No Secrets, No Privacy, No Security

cybersecurity_436x270Last week we talked about the impossibility of keeping secrets over the long term, the liberation of secret information by groups or individuals who just wanted the secrets exposed.  A close cousin, conceptually, is privacy.  At this point, there is no privacy anymore, not really.

Time was when your life was largely unknown, and privacy was an easy thing to have. But this is ...

Continue Reading →
0

No More Secrets

Hacker movies are one of my favorite genres, and have been for a long time.  Go figure.  One of my favorites from the “olden days” is the 1992 movie “Sneakers.”  In this movie Robert Redford and his merry band of cybersecurity testers are tasked with the recovery of a mysterious “black box” which basically can solve for any type of encryption that was in use at that time.  At one point in the movie the blind hacker discovers ...

Continue Reading →
0

EMV Cards Due October – It’s About Time!

EMVcardEMV or “chip and PIN” cards have a much higher level of security built right into the card, and have been in common use in Europe for over a decade.  For some reason (too expensive to implement?  Really?) the United States has continued to use the horribly insecure magnetic stripe credit card, which is why exploits like the Target Christmas card breach are even possible.

On October 1st, the United States will FINALLY ...

Continue Reading →
0

Tor Story 2

This is the second of a three-part series of articles about TOR.  On Monday we took a look at the surprising origins of the TOR network.  Today we will be taking a look at how TOR works.

HOW TOR WORKS

To use TOR, a person just needs to go to The TOR Project , and download an install the TOR web browser. Then it makes sense to read the TOR warning document. The rules include:

  • Use the TOR browser
  • Don’t torrent ...
Continue Reading →
0

Tor Story 1

TORlogoTOR or The Onion Router is one of the greatest anonymizer services available on the Internet, and allows anyone to use the Internet without revealing their source IP address, and through that, their location. Yet as recently as last November, when the FBI took down the Silk Road server and arrested its operator , and Interpol followed up with the seizure of 400 Dark Web marketplace sites and the arrest ...

Continue Reading →
0

WordPress Site Owners – Update Now

WordPresslogoJust a quick note to my WordPress pals – the latest update, WordPress 4.2.3, has an import fix for a cross site scripting (XSS) vulnerability that leaves your site vulnerable to attack.  According to Sophos:

“The flaw allows WordPress users who have Contributor or Author roles to add javascript to a site (something normally reserved for Editors and Administrators) using specially crafted

Continue Reading →
0

PC Trial-ware Is a Security Risk

So you bought yourself a new computer.  It has everything, a touch screen, built in WiFi and Bluetooth, anything you could want.  And a whole bunch of stuff you didn’t want, in the form of pre-installed software programs, trial-ware, and other bloat-ware and crap-ware that causes an unrelenting stream of pop-ups asking you to purchase and activate these mostly worthless programs.

crapware2

Continue Reading →
0
Page 102 of 107 «...708090100101102103104...»