Ransomware, part 2: The “No more ransom” project, and how to protect yourself against ransomware
Just because you’re paranoid doesn’t mean they aren’t trying to infect your computer with ransomware… Ransomware is an unpleasant and growing phenomenon. It’s a kind of malware that will encrypt the data on your computer and then demand a ransom […]
Internet of Things (IoT),Privacy,Vulnerabilities
The Internet of (Spying) Things – adult edition
Last week I wrote about Internet-enabled toys (for kids) that ended up having serious vulnerabilities (the toys, not the kids). Internet of Things, or IoT, toys have been in the news again recently, but this time the spotlight was on […]
Encryption,Security,Useful add-ons
Useful browser add-ons, part 2: HTTPS Everywhere
Communication requires a common language, in our case English. For your browser to be able to show you this blog, your browser and the computer this blog is stored on also need a common language. That language is called HTTP […]
Electronic Frontier Foundation, HTTPS Everywhere, Tor Project
Internet of Things (IoT),Vulnerabilities
On Hypponen’s law: Be smart, not vulnerable
A while back I was scrolling through my Twitter feed when I came across an interesting tweet: I have read plenty of laws, theories, and hypotheses during my time in academia, so I was well aware of the unwritten rule […]
Recent Comments