Ben Tudor

Ben Tudor

Security Writer


Education?

Journalism, Film and Broadcasting B.A. (Hons) Cardiff University

Postgrad Journalism NCTJ Diploma, Scottish Centre for Journalism Studies

Highlights of your career?

Whenever I broke a story that helped people right a wrong. It’s one of the most satisfying things for a journalist to do.

What malware do you hate the most?

Ransomware, especially when used to target public services and the vulnerable. It’s completely unforgivable.

What is your golden rule for cyberspace?

There’s always time to think before you click.

Favorite activities:

Mountain biking. Dinghy and keelboat racing when time allows

When did you get your first computer and what kind was it?

BBC Micro Model B hooked up to a black and white 12” CRT TV. 

Favorite computer game / activity?

Getting thrashed by my kids at Mario Kart every single time we play. They never give me a break, and now they give me driving tips whenever I take them anywhere in the car.

What titles have you worked on in the past?

I’ve worked on a lot of other titles, but these are the three that stand out for me:

Computer Reseller News UK - Features Editor

Computer Business Review - Technology Editor

ComputerActive magazine - Features Editor

 


14 articles by Ben Tudor

Privacy and Identity Protection

Is it safe to buy from Shein?

Is it safe to buy from Shein?

Privacy and Identity Protection

Is it safe to buy from Shein?

Large e-commerce platforms and their databases are always popular targets for cybercriminals.

Ben Tudor17 Mar 202612 min. read


Featured

What is ransomware, and how can you avoid falling victim to it?

What is ransomware, and how can you avoid falling victim to it?

Featured

What is ransomware, and how can you avoid falling victim to it?

Understanding the nature of ransomware and how it has evolved from the early beginnings to becoming the prime cybersecurity threat to organizations and individuals is key to working out how to prevent or reduce the impact of a successful attack.

Ben Tudor27 Feb 202617 min. read


Featured

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Featured

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Good cyber security is a foundational pillar of the new AI era, and to ensure it, we must have digital trust.

James Shepperd and Ben Tudor13 Feb 20265 min. read


Privacy and Identity Protection

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Privacy and Identity Protection

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Sneaky tools that monitor your keystrokes have been around for decades. But what are keyloggers, how do they work, and how can you find and block them?

Ben Tudor29 Jan 202612 min. read


Prevention and Awareness

How social engineering attacks work: Psychology, tactics, and real examples

How social engineering attacks work: Psychology, tactics, and real examples

Prevention and Awareness

How social engineering attacks work: Psychology, tactics, and real examples

Why cybersecurity is no longer just about code – it’s about psychology.

Ben Tudor20 Jan 202612 min. read


Prevention and Awareness

Understanding DDoS attacks: a comprehensive guide

Understanding DDoS attacks: a comprehensive guide

Prevention and Awareness

Understanding DDoS attacks: a comprehensive guide

DDoS attacks are the loud side of cybercrime – designed to flood, crash, and cripple online services. Here’s what they are, how they work, and how you can stay protected.

Ben Tudor11 Dec 202513 min. read


Endpoint Security and XDR

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

Endpoint Security and XDR

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

NOTE: The views and opinions expressed in this blogpost are those of ESET and do not necessarily reflect the views or positions of the MITRE Corporation.

Márk Szabó, James Shepperd, Ben Tudor10 Dec 20258 min. read


Privacy and Identity Protection

What to do if your Facebook account is hacked

What to do if your Facebook account is hacked

Privacy and Identity Protection

What to do if your Facebook account is hacked

How to secure and recover a hacked Facebook account with the minimum of stress.

Ben Tudor13 Nov 202511 min. read


MDR & Services

European MDR: Now a major league of its own

European MDR: Now a major league of its own

MDR & Services

European MDR: Now a major league of its own

Five years after Schrems II collapsed the US-EU Privacy Shield agreement, the market for European Managed Detection and Response (MDR) is thriving.

Ben Tudor11 Nov 20255 min. read