Encryption makes the world less scary, not more. (Or, Why not to weaken encryption.)
Every now and then some politician, leader, or other Person-Who-Hasn’t-Quite-Bothered-Looking-Into-It argues that we would all be safer if we would just weaken encryption. A common argument is that this is necessary so that police can intercept encrypted messages sent between Bad Guys. As […]
What is two-step verification? (And why you should use it.)
And now for something completely different: how to quickly and easily improve the security of your online accounts. (Spoiler alert: use two-step verification.) (The problem with) passwords We commonly use passwords to log on to our various online accounts. That […]
Phishing,Ransomware,Shadow Brokers,Vulnerabilities
On the WannaCry ransomware attack (Part 1, presumably…)
Last Friday the world was thrown smack-dab into the middle of its biggest-ever “cyber attack.” Popular as the term is, let’s stay clear of the word cyber and call it what it was: ransomware. Here’s a summary of the weekend’s […]
Internet of Things (IoT),Privacy
Spying… headphones?
The notion that headphones are something used solely to listen to content with seems one-sided and archaic. At least according to manufacturer Bose, who has been accused of using their headphones and related app to spy on their customers listening […]
Data breach,Security,Shadow Brokers,Vulnerabilities
The NSA keeps vulnerabilities a secret – and the Shadow Brokers sell them
You can find all kinds of unusual things on the Internet. But last August something… unusually unusual popped up. A group calling themselves the Shadow Brokers announced that they would be auctioning off cyber weapons to the highest bidder. What’s […]
Recent Comments