“Secure in your thoughts” – malware memories and brain passwords in the Stroke of Genius podcast

"Secure in your own thoughts" - malware memories and brain passwords in the Stroke of Genius podcast

I’m delighted to have featured in the latest episode of “Stroke of Genius”, a fascinating podcast from the IPO Education Foundation.

If you haven’t heard of the “Stroke of Genius” podcast before, here’s the blurb:

Stroke of Genius explores the most pressing questions, fascinating stories, and often-overlooked marvels that make up the world of intellectual property. From famous copyright cases to the unheard stories behind impactful inventions, each episode transports us to a different place within the landscape of human innovation.

In the episode I feature in, entitled “Secure in your own thoughts”, passwords come under the microscope and the show takes a look at how researchers are exploring ways to use brain patterns as a way to unlock devices.

Sign up to our free newsletter.
Security news, advice, and tips.

I’m on hand to describe the workings of some notorious password-stealing malware, and also share some stories of how computer games helped me get a job in the cybersecurity industry.

Megan Nadolski, the host of “Stroke of Genius”, and her team did a real great job putting the podcast together. I think you’re going to enjoy it.

Stroke of Genius S3 E4: Secure in your thoughts

If you enjoyed this, and want to hear more from me, be sure to subscribe to the “Smashing Security” podcast, the weekly show I co-host with Carole Theriault and a wide variety of guests.

Found this article interesting? Follow Graham Cluley on Twitter or Mastodon to read more of the exclusive content we post.


Graham Cluley is a veteran of the cybersecurity industry, having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows. Now an independent analyst, he regularly makes media appearances and is an international public speaker on the topic of cybersecurity, hackers, and online privacy. Follow him on Twitter, Mastodon, Bluesky, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.