This paper reports on a design and development of a mobile game prototype as an educational tool helping computer users to protect themselves against phishing attacks. The elements of a game design framework for avoiding phishing attacks were used to address the game design issues. Our mobile game design aimed to enhance the users’ avoidance behaviour through motivation to protect themselves against phishing threats. Continue reading “Investigation of Phishing Avoidance”
Investigation of Phishing Avoidance
What We Love About Research at LERSSE
As part of Innovate (in October) 2015, LERSSE’s Kosta gave a 7-minute “edutainment” talk, explaining in a very accessible form my current research, using an example of a recent study of iPhone’s TouchID:
Findings on Touch ID in plain (British) English
My research group had a paper presented at SOUPS on the interplay between TouchID and iPhone security, which I’ve described in a recent post.
Continue reading “Findings on Touch ID in plain (British) English”
Towards strong and memorable passwords
System-generated random passwords have maximum password security and are highly resistant to guessing attacks. However, few systems use such passwords because they are difficult to remember.
Continue reading “Towards strong and memorable passwords”
Android Rooting: Methods, Detection, and Evasion
User root their Android (or jailbreak their iPhone) smartphones. They do so in order to run useful apps that require root privileges, to remove restrictions by carriers and hardware manufacturers, and to alter or remove system apps.
Continue reading “Android Rooting: Methods, Detection, and Evasion”