Cybercrime and other forms of “cyber-badness” affect different professions in different ways. Recently I participated in a panel about the cybersecurity concerns of journalists and the news media, hosted by the Inter America Press Association (IAPA). An account of the panel was published on WeLiveSecuritylast month but in this article I want to pass along some of the … More Cybersecurity for journalists and the news media
Reviewing a lease, preparing a favorite recipe, applying for a loan … these are all things a typical college student might ask parents how to do. But these days, students are more likely to turn to a quick internet search for answers to just about everything. Parents, however, still tend to depend on their children … More Having “the talk” with parents — the tech talk, that is
I’ve just about recovered from the sensory overload that is CES to gather my thoughts from what was another fascinating event. This blog, on connected car hacking, is the first of two posts. New cars are networked computers with an engine attached. Yours doesn’t sync with your phone when it detects you driving? That’s so … More Connected car hacking: Who’s to blame?
The latest report states 77 computers, laptops, mobiles, were lost or stolen from HSE in the last 5 years. Ok, 5 years, means approximately since 2010/11. But they couldn’t exactly account for all of them before that either. A headline from 2008 says 55 HSE laptops go missing, then three more in 2009 and a … More What’s happening with HSE’s lost computers?
Many sites won’t let users create an account until they have created a suitably “strong” password – often measured by text flags on sites describing passwords as “weak” or “strong” as you type. This sort of system tempts users to fall into traps such as adding numbers and symbols to the end of passwords – … More How to create strong passwords (without driving yourself mad)