Ben Tudor

Ben Tudor

Security Writer


Education?

Journalism, Film and Broadcasting B.A. (Hons) Cardiff University

Postgrad Journalism NCTJ Diploma, Scottish Centre for Journalism Studies

Highlights of your career?

Whenever I broke a story that helped people right a wrong. It’s one of the most satisfying things for a journalist to do.

What malware do you hate the most?

Ransomware, especially when used to target public services and the vulnerable. It’s completely unforgivable.

What is your golden rule for cyberspace?

There’s always time to think before you click.

Favorite activities:

Mountain biking. Dinghy and keelboat racing when time allows

When did you get your first computer and what kind was it?

BBC Micro Model B hooked up to a black and white 12” CRT TV. 

Favorite computer game / activity?

Getting thrashed by my kids at Mario Kart every single time we play. They never give me a break, and now they give me driving tips whenever I take them anywhere in the car.

What titles have you worked on in the past?

I’ve worked on a lot of other titles, but these are the three that stand out for me:

Computer Reseller News UK - Features Editor

Computer Business Review - Technology Editor

ComputerActive magazine - Features Editor

 


16 articles by Ben Tudor

Featured

RFID blocking explained: The verdict, the science, and what actually protects you

RFID blocking explained: The verdict, the science, and what actually protects you

Featured

RFID blocking explained: The verdict, the science, and what actually protects you

RFID blocking products promise protection from contactless theft - but do you really need one?

Ben Tudor 28 Apr 2026 18 min. read


Device Protection

What is a trojan horse attack, and what should I do if I think I’ve opened a trojan?

What is a trojan horse attack, and what should I do if I think I’ve opened a trojan?

Device Protection

What is a trojan horse attack, and what should I do if I think I’ve opened a trojan?

Part social engineering, part sneaky payload, trojans are popular with attackers because they’re powerful, flexible tools for compromising victims. Here’s what to look for – and simple steps to avoid falling for them.

Ben Tudor 16 Apr 2026 13 min. read


Privacy and Identity Protection

Is it safe to buy from Shein?

Is it safe to buy from Shein?

Privacy and Identity Protection

Is it safe to buy from Shein?

Large e-commerce platforms and their databases are always popular targets for cybercriminals.

Ben Tudor 17 Mar 2026 12 min. read


Featured

What is ransomware, and how can you avoid falling victim to it?

What is ransomware, and how can you avoid falling victim to it?

Featured

What is ransomware, and how can you avoid falling victim to it?

Understanding the nature of ransomware and how it has evolved from the early beginnings to becoming the prime cybersecurity threat to organizations and individuals is key to working out how to prevent or reduce the impact of a successful attack.

Ben Tudor 27 Feb 2026 17 min. read


Featured

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Featured

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Good cyber security is a foundational pillar of the new AI era, and to ensure it, we must have digital trust.

James Shepperd and Ben Tudor 13 Feb 2026 5 min. read


Privacy and Identity Protection

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Privacy and Identity Protection

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Sneaky tools that monitor your keystrokes have been around for decades. But what are keyloggers, how do they work, and how can you find and block them?

Ben Tudor 29 Jan 2026 12 min. read


Prevention and Awareness

How social engineering attacks work: Psychology, tactics, and real examples

How social engineering attacks work: Psychology, tactics, and real examples

Prevention and Awareness

How social engineering attacks work: Psychology, tactics, and real examples

Why cybersecurity is no longer just about code – it’s about psychology.

Ben Tudor 20 Jan 2026 12 min. read


Prevention and Awareness

Understanding DDoS attacks: a comprehensive guide

Understanding DDoS attacks: a comprehensive guide

Prevention and Awareness

Understanding DDoS attacks: a comprehensive guide

DDoS attacks are the loud side of cybercrime – designed to flood, crash, and cripple online services. Here’s what they are, how they work, and how you can stay protected.

Ben Tudor 11 Dec 2025 13 min. read


Endpoint Security and XDR

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

Endpoint Security and XDR

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

NOTE: The views and opinions expressed in this blogpost are those of ESET and do not necessarily reflect the views or positions of the MITRE Corporation.

Márk Szabó, James Shepperd, Ben Tudor 10 Dec 2025 8 min. read