Tony Anscombe

Tony Anscombe

Chief Security Evangelist


Education: Cobol and Fortran programming, it was a long time ago.

Highlights of your career: Appearing on the BBC News, the live appearance was regarding an article about a hacker that was 12 years old and stealing game data. The cool part was that it remained the number one article on the BBC News app for four days, it seemed that just about everyone I know saw it! The only thing that could top this is to be on Good Morning America or on the BBC Breakfast sofa.

What malware do you hate the most: Potentially unwanted applications, deceiving consumers and destroying their computer is wrong.

Favorite activities: Motorbikes, cycling, concerts and family (not in that order).

What is your golden rule for cyberspace: Don’t get sucked in and addicted to the world of social media, and never post pictures of food.

When did you get your first computer, favorite computer game/activity: My first computer was a Sinclair ZX81 Spectrum, back around 1983/4. It was my first introduction to programming and inspired me to go to college and learn how to code. As for a favorite game, my son and I play two games frequently, Driver (Xbox) and Fifa (PS4), it is a very competitive pastime and not good for my blood pressure.


99 articles by Tony Anscombe

Digital Security

Anti-Malware testing needs standards, and testers need to adopt them

Anti-Malware testing needs standards, and testers need to adopt them

Digital Security

Anti-Malware testing needs standards, and testers need to adopt them

A closer look at Anti-Malware tests and the sometimes unreliable nature of the process.

Tony Anscombe13 Apr 20184 min. read


Mobile World Congress: Introducing 5G

Mobile World Congress: Introducing 5G

Mobile World Congress: Introducing 5G

If we look back at previous incarnations of mobile networks, 1G, 2G and so on, there have been major changes to the technology. The next generation, 5G, delivers greater speed and lower latency, but also has the advantage of being able to connect many more devices concurrently.

Tony Anscombe01 Mar 20183 min. read


ESET research

Privacy by Design: Can you create a safe smart home?

Privacy by Design: Can you create a safe smart home?

ESET research

Privacy by Design: Can you create a safe smart home?

The Internet of Things (IoT) can be a network of connected convenience but this should not come at the expense of safeguarding your privacy and the personal data that connected devices collect and share.

Tony Anscombe26 Feb 20183 min. read


Privacy

Blockchain Hardened devices: Can they restore privacy with security by design?

Blockchain Hardened devices: Can they restore privacy with security by design?

Privacy

Blockchain Hardened devices: Can they restore privacy with security by design?

These developments show that security technology is now keeping up, or outpacing other technological and regulatory developments. Thus, while users’ wants often continue to trump their appreciation of risk, the industry has responded and in many cases gotten ahead of popular demand.

Tony Anscombe13 Feb 20186 min. read


Privacy

Trends 2018: Personal data

Trends 2018: Personal data

Privacy

Trends 2018: Personal data

The new age of technology and legislation brings safety concerns for your personal data

Tony Anscombe18 Jan 20186 min. read


Digital Security

What does revoking Net Neutrality mean for security?

What does revoking Net Neutrality mean for security?

Digital Security

What does revoking Net Neutrality mean for security?

Imagine the scenario where an Internet Service Provider (ISP) allows a security company providing malware protection the option to pay for their traffic to be prioritized and a lower the priority level imposed on all other providers.

Tony Anscombe21 Dec 20172 min. read


Privacy

Why we should fight for Net Neutrality

Why we should fight for Net Neutrality

Privacy

Why we should fight for Net Neutrality

Granting ISPs the right to shape traffic, allowing for some traffic to be prioritized due to a commercial agreement, may have a negative effect on the outcome of using the service for both the consumer and the company providing the service.

Tony Anscombe19 Dec 20173 min. read


Cryptocurrency in kilowatt hours: Counting the costs of anonymous transactions

Cryptocurrency in kilowatt hours: Counting the costs of anonymous transactions

Cryptocurrency in kilowatt hours: Counting the costs of anonymous transactions

The energy costs are not the only charges in a transaction: the bitcoin network itself levies a charge which, according to a blog from Valve, the gaming provider behind the Steam network, has skyrocketed from $0.20 in 2016 to $20 per transaction today

Tony Anscombe12 Dec 20174 min. read


Cybercrime

Keyless convenience or security risk? Car theft in action

Keyless convenience or security risk? Car theft in action

Cybercrime

Keyless convenience or security risk? Car theft in action

Exactly how does the attack work and is it expensive to create? The attack, while seeming to be technology voodoo, is actually rather simple. It requires a transmitting relay near the key and a second relay near the car to receive the relayed signals and mimic the key.

Tony Anscombe29 Nov 20174 min. read