Ian Sutherland, Author at Ian Sutherland | Page 7 of 7
Ian Sutherland

Author Archives: Ian Sutherland

Ian Sutherland is a British crime thriller author. Leveraging his career in the IT industry, Ian’s thrillers shine light on the threats we face from cybercrime as it becomes all too prevalent in our day-to-day lives. Ian lives in London.

How I created an authentic flawed hero for my novel while dodging cliches and stereotypes

Hackers in movies these days are ultra-cool. Everyone wants to be like them. Geek is now chic. But it’s so unrealistic. How can someone who spends the majority of their time interacting via a computer develop such mature social skills. And even if they somehow did, a real hacker would never make the time needed to shop for the latest fashions, exfoliate their skin every morning, go to the hairdressers for a beard trim and, worst of all, put up with a fashion model for a long-term girlfriend.

Continue reading

IP Address Tracing is Not As Easy as Dan Brown Makes Out

IP address tracing

Today, I’ve been reading Dan Brown’s latest thriller, Inferno. In the early part of the book the bad guys, trying to track down the hero whom they know is hiding somewhere in Florence, spot that he has just remotely accessed his email account based in the USA. They obtain the IP address of the computer […]

Continue reading

Is Your Cellphone Voicemail Still Wide Open?

phone hacking scandal milly dowler news of the world journalists

There is a scene in my novel where I needed the protagonist, a computer hacker called Brody, to gain access to someone else’s mobile phone voicemail.  Like most people, I remember the July 2011 phone hacking scandal that brought down the News of the World.  So, at the time of writing the scene in the […]

Continue reading

Anonymous Banking for Cybercriminals

Black hat hackers do what they do for a variety of reasons.  Some do it for the fun of the challenge.  Some to enhance their status amongst their peers.  Some to deliberately cause chaos.  And then there’s the majority, who do what they do to make money.  But if you’re a cybercriminal, how do you […]

Continue reading

Is Ethical Hacking Actually Ethical or even Legal?

There are three main generally accepted categories of hacker, each represented by a hat of a different colour: white, grey and black. All of them exploit weaknesses in computer systems and networks. The differences between them are their motivations. The most infamous are the black hat hackers, computer criminals epitomised by Hollywood, whose malicious activities serve their […]

Continue reading

How to Practise Safe Java

While writing my novel Invasion of Privacy, where the main protagonist is a computer hacker, I discovered that hackers like Java. No, more than that, they love Java. And the reason is simple, its security is like Swiss Chess. Full of holes.

Continue reading
1 5 6 7