Wana Decrypt0r (Wanacry Ransomware) – Computerphile
June 3rd, 2020 | ๐
iSpeech.org $300 or your files are toast: Dr Pound takes a look at the latest ransomware to be doing the
June 3rd, 2020 | ๐
iSpeech.org $300 or your files are toast: Dr Pound takes a look at the latest ransomware to be doing the
April 13th, 2019 | ๐
https://www.ispeech.org/text.to.speech The UK's Government Communications Headquarters deal in classified material, but how to decide if a computer is secure? -
April 13th, 2019 | ๐
https://www.ispeech.org/text.to.speech Secure WiFi is broken - Dr Mike Pound & Dr Steve Bagley on the Krack Attack discovered by researchers
April 7th, 2019 | ๐
Text to Speech Malware comes in many shapes and sizes, here's an overview of how some of it works. Enrico
January 16th, 2018 | ๐
iSpeech Just what are elliptic curves and why use a graph shape in cryptography? Dr Mike Pound explains. Mike's myriad
December 15th, 2017 | ๐
iSpeech.org How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us
June 15th, 2016 | ๐
iSpeech Just how bad is it if your site is vulnerable to an SQL Injection? Dr Mike Pound shows us
June 1st, 2016 | ๐
TTS Demo Cookie Monster isn't the only one fond of cookies - thieves on the Internet are partial too. Dr
July 22nd, 2014 | ๐
Text to Speech Voices Spies used to meet in the park to exchange code words, now things have moved on
December 18th, 2013 | ๐
iSpeech.org Audible free book: JavaScript is dangerous! Why? How are websites vulnerable to it? Find out about bug-bounties from Tom.
October 23rd, 2013 | ๐
iSpeech Audible free book: http://www.audible.com/computerphile JavaScript is dangerous! Why? How are websites vulnerable to it? Find out about bug-bounties from
October 9th, 2013 | ๐
Text to Speech Voices Websites can still be hacked using SQL injection - Tom explains how sites written in PHP
Gloss