Bruce P. Burrell

Bruce P. Burrell

Research Fellow


Education: I highly recommend it.

Position: Security researcher

Most-loathed malware: Whatever afflicts the customer

Golden Rule: Never open attachments or links in unsolicited email (or IMs, or whatever), even when they appear to be from those you know and trust; Silver Rule: Protect your privacy!

First computer: Digi-Comp     


5 articles by Bruce P. Burrell

Scams

I Still Didn’t See What You Did

I Still Didn’t See What You Did

Scams

I Still Didn’t See What You Did

More advice for detecting and avoiding sextortion scams

Bruce P. Burrell21 Mar 201911 min. read


Scams

I didn't see what you did, redux

I didn't see what you did, redux

Scams

I didn't see what you did, redux

Cyberblackmail/sextortion again raises its not-so-pretty little head

Bruce P. Burrell19 Mar 20199 min. read


Scams

I saw what you did...or did I?

I saw what you did...or did I?

Scams

I saw what you did...or did I?

It might seem legit but there are several reasons why you should not always hit the panic button when someone claims to have your email password

Bruce P. Burrell26 Jul 20183 min. read


Back to university: cybersecurity now a major concern in higher education

Back to university: cybersecurity now a major concern in higher education

Back to university: cybersecurity now a major concern in higher education

Cybersecurity topics and panels were rated one of the “6 Best Things” at the recent Campus Tech conference, in Boston.

Bruce P. Burrell19 Aug 20152 min. read


Less Technical

Criminals target school data: top 10 security measures for educational institutions

Criminals target school data: top 10 security measures for educational institutions

Less Technical

Criminals target school data: top 10 security measures for educational institutions

Every educational institution should be aware that cyber criminals make money by stealing personal information and selling it on the black market to other criminals who turn the data into cash through a range of fraudulent schemes. Here are ten security measures schools should take to defend against this type of data crime.

Bruce P. Burrell03 Jul 20147 min. read