Stupid Politicians – Australia Edition

Thank God this hasn’t happened here in the United States (yet).  It is not for lack of trying by US law enforcement agencies, though.  What am I talking about?  Australia recently passed the controversial and totally STUPID anti-encryption law called Telecommunication & Other Legislation Amendment (Assistance & Access) Act of 2018 (TOLA).

TOLA is supposed to ...

Continue Reading →
0

VPN Encryption Protocols Explained

A VPN can provide a way to keep your location private by replacing the IP address of your ISP’s gateway router with an anonymous IP from the VPN provider’s pool.  It will prevent your ISP, or Google and other websites from discovering your location, tracking your activity online, or saving your search history.  The contents of your communications are changed from plaintext to ...

Continue Reading →
0

How to Pick a VPN

If you are looking to protect yourself and your computer communications by using a VPN, the hardest part often is knowing where to start.  There are dozens of companies providing VPN services for a fee.  How can you know which one is best for you?

There are a number of features to consider when shopping for a VPN service.  Some of the features to ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


620 million records from 16 websites listed for sale on the Dark Web

The Register reports that a seller on the Dream Market – a Dark Web marketplace hidden by the encrypted layers of Tor – began offering 16 stolen databases with 620 million accounts.


First it was location, now every app wants your contacts

Why do app developers ...

Continue Reading →
0

What the Heck is Zero-Trust Security?

Have you ever wondered why the state of cybersecurity is so screwed up?  Why is it so easy for bad actors and cyber-criminals to hijack systems and steal information?  Would you be surprised to learn the answer is because we designed it that way?  Computers, networks, operating systems and software were designed to work together as easily as possible, and were inherently  “trusted” by each other.  In the beginning, most systems ...

Continue Reading →
0

Failures in Encryption – IronPhone

Netherlands security company Black Box Security was raided by the Dutch Police and shuttered on suspicion of money laundering and operating a criminal enterprise.  Black Box was the inventor of the Iron Phone and the Iron Chat app.  Together, they were supposed to provide an unbreakable encrypted chat service.  This service became a popular favorite among cyber and other criminals.

According to ...

Continue Reading →
0

Securing the Domain Name Service

One of the most important systems that makes the Internet easy to use has absolutely no security in its current form.  This means that your Internet service provider (and some others) can easily see every website that you visit. (Since  you have “nothing to hide” this should not be a problem, right?)

DNS or the Domain Name System is the networking protocol that finds websites and resources on the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Porn-warning security scam hooks you up to “Apple Care”

It’s a toll free “Apple Care” number, meaning that in theory it shouldn’t cost you a thing – so what’s the harm in calling just in case?


Extortionist lawyer pleads guilty to creating porn honeypot

These guys give lawyers a bad name, if that isn’t an oxymoron.  ...

Continue Reading →
0
Page 1 of 7 12345...»