Security researcher slams human malware 'infection'
New research where a scientist claimed to be infected with a computer virus has been described as "nonsense".


University of Reading research in which a scientist claimed to have become the first person to be infected by a computer virus has been labeled as "nonsense" by a security expert.
Dr Mark Gasson, from the university's School of Systems Engineering, had inserted a contaminated computer chip into his hand to explore "human enhancements" and possible risks of implantable devices.
From an IT security standpoint, the study's suggestion that there are potential threats with such implants is unfounded, according to Sophos senior technology consultant Graham Cluley.
He told IT PRO that the university's department has been "very clever at getting media attention."
Humans need not be worried about the new research, Cluley said, adding that the study is simply "scaremongering".
As for why the university carried out the tests, Cluley suggested that the institution may have simply been after publicity. "Maybe the best thing for all of us to do would be to ignore them," he said.
Dr Gasson had a high-end Radio Frequency Identification chip implanted into his left hand last year and once infected the chip corrupted the main system communicating with it.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
In a statement, Dr Gasson said people need to be wary of the new threats that will come with implants.
"By infecting my own implant with a computer virus we have demonstrated how advanced these technologies are becoming and also had a glimpse at the problems of tomorrow," he added.
In a blog post, Cluley said that the chances of people or animals becoming infected with a computer virus are extremely remote.
"Frankly, I've got more chance of being flattened by a falling grand piano than I have of getting my dog virus-infected next time I take him to the vets," he added.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Why veterans can excel in data centers – and could help the IT sector address its skill shortages
In-depth Ex-military workers can bring software and hardware to civilian roles
By John Loeppky
-
LaunchDarkly to "double down" on observability with Highlight acquisition
News Highlight's observability tools will be integrated into LaunchDarkly's Guarded Releases software deployment service
By Daniel Todd
-
96% of SMBs are missing critical cybersecurity skills – here's why
News The skills shortage hits SMBs worse as they often suffer from a lack of budget and resources
By George Fitzmaurice
-
Sophos Firewall Virtual review: Affordable network protection for those that like it virtualized
Reviews Extreme network security that's cheaper than a hardware appliance and just as easy to deploy
By Dave Mitchell
-
MSPs are struggling with cyber security skills shortages
News A shortage of tools and difficulties keeping pace with solutions were also ranked as key issues for MSPs
By George Fitzmaurice
-
Nearly 70 software vendors sign up to CISA’s cyber resilience program
News Major software manufacturers pledge to a voluntary framework aimed at boosting cyber resilience of customers across the US
By Solomon Klappholz
-
Sophos and Tenable team up to launch new managed risk service
News The new fully managed service aims to help organizations manage and protect external attack surfaces
By Daniel Todd
-
Ransomware groups are using media coverage to coerce victims into paying
News Threat actors are starting to see the benefits of a more sophisticated media strategy for extracting ransoms
By Solomon Klappholz
-
Shrinking cyber attack “dwell times” highlight growing war of attrition with threat actors
News While teams are becoming more proficient at detecting threats, attackers are augmenting their strategies
By Ross Kelly
-
Cyber security in the retail sector
Whitepapers Retailers need to ensure their business operations and internal data aren't breached
By ITPro