Jason R.C. Nurse (@jasonnurse) 's Twitter Profile
Jason R.C. Nurse

@jasonnurse

I research Cyber/HCI/Web @UniKentCyberSec & lead S&R @CybSafe; @EPSRC Rising Star; Affil. @RUSI_org @Ox_CyberSec @SPRITEPlus @WolfsonCollege; Ex. @WarwickPsych.

ID: 73149267

linkhttps://jasonnurse.github.io calendar_today10-09-2009 16:04:27

18,18K Tweet

2,2K Takipçi

754 Takip Edilen

University of Kent (@unikent) 's Twitter Profile Photo

Dr Jason R.C. Nurse, a Reader in Cyber Security in our School of Computing at the University of Kent and Institute of Cyber Security for Society, was on ITV News Meridian on Wednesday evening, discussing how fake QR codes being used to scam people in car parks and why they are becoming so prevalent 🅿️ He said: "So, QR

Dr <a href="/jasonnurse/">Jason R.C. Nurse</a>, a Reader in Cyber Security in our <a href="/UniKentComp/">School of Computing at the University of Kent</a> and Institute of Cyber Security for Society, was on <a href="/itvmeridian/">ITV News Meridian</a> on Wednesday evening, discussing how fake QR codes being used to scam people in car parks and why they are becoming so prevalent 🅿️

He said: "So, QR
The New Stack (@thenewstack) 's Twitter Profile Photo

4 Cybersecurity Misconceptions to Leave Behind in 2025 | By @cybsafe Director of Science and Research Jason R.C. Nurse thenewstack.io/4-cybersecurit…

NCSC UK (@ncsc) 's Twitter Profile Photo

Phishing makes up more than 8 in 10 cyber attacks against UK small businesses. Check your cyber security with the UK Government’s free and quick tool that instantly spots IT vulnerabilities in your systems. Check your cyber security now. checkcybersecurity.service.ncsc.gov.uk

Phishing makes up more than 8 in 10 cyber attacks against UK small businesses.

Check your cyber security with the UK Government’s free and quick tool that instantly spots IT vulnerabilities in your systems.

Check your cyber security now.

checkcybersecurity.service.ncsc.gov.uk
Binding Hook (@bindinghook) 's Twitter Profile Photo

Despite hopes, cyber insurance hasn’t driven meaningful #cybersecurity improvements. Many policies lack standardisation & focus on financial risk over holistic security measures, Rodney Adriko & Jason R.C. Nurse write. #CyberInsurance bindinghook.com/articles-hooke…

Binding Hook (@bindinghook) 's Twitter Profile Photo

A study of 68 cyber insurance applications found insurers prioritise technical controls (firewalls, encryption) over governance & incident response, share Rodney Adriko & Jason R.C. Nurse. bindinghook.com/articles-hooke…

NCSC UK (@ncsc) 's Twitter Profile Photo

BLACK BAG, the new psychological spy thriller from Steven Soderbergh set at the NCSC, is out now in cinemas. While the film is fiction, find out what we really do to keep the UK the safest place to live and work online: ncsc.gov.uk.

NCSC UK (@ncsc) 's Twitter Profile Photo

Check your cyber security with the UK Government’s free and quick tool that instantly spots IT vulnerabilities in your systems. Strengthen your organisation’s cyber security in just a few clicks. Check your cyber security now. checkcybersecurity.service.ncsc.gov.uk

Check your cyber security with the UK Government’s free and quick tool that instantly spots IT vulnerabilities in your systems.

Strengthen your organisation’s cyber security in just a few clicks.

Check your cyber security now.

checkcybersecurity.service.ncsc.gov.uk
Pint of Science UK (@pintofscience) 's Twitter Profile Photo

✨Tickets for #pint25 are now on sale!✨ 🎟Book here 👉pintofscience.co.uk 👈 🐝🧪👩‍🔬📚🔬👓🧠🐟🫀💫🥼👨‍🔬🔭🧫🦴 🗓19th-21rd May 2025 📍45+ locations across the UK 🗣400 events

NCSC UK (@ncsc) 's Twitter Profile Photo

That unexpected text is NOT from us! NCSC will NEVER contact you by SMS, WhatsApp or any other instant messaging service. If you receive a suspicious message, here’s what you can do 👇 ncsc.gov.uk/guidance/how-t…

RSA Conference (@rsaconference) 's Twitter Profile Photo

Gain knowledge to effectively secure various cloud infrastructures in the Cloud Village in the RSAC Sandbox at #RSAC 2025. Learn more. spr.ly/6014L7y2u

Gain knowledge to effectively secure various cloud infrastructures in the Cloud Village in the RSAC Sandbox at #RSAC 2025. Learn more. spr.ly/6014L7y2u
CISA Cyber (@cisacyber) 's Twitter Profile Photo

📢 Stay informed on the latest vulnerabilities with Cybersecurity and Infrastructure Security Agency's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: go.dhs.gov/wWW #Cybersecurity #InfoSec #VulnerabilityManagement

📢 Stay informed on the latest vulnerabilities with <a href="/CISAgov/">Cybersecurity and Infrastructure Security Agency</a>'s Vulnerability Bulletin &amp; gain valuable insights into emerging threats. 💡Check out the latest updates: go.dhs.gov/wWW #Cybersecurity #InfoSec #VulnerabilityManagement
National Cybersecurity Alliance (@staysafeonline) 's Twitter Profile Photo

As online scams grow more sophisticated, survivors are often left overwhelmed, isolated, and unsure where to turn for help. Join NCA and the Better Business Bureau for an important conversation on how to support those affected by scams: hubs.la/Q03hRF8R0

As online scams grow more sophisticated, survivors are often left overwhelmed, isolated, and unsure where to turn for help. Join NCA and the Better Business Bureau for an important conversation on how to support those affected by scams: hubs.la/Q03hRF8R0
NCSC UK (@ncsc) 's Twitter Profile Photo

It’s #WorldPasswordDay! Strong passwords are your first line of defence to protect your data, but don’t stop there! Boost your protection by turning on 2-step verification. Only takes a few mins to set up & stops fraudsters getting in. Learn more ⬇️ stopthinkfraud.campaign.gov.uk

It’s #WorldPasswordDay! Strong passwords are your first line of defence to protect your data, but don’t stop there!

Boost your protection by turning on 2-step verification. Only takes a few mins to set up &amp; stops fraudsters getting in.

Learn more ⬇️
stopthinkfraud.campaign.gov.uk
NCSC UK (@ncsc) 's Twitter Profile Photo

The new Code of Practice strengthens your software supply chain with 14 practical principles designed by DSIT, the NCSC and industry experts, aligned with global best practice. Learn more👇 ncsc.gov.uk/files/Software…

NCSC UK (@ncsc) 's Twitter Profile Photo

Dive into risk management strategies tailored specifically for today's advanced cyber landscape👇 ncsc.gov.uk/collection/ris…

National Cybersecurity Alliance (@staysafeonline) 's Twitter Profile Photo

Almost all websites these days push users to create accounts. This is because your data is so valuable! But every new account increases your exposure to spam, trackers, and potential data breaches. Learn how you can manage your digital footprint: hubs.la/Q03ltv_b0

Jason R.C. Nurse (@jasonnurse) 's Twitter Profile Photo

Cybercriminals are impersonating senior US officials in highly sophisticated smishing and vishing attacks that leverage state-of-the-art technology such as deepfake and generative artificial intelligence (GenAI). techradar.com/pro/security/b…