Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Phobos ransomware uses RDP to get onto Windows computers. Learn how to make sure your network is protected against it.
By Stephen Cooper in Net Admin on March 25, 2024
WastedLocker attacks in a wave, released around the world, hitting significant corporations. However, it can be stopped.
By Stephen Cooper in Net Admin on September 20, 2023
CryptoLocker ransomware pointed the way for other hacker malware. Find out more about this classic ransomware.
By Stephen Cooper in Net Admin on September 25, 2024
BadRabbit ransomware has similarities to the more famous WannaCry and NotPetya. Are they the same? Find out.
By Stephen Cooper in Net Admin on September 20, 2023
Ransomware presents a serious threat to businesses and a big inconvenience to individuals. Find out about one of the worst attacks – Sodinokibi.
By Stephen Cooper in Net Admin on October 30, 2024
NetWalker ransomware is the product of a large cybercrime organization. Find out how to block it.
By Stephen Cooper in Net Admin on June 12, 2024
Jigsaw ransomware created global mayhem in a series of attack cycles. This horror might rise from the dead once more, so you need to be protected.
By Stephen Cooper in Net Admin on February 23, 2024
Locky ransomware will encrypt your important files and hold them hostage. Find out how to protect your system from this malware.
By Stephen Cooper in Net Admin on September 11, 2024
GoldenEye is a version of Petya ransomware. Find out if this malware could be a threat to your business.
By Stephen Cooper in Net Admin on April 24, 2024
Page 28 of 63