Davey Winder
Davey is a three-decade veteran technology journalist specialising in cybersecurity and privacy matters and has been a Contributing Editor at PC Pro magazine since the first issue was published in 1994. He's also a Senior Contributor at Forbes, and co-founder of the Forbes Straight Talking Cyber video project that won the ‘Most Educational Content’ category at the 2021 European Cybersecurity Blogger Awards.
Davey has also picked up many other awards over the years, including the Security Serious ‘Cyber Writer of the Year’ title in 2020. As well as being the only three-time winner of the BT Security Journalist of the Year award (2006, 2008, 2010) Davey was also named BT Technology Journalist of the Year in 1996 for a forward-looking feature in PC Pro Magazine called ‘Threats to the Internet.’ In 2011 he was honoured with the Enigma Award for a lifetime contribution to IT security journalism which, thankfully, didn’t end his ongoing contributions - or his life for that matter.
You can follow Davey on Twitter @happygeek, or email him at davey@happygeek.com.
Latest articles by Davey Winder
![A black and white hand outstretched, beneath five white asterisks representing a hacker seizing a password. Both are set against a solid red background.](https://cdn.mos.cms.futurecdn.net/v274Th96q48snC6N7CoQVo-320-80.jpg)
Hacking is not a crime, criminal activity is
By Davey Winder published
Opinion We need to be clearer about the difference between hacking and cyber crime
![The ChatGPT and OpenAI logo on a smartphone in front of stocks and shares data on a big screen](https://cdn.mos.cms.futurecdn.net/pchqFFrNuFZQYDgmhQS7xZ-320-80.jpg)
Tools like ChatGPT will boost cyber crime and cyber security equally
By Davey Winder published
Opinion Like all tools, generative AI services like ChatGPT or GPT-4 can be used to do harm, or prevent it
![The Mastodon drawing with illustrations on a phone screen in front of a wall of Twitter logos to demonstrate Twitter vs Mastodon](https://cdn.mos.cms.futurecdn.net/TuoQ2c7rE3NDpYPS9nedhZ-320-80.jpg)
Mastodon vs Twitter
By Davey Winder published
In-depth If you’re thinking about leaving Elon Musk’s Twitter for Mastodon, there are several privacy-related issues to bear in mind
![A cyber criminal using a laptop, with a close-up of their hands on the keyboard](https://cdn.mos.cms.futurecdn.net/QiKYok3J9ymuxFszVLW8CM-320-80.jpg)
There's only one way to avoid credential stuffing attacks
By Davey Winder published
Opinion PayPal accounts were breached last year due to a credential stuffing attack, but can PayPal avoid taking responsibility?
![A cybersecurity expert examines an attack](https://cdn.mos.cms.futurecdn.net/o4sTtCMXCug5SJJav5HyzL-320-80.jpg)
What is attack surface management?
By Davey Winder published
In-depth Instigate attack surface management to anticipate where cyber attackers might strike and avoid falling prey
![Somebody typing at their computer with a digital padlock and other illustrations](https://cdn.mos.cms.futurecdn.net/GjG7G9PWu8nsh3iPm6pGfL-320-80.jpg)
What is spell-jacking?
By Davey Winder published
In-depth Spell-jacking vulnerabilities are threatening to unwittingly leak data to third parties, undermining any drive to protect privacy
![A cyber security researcher at their desk](https://cdn.mos.cms.futurecdn.net/dXT8s6c5LBeXubNquhNhG5-320-80.jpg)
Lab-based cyber attacks are no serious threat – yet
By Davey Winder published
Opinion There’s no need to fret when it comes to research-based cyber security threats, but the future is a different matter
![Open padlock on circuit board](https://cdn.mos.cms.futurecdn.net/G3hDdZ7EVEA5669KdffBPQ-320-80.jpg)
How to react to a data breach
By Davey Winder last updated
In-depth Every business should have a data breach response plan, but when building one it can be difficult to know where to start
![An anonymous mobile phone user using their device in a darkened room](https://cdn.mos.cms.futurecdn.net/dunZGYN9Pny39MvC8xZM3h-320-80.jpg)
The rising tide of no-hook phishing
By Davey Winder published
In-depth Not all phishing attacks rely on links or attachments, which means you’ll have to be extra careful
![Graphic with hexagonal tiles with a lockpad and one tile with an unlocked lock pad against a red background](https://cdn.mos.cms.futurecdn.net/X9qzJZJN2242YseoDoj9cF-320-80.jpg)
Six cyber security holes you need to plug now
By Davey Winder last updated
In-depth We shine a light on the easily overlooked cyber cracks that can turn into major sinkholes exposing your business
![A greyscale hand emerging from a hole, removing a password string, against a blue background](https://cdn.mos.cms.futurecdn.net/tnGuFCY2FyEpSeUB67FPs3-320-80.jpg)
The sooner the FIDO Alliance can shut down passwords, the better
By Davey Winder published
Opinion Passwords aren’t going anywhere, but that hasn’t stopped the dream of a passwordless future – and it seems that Apple, Google and Microsoft agree
![Female IT programmer working on a desktop computer in data centre](https://cdn.mos.cms.futurecdn.net/pXCbVvNzHjKfG3wFAC6vS9-320-80.jpg)
Google’s Project Zero is frightening and reassuring in equal measure
By Davey Winder published
Opinion This crack team of security researchers are doing work we should all be grateful for
![The Brave browser icon in the background behind somebody using their phone](https://cdn.mos.cms.futurecdn.net/WY2kQC7Y2DEcnpntCVbY79-320-80.jpg)
Brave pushes the boundaries of privacy by design
By Davey Winder published
Opinion It’s quite a big step to abandon the big three of Chrome, Edge and Safari for a niche option that doesn’t just tack privacy on top
![Smartphone scanning a QR code](https://cdn.mos.cms.futurecdn.net/rcbHy6iRh4awtGVREXtGmN-320-80.jpg)
QR codes are just as insecure as anything else
By Davey Winder published
Opinion A browser locked down tighter than a duck’s derriere won’t save you from phishing attacks – but getting to grips with the latest advice and best practice might
![A smartphone on a keyboard showing the Gmail loading screen](https://cdn.mos.cms.futurecdn.net/krXJNtLp7gw8L8WYHtA3Pe-320-80.jpg)
How secure is Gmail?
By Davey Winder published
Tutorials The practical steps you should take to secure your Gmail account, from implementing 2FA to performing regular checkups
![Several anonymous faces imposed with binary to represent privacy](https://cdn.mos.cms.futurecdn.net/jsQoshWtfv7teYLS92r6jj-320-80.jpg)
Using Google Takeout to reclaim your data
By Davey Winder published
In-depth Everyone knows your data drives the Google machine, but now you can find out exactly what it holds on you
![Graphic of a hacker walking through a digital corridor](https://cdn.mos.cms.futurecdn.net/qU6bvC48443qckkHxmMnZK-320-80.jpg)
Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive
By Davey Winder published
Opinion So, you want to be a hacker? We share the best advice and resources for getting started
![Visual representation of an active botnet, with several black nodes connected with white strands](https://cdn.mos.cms.futurecdn.net/JxRDcV87vvv46xd3hkohXc-320-80.jpg)
DDoS attacks are still a key weapon for corporate extortion
By Davey Winder published
In-depth Ransomware isn’t the only rotten fruit, with DDoS attacks deployed both as an extra twist of the knife – and on their own
![Sticky notes on a monitor displaying assorted passwords](https://cdn.mos.cms.futurecdn.net/XFRQM6qBWrpukkeoV7Bq8A-320-80.jpg)
Skip the three words thing, go straight for the ‘use a password manager, dammit’ jugular
By Davey Winder published
Opinion Why you can do so much better than the three-random-word rule that’s still being churned out by the NCSC
![Facebook for Business](https://cdn.mos.cms.futurecdn.net/TRKWuQbThDcNQ67soEkdKA-320-80.jpg)
Facebook for business: know the risks
By Davey Winder published
In-depth The social media giant has some great features for businesses, but there are hazards too
![An abstract image showing a person trying to connect to a computer which has a large padlock attached to it, as a ghost wearing a fedora floats menacingly out of it and demands money](https://cdn.mos.cms.futurecdn.net/AHDbcoXesrzEQiGzfnWBCn-320-80.jpg)
The truth about ransomware
By Davey Winder last updated
In-depth Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
![Abstract image showing a Wi-Fi logo on a cyber security background](https://cdn.mos.cms.futurecdn.net/vU3Q6fpLGHTKmQt9WnpkYZ-320-80.jpg)
Secure your Wi-Fi against hackers in 10 steps
By Davey Winder last updated
In-depth Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
![Cyber security automation mockup](https://cdn.mos.cms.futurecdn.net/SH5RnQGPYn8N4DQPzkkFS4-320-80.jpg)
What is NoOps?
By Davey Winder published
In-depth There are numerous approaches to in-house development; we explore one that focuses squarely on efficiency
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.