Mike Cooper

Mike Cooper
Michael has more than ten years of experience in software and IT security, as both a practitioner (Security Officer) and a consultant. His current role at Security Innovation is to continually improve and successfully deliver the company’s Managed Application Security Testing (MAST) service to clients that need a multi-tiered solution for their enterprise application assessment program.
Find me on:

Recent Posts

Most people connect IoT (Internet of Things) devices to their wireless or wired network without worrying too much about security implications – after all, if the device is behind a firewall it must be reasonably safe...

Cross-site scripting (XSS) is a security vulnerability allowing a user to alter the code that an application delivers to a user which is executed in the user’s web browser. It is most commonly found in web applications...

Social Engineering on the Silver Screen

by Mike Cooper on November 18, 2014 at 9:01 AM

Social engineering stories have captured attention on the silver screen for years, including one of the oldest forms of the social engineer: the con man. Moviegoers revel in the suspense and clever trickery, and are divided...

Square Cash is a new service that allows individuals to send and receive cash via email (simply and easily). This comes from the company that brought merchant credit card processing to mobile devices with a credit card...

Evolution of Touch ID

by Mike Cooper on October 21, 2013 at 9:36 AM

After my previous blog post about the potential benefits and drawbacks that one may experience using Apple’s new Touch ID fingerprint technology, I thought it might be time to revisit the topic following some additional...

Touch ID: Security Bane or Boon?

by Mike Cooper on September 20, 2013 at 10:37 AM

Following the usual hubbub and fervor surrounding an Apple product keynote, I expected there to be some reaction to the new Touch ID feature of the iPhone 5S- especially in light of recent privacy violations conducted by...

As a victim of identity theft myself, I find it disappointing to see another example of the ugly part of technology innovation and what it can do when put in the hands of non-productive sociopaths of society. I also find it...

Life's a Breach

by Mike Cooper on August 23, 2013 at 11:53 AM

The top data breaches of 2013

While the music industry as a whole flails about with an identity crisis and its fingers in its ears as to how music fans want to hear their tunes and spend their money, Jay-Z and Samsung tried to showcase how “with it” they...

Small and Medium sized Businesses (SMB) seem to be in the crosshairs of many different security focused hunters- the number of attacks that target businesses with less than 250 employees has been growing over the past few...