April 17, 2023 Securing the Internet of Things As cybersecurity experts love to say, the “S” in “IoT” stands for security… meaning there is none. I’ve seen estimates that say there were…
October 17, 2022 Protecting Schools and Students We talk a lot about security and privacy on my show, but we don’t talk enough about these subjects in relation to students and…
August 8, 2022 Security Via Subtraction All software has bugs, so the more software you have installed, the more bugs you have. It’s not just the bugs in any individual…
May 30, 2022 Emergency Mode Modern smartphones have a potentially life-saving feature called “SOS” or “Emergency” mode that can give first responders critical medical information and automatically dial your…
February 28, 2022 Securing Your Mobile Device Your cell phone is a super computer and phenomenally powerful tracking device. Even George Orwell wouldn’t have dreamed that telescreens would be pocket sized…
November 8, 2021 Restoring Trust in Our Elections Nothing is arguably more fundamental to a democracy than voting. But it’s not enough to have a secure election. The electorate also needs to…
May 18, 2020 Beware the Evil Maid Intel created the Thunderbolt protocol to give us blazingly fast data transfer and other interesting features. Thunderbolt usually comes with the newer USB-C ports,…
April 27, 2020 Have You Been Pwned? Every time there’s a data breach at a company or service where you do business, there’s a chance that the bad guys will reverse…
October 21, 2019 Risky Business (Part 2) You’ve got ransomware! Now what? If you had the foresight to create safe backups, you can restore your data and move on. Sometimes the…
October 7, 2019 Don’t Forget to Wipe Your Data What happens to all the files, photos, songs and other data on your devices when you resell them or throw them away? Well, if…