News

Investigation of Phishing Avoidance

phishing_studyThis paper reports on a design and development of a mobile game prototype as an educational tool helping computer users to protect themselves against phishing attacks. The elements of a game design framework for avoiding phishing attacks were used to address the game design issues. Our mobile game design aimed to enhance the users’ avoidance behaviour through motivation to protect themselves against phishing threats.  Continue reading “Investigation of Phishing Avoidance”

What We Love About Research at LERSSE

As part of Innovate (in October) 2015, LERSSE’s Kosta gave a 7-minute “edutainment” talk, explaining in a very accessible form my current research, using an example of a recent study of iPhone’s TouchID:

Continue reading “What We Love About Research at LERSSE”

Findings on Touch ID in plain (British) English

My research group had a paper presented at SOUPS on the interplay between TouchID and iPhone security, which I’ve described in a recent post.

Continue reading “Findings on Touch ID in plain (British) English”

Towards strong and memorable passwords

System-generated random passwords have maximum password security and are highly resistant to guessing attacks. However, few systems use such passwords because they are difficult to remember.
surpass Continue reading “Towards strong and memorable passwords”

Android Rooting: Methods, Detection, and Evasion

User root their Android (or jailbreak their iPhone) smartphones. They do so in order to run useful apps that require root privileges, to remove restrictions by carriers and hardware manufacturers, and to alter or remove system apps.
rooting_methods Continue reading “Android Rooting: Methods, Detection, and Evasion”