www.forbes.com/sites/matthewherper/2011/01/05/the-first-child-saved-by-dna-sequencing/
http://mathworld.wolfram.com/hawkesprocess.html
https://www.benthamsgaze.org/2016/01/12/ace-csr-opening-event-201516-talks-on-malware-location-privacy-and-wiretap-law/
https://secure.gravatar.com/avatar/5af381d8301b755638fd97740c25b872?s%3D56&%3Bd%3Dmm&%3Br%3Dg
https://www.benthamsgaze.org/2015/10/07/gianluca-stringhini-cyber-criminal-operations-and-developing-systems-to-defend-against-them/#respond
http://www.cs.ucl.ac.uk/staff/s.murdoch/papers/oakland10chipbroken.pdf
http://senglehardt.com
https://www.benthamsgaze.org/2016/10/18/yes-we-have-no-receipts/#more-1153
https://www.benthamsgaze.org/2015/08/20/experimenting-with-ssl-vulnerabilities-in-android-apps/#more-291
http://research.microsoft.com/en-us/people/markulf/
https://qz.com/1039809/amd-shares-are-soaring-ethereum-miners-are-renting-boeing-747s-to-ship-graphics-cards-to-mines/
<iframe width="660" height="371" src="https://www.youtube.com/embed/8tJJmbTbxsE?feature=oembed" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube.com/embed/Lfen7ZOIkYw?feature=oembed" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube-nocookie.com/embed/4s4pKcggiW4" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube-nocookie.com/embed/X7pjUIxKoEc" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube.com/embed/oSnYmMHp-o8?feature=oembed" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube.com/embed/wAbKB0kaH6c?feature=oembed" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube.com/embed/1XIekTniX00?feature=oembed" frameborder="0" allowfullscreen>
<iframe width="660" height="371" src="https://www.youtube.com/embed/TY3wsqGOZ28?feature=oembed" frameborder="0" allowfullscreen>

No Malware Detected By Free Online Website Scan On This Website.

A free external scan did not find malicious activity on your website. If you still think that your website is infected with malware or hacked, please subscribe to a plan, we will scan your website internally and perform a full manual audit of your site as well as clean any infection that our free scanner didn't pick up.

Protect Your Website Now!

Is this plan for me?

website security plans and features
MalwareDomainList - domain is Clean. more info
URLhaus - domain is Clean. more info
StopBadware - domain is Clean. more info
Yandex Safebrowsing - domain is Clean. more info
Quttera Labs - domain is Clean.

"The malware entry is cached and may not reflect the current status of the domain. You can request re-consideration by Quttera malware research team."

Phishtank - domain is Clean. more info
ZeusTracker - domain is Clean. more info
Google - domain is Clean. more info

Website Firewall

Malware & blacklist removal

customers showcase

Have an idea or want to provide feedback? Welcome to our feedback & support site!

Is your website secure? Check yourself for Top 7 common website security bad practices on our Blog

Review Threat severity assessment classification

Report incorrect detection on helpdesk.quttera.com or send an email to support@quttera.com (expect a reply within 72 hrs)

Newsletter

Join our mailing list to receive free email updates

Subscribe now

Quttera Offers Free, Simple SSL Management for ThreatSign Usersn | Quttera

Blog: Quttera Offers Free, Simple SSL Management for ThreatSign Users

These days, maintaining an SSL certificate without letting it lapse is vital. The Quttera ThreatSign DNS WAF protects you against a broad range of threats and offers you free SSL management.

READ MORE

Using Quttera Web Malware Scanner Plugin to Clear WordPress Malware | Quttera

Blog: Using Quttera Web Malware Scanner Plugin to Clear WordPress Malware

The popularity of WordPress also makes it a target for attacks. Here’s how you can detect and clear WordPress malware with the Quttera Web Malware Scanner plugin.

READ MORE

Q1 2020 Quttera Web Application Firewall Statistics
 | Quttera

Blog: Q1 2020 Quttera Web Application Firewall Statistics

The Quttera Web Application Firewall guards your site against many kinds of cyberattacks, including ones that haven’t been seen yet. Here’s a look at Quttera’s Q1 2020 WAF statistics.

READ MORE



© 2020 Quttera Ltd. All rights reserved.