Enter the maze

Last One In, 2017

Contactless Card Security & Relay Attacks

Credit card in back pocket i-Pickpocket

DNA attacks and Buffer Overflow

DNA JIGSAW Hacking DNA

Understanding hackers

honey streaming on to a spoon The Cyber-Security Honeypot

A short story about Phishing

a path through a forest You are what you know

Privacy and Metadata

cat face I know where your cat lives

Privacy and Phone Metadata

cat face Track Malte Spitze [EXTERNAL]

Privacy and Personal Data

crystal ball Crystal ball coupons

Privacy and Databox

databox logo Keeping a lid on your data

Cybersecurity at the Movies

Rogue One poster Rogue one Authentication

Mentalism Magic and Binary

male mentalist Just Between the two of us

More Mentalism Magic

female mentalist Cards on your mind

Yet More Mentalism Magic and Computing

female mentalist Mentalism Portal

History, Ciphers, steganography and Binary

writing in old book Hiding in Elizabethan Binary

History, Ciphers and steganography

writing in old book A poem to contemplate

History, Ciphers and Steganography

writing in old book Bacon the Polymath

Spear Phishing and Man-in-the-middle attacks

Wifi pirates flag Piracy on the open Wi-fi

Ransomware

keyboard controling world Wannacry

Passwords and Entropy

cartoon: Randall Munroe, xkcd.com https://xkcd.com/936 - reprinted under a CC Attribution-NonCommercial 2.5 License Password Strength

Face Recognition and Privacy

A gridded face How to Vanish

GPS Security

a satellite Pokemon Lost

Technology in the Home

a child asleep Back (page) under the duvet

Fail Secure Security

Guardians of the Galaxy Poster Guardians of the Galaxy

What being a professional is really like

Shauna COnconnon The Real Pros

Women in Software Engineering and Human Computer Interaction

Lemons Lemons Linking 41 Shades of Blue

Women and Cyber Security

Cows in a field Felony Fighting Females

Women in Astronomy and Computing

Star exploding The Life of a Star

Women in Space Exploration

full moon Hidden Figures

Women in Machine Learning

Hand gestures Machines Inventing Musical Instruments

Women in Swarm Engineering

A murmuration of Starlings Sabine Hauert: Swarm Engineer

Women in Ubiquitous Computing

Conference room chairs Your Chair is Watching You

Women Modelling Cell Biology

Colourful cancer cells Executable Biology

Women in Computer Music

purple musical notes Just Sublime!

Women in Natural Language Processing and Machine Learning

Heartbeat EKG Sameena Shah: News from Twitter

Women in Digital Signal Processing

Heartbeat EKG Ingrid Daubechies: wiggly lines helping catch crime

Women in Computer Vision

A wire mesh face Lourdes Agapito: 3D models in motion

Women in Human-Human Interaction

Cocktail glasses Kavin Narasimhan: Understanding Parties

Women in Computing / Architecture

Cows in a field Sophie Wilson: Where would feeding cows take you?

Robots and the environment

Bee Eco Warier Drone Bees

The Ancient History of Compression Algorithms

roman with thumb up Tiro Compressing Text in Ancient Rome

Cyber Security at the Movies

Stormtroopers Rogue One (Part I: Physical Security)

Duplicating Dynamo's domino demonstration

Dominos Magic with dominos and reskinning code

Last One In, 2016

The Fittest Slogans Survive

Big fish eating smaller fish Creating slogans by natural selection

The movie star, the player piano and the torpedo

A woman with mobile phone and cityscape body Hedy Lamarr: her contribution to computing

I wandered lonely as a mass of dejected vapour

A fluffy cloud Computers as poets

Solving problems you care about

A red bus headlight School students work with physical computing

Christopher Strachey

gay pride flag Flamboyant wizard programmer

The first digital music

Rainbow music Pioneer with a flourish

Christopher Strachey and the secret of being a Wizard Debugger

Error flow chart Explain code to debug it

Last One In, 2015

Last One In, 2014

Last One In, 2013

Last One In, 2011