December 4, 2023 Using Email Aliases Your online account credentials have two parts: a user name and a password. Today, most online providers force you to use your email address…
November 27, 2023 Smart City Blues City governments are relying more and more on a vast network of sensors to tell them what’s going on: stop light cameras, gunshot detectors,…
November 20, 2023 Best & Worst Gifts for 2023 The holiday gift-giving season is upon us – and therefore it’s time for my annual guide on the best and worst gifts for your…
November 13, 2023 Smartphone Spyware Today there is a thriving market for legal, for-profit smartphone spyware (aka mercenary spyware). Companies like the NSO Group are free to create and…
November 6, 2023 The Rise of Cellular IoT Connecting all our stuff to the internet – making devices “smart” – brings with it a lot of risks. Besides the more obvious cybersecurity…
October 30, 2023 Reclaiming the Internet What happened to the internet? It had so much promise. Social media and search results are full of stuff we never wanted to see….
October 23, 2023 It’s Time to Try Proton Email is old and was never built for security and privacy. Thankfully there are several modern secure email services. My personal favorite is Proton…
October 16, 2023 What’s Your Threat Model? There are several privacy-focused services available today. And the products we use have a dizzying array of privacy and security settings. How do you…
October 9, 2023 Cybersecurity Awareness Month October is national Cybersecurity Awareness Month here in the US. One of the four key themes this year is Recognizing and Reporting Phishing. We…
October 2, 2023 Catching Phish The weakest link in most cybersecurity systems is you – that is, human beings. And one of the primary ways that people are tricked…