Posts tagged "Security"

The Internet's Own Boy: A movie everyone online should see

The Internet’s Own Boy is a documentary about computer prodigy, Internet pioneer, and activist hacker Aaron Swartz, but even if you’ve never heard of Aaron Swartz you should see this movie. The story has implications beyond the short life of one man. Through the passion, drama, and tragedy of Aaron Swartz’s life The Internet’s Own... Read more »

An airport security poem based on Jabberwocky by Lewis Carroll

For all of you who will be traveling on airplanes this summer here is a little poem about the TSA screening process and airport security. Sadly, it is still applicable years after I first wrote it. #200119491-002 / gettyimages.com Scaerrorwocky (Based on Jabberwocky by Lewis Carroll) ‘Twas boardtime and the Ti Assay Did screem the... Read more »

What is the Heartbleed bug, and what should you do about it?

Do you use the Internet? Congratulations, your data has been vulnerable for about 2 years and is even more vulnerable now that the Heartbleed bug has been revealled publicly. Until web sites patch this OpenSSL vulnerability that little lock and https that you’ve been taught will keep your data safe as it travels across the... Read more »
Advertisement:

25 most used passwords of 2013: Have people lost faith in Jesus?

SplashData has released their annual list of the “worst passwords” based on which passwords appeared most frequently in password files obtained by hackers. As an information security specialists these lists always make me feel happy about my job security but also despondent about how security awareness efforts still aren’t changing the behaviors of many computer... Read more »

Lesson from Target data breach: Don't shop with your debit card

Lesson from Target data breach: Don't shop with your debit card
The most shocking thing to me about the recent Target data breach was not that it happened. Although the scope of the Target breach is extraordinary, I am always aware of the risks of using credit cards. I used to manage a Payment Card Industry Data Security Standard (PCI DSS) compliance program. I understand the... Read more »

How to steal a fingerprint

How to steal a fingerprint
Apple announced that the new iPhone will include TouchID to allow users to make purchases by identifying themselves with a fingerprint. Sounds great, right? But while biometrics (such as fingerprints, palm prints, and retina scans) do have some advantages over passwords, they have their weaknesses too. And, yes, fingerprints can be stolen. I’m not talking... Read more »
Advertisement:

Stop saying "I was hacked," raise security awareness instead

Stop saying "I was hacked," raise security awareness instead
“I was hacked.” It’s an overused phrase. It’s what people say when their email address is used to send spam. It’s what people say when they lose control of their social media accounts (or sometimes as a lie to cover up inappropriate posts to social media). It’s what people say when their web site has... Read more »

Forget Edward Snowden, Aaron Swartz is your true Internet hero

This is the story of someone who publicly released government documents and was ruthlessly pursued by the U.S. government for his actions, but this is not the story of Edward Snowden. This is not the story of Bradley Manning either. This is the story of Aaron Swartz, and it doesn’t have a happy ending. Aaron Swartz... Read more »

What is CISPA and what happened to the planned blackout to protest it?

What is CISPA and what happened to the planned blackout to protest it?
The hacker group Anonymous called for a voluntary Internet blackout to protest CISPA, but at this time no major websites seem to be participating. So what is CISPA anyway, and why would anyone want to protest it? Furthermore, why did the CISPA blackout fail to get high profile participants? What is CISPA? CISPA is the... Read more »
Advertisement:

How to turn on Apple two step verification and why you should

Apple has introduced two step verification for Apple ID. If you use iTunes, iCloud, an iPhone, iPad, Mac or basically an Apple thing you should activate Apple two step verification now. Apple two step verification protects your data by requiring an additional code when you log in using your Apple ID. This prevents someone else... Read more »